Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 01:59
Static task
static1
Behavioral task
behavioral1
Sample
80f785a35f7487df96bb17b1fe2a67f188417ad017db8efac8d83b3858efcd96.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
80f785a35f7487df96bb17b1fe2a67f188417ad017db8efac8d83b3858efcd96.exe
Resource
win10v2004-20220812-en
General
-
Target
80f785a35f7487df96bb17b1fe2a67f188417ad017db8efac8d83b3858efcd96.exe
-
Size
83KB
-
MD5
56908392d21ec7d8be04f7bbd59732c2
-
SHA1
c864ef983e05ec65fcb4c9ef19444eef8728cc2b
-
SHA256
80f785a35f7487df96bb17b1fe2a67f188417ad017db8efac8d83b3858efcd96
-
SHA512
6d6aa7cc3bc963d8c0ed2eca6250f6a09ca69228704dabf5998bf8069708fbe4739a8e4ca47086cd937984b58c029af239442ac6227335320e51fc6d40e9e981
-
SSDEEP
1536:msGVpglGkHHFwPtwKOl2Dp+jZuMzJAGdjl:NV9OFtOAQQMzJVdjl
Malware Config
Extracted
asyncrat
1.0.7
Default
2.58.56.22:5211
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_file
Spoofer.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4800-140-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
powershell.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vlc = "C:\\Program Files (x86)\\vlc\\vlc.exe" powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
80f785a35f7487df96bb17b1fe2a67f188417ad017db8efac8d83b3858efcd96.exedescription pid process target process PID 448 set thread context of 4800 448 80f785a35f7487df96bb17b1fe2a67f188417ad017db8efac8d83b3858efcd96.exe RegAsm.exe -
Drops file in Program Files directory 1 IoCs
Processes:
80f785a35f7487df96bb17b1fe2a67f188417ad017db8efac8d83b3858efcd96.exedescription ioc process File created C:\Program Files (x86)\vlc\vlc.exe 80f785a35f7487df96bb17b1fe2a67f188417ad017db8efac8d83b3858efcd96.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 1896 powershell.exe 1896 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exeRegAsm.exedescription pid process Token: SeDebugPrivilege 1896 powershell.exe Token: SeDebugPrivilege 4800 RegAsm.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
80f785a35f7487df96bb17b1fe2a67f188417ad017db8efac8d83b3858efcd96.exedescription pid process target process PID 448 wrote to memory of 1896 448 80f785a35f7487df96bb17b1fe2a67f188417ad017db8efac8d83b3858efcd96.exe powershell.exe PID 448 wrote to memory of 1896 448 80f785a35f7487df96bb17b1fe2a67f188417ad017db8efac8d83b3858efcd96.exe powershell.exe PID 448 wrote to memory of 1896 448 80f785a35f7487df96bb17b1fe2a67f188417ad017db8efac8d83b3858efcd96.exe powershell.exe PID 448 wrote to memory of 4800 448 80f785a35f7487df96bb17b1fe2a67f188417ad017db8efac8d83b3858efcd96.exe RegAsm.exe PID 448 wrote to memory of 4800 448 80f785a35f7487df96bb17b1fe2a67f188417ad017db8efac8d83b3858efcd96.exe RegAsm.exe PID 448 wrote to memory of 4800 448 80f785a35f7487df96bb17b1fe2a67f188417ad017db8efac8d83b3858efcd96.exe RegAsm.exe PID 448 wrote to memory of 4800 448 80f785a35f7487df96bb17b1fe2a67f188417ad017db8efac8d83b3858efcd96.exe RegAsm.exe PID 448 wrote to memory of 4800 448 80f785a35f7487df96bb17b1fe2a67f188417ad017db8efac8d83b3858efcd96.exe RegAsm.exe PID 448 wrote to memory of 4800 448 80f785a35f7487df96bb17b1fe2a67f188417ad017db8efac8d83b3858efcd96.exe RegAsm.exe PID 448 wrote to memory of 4800 448 80f785a35f7487df96bb17b1fe2a67f188417ad017db8efac8d83b3858efcd96.exe RegAsm.exe PID 448 wrote to memory of 4800 448 80f785a35f7487df96bb17b1fe2a67f188417ad017db8efac8d83b3858efcd96.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\80f785a35f7487df96bb17b1fe2a67f188417ad017db8efac8d83b3858efcd96.exe"C:\Users\Admin\AppData\Local\Temp\80f785a35f7487df96bb17b1fe2a67f188417ad017db8efac8d83b3858efcd96.exe"1⤵
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'vlc';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'vlc' -Value '"C:\Program Files (x86)\vlc\vlc.exe"' -PropertyType 'String'2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/448-132-0x0000000000DE0000-0x0000000000DFA000-memory.dmpFilesize
104KB
-
memory/448-133-0x0000000005E10000-0x00000000063B4000-memory.dmpFilesize
5.6MB
-
memory/448-134-0x0000000005860000-0x00000000058F2000-memory.dmpFilesize
584KB
-
memory/448-135-0x0000000005940000-0x000000000594A000-memory.dmpFilesize
40KB
-
memory/448-136-0x00000000059D0000-0x0000000005A46000-memory.dmpFilesize
472KB
-
memory/448-137-0x0000000005AC0000-0x0000000005ADE000-memory.dmpFilesize
120KB
-
memory/1896-144-0x00000000056B0000-0x0000000005716000-memory.dmpFilesize
408KB
-
memory/1896-141-0x0000000002490000-0x00000000024C6000-memory.dmpFilesize
216KB
-
memory/1896-142-0x0000000004F10000-0x0000000005538000-memory.dmpFilesize
6.2MB
-
memory/1896-143-0x0000000004CD0000-0x0000000004CF2000-memory.dmpFilesize
136KB
-
memory/1896-138-0x0000000000000000-mapping.dmp
-
memory/1896-145-0x0000000005790000-0x00000000057F6000-memory.dmpFilesize
408KB
-
memory/1896-146-0x0000000004B50000-0x0000000004B6E000-memory.dmpFilesize
120KB
-
memory/1896-147-0x0000000006DA0000-0x0000000006E36000-memory.dmpFilesize
600KB
-
memory/1896-148-0x00000000062D0000-0x00000000062EA000-memory.dmpFilesize
104KB
-
memory/1896-149-0x0000000006320000-0x0000000006342000-memory.dmpFilesize
136KB
-
memory/4800-139-0x0000000000000000-mapping.dmp
-
memory/4800-140-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB