Analysis

  • max time kernel
    180s
  • max time network
    192s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2022 13:01

General

  • Target

    AS-0987654567890-09654.pif.exe

  • Size

    152KB

  • MD5

    ba88096aed1d0887ac87096eb02f31d7

  • SHA1

    653ec005de1c9eaa01d0caf97fd4a4c568263df1

  • SHA256

    c65474ab1e1cf358b34fb782e40b9208d967624bb63d4f58a749d7b27c0aee71

  • SHA512

    73323ddb58b6aed0b8a171a2e1aeb10c6e8dcf12cd8bf2240d7e64ec70898cba340016e4659ab3fea909bbddbb3404e0af70396fe8b98ed10b388706b2d6c285

  • SSDEEP

    3072:QEhKzShSycSMPJk+V42ma+9zxIT+DPjMBBYECSF:QBn1PJkS42mBITe+US

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Async RAT payload 1 IoCs
  • Executes dropped EXE 6 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AS-0987654567890-09654.pif.exe
    "C:\Users\Admin\AppData\Local\Temp\AS-0987654567890-09654.pif.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4592
    • C:\Users\Admin\AppData\Local\Temp\sbuwe.exe
      "C:\Users\Admin\AppData\Local\Temp\sbuwe.exe" C:\Users\Admin\AppData\Local\Temp\czxzqyursx.swv
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2232
      • C:\Users\Admin\AppData\Local\Temp\sbuwe.exe
        "C:\Users\Admin\AppData\Local\Temp\sbuwe.exe"
        3⤵
        • Executes dropped EXE
        PID:4460
      • C:\Users\Admin\AppData\Local\Temp\sbuwe.exe
        "C:\Users\Admin\AppData\Local\Temp\sbuwe.exe"
        3⤵
        • Executes dropped EXE
        PID:1032
      • C:\Users\Admin\AppData\Local\Temp\sbuwe.exe
        "C:\Users\Admin\AppData\Local\Temp\sbuwe.exe"
        3⤵
        • Executes dropped EXE
        PID:2172
      • C:\Users\Admin\AppData\Local\Temp\sbuwe.exe
        "C:\Users\Admin\AppData\Local\Temp\sbuwe.exe"
        3⤵
        • Executes dropped EXE
        PID:1504
      • C:\Users\Admin\AppData\Local\Temp\sbuwe.exe
        "C:\Users\Admin\AppData\Local\Temp\sbuwe.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:308

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\czxzqyursx.swv
    Filesize

    7KB

    MD5

    3e89ab76378b853abae0815b619cd419

    SHA1

    35f8ee8bdba1d5c3f3bf1f8ab13b96357e77ec2a

    SHA256

    6a6ab3f8800efa664b3d13b58b14478c169575915bea91ef57c9564e256bd929

    SHA512

    cbddf2239c49c0ef961deb6bd095c59a660ef3d6d039459b2b1fc1884cbd1ddb518c038610a06a118e260a76da29b4c5e638ca1ccccc6f8b391bff3de2c0f0d6

  • C:\Users\Admin\AppData\Local\Temp\sbuwe.exe
    Filesize

    99KB

    MD5

    51b1213e3b3ac55e28bdfb6ba8e68d65

    SHA1

    f7db5144b7510e4f47385d9e892ab0ec5e8b528c

    SHA256

    a6f1575a17540db945d22247f41b80f00b8f1a5d85a63d0c2aa7fb9aa405bd3f

    SHA512

    6652ae87cf05151769f70fdc2d771dd09edda183758acc18f86d707bbaa65c51c57f9443c053ab5677e260ca836f257d2eccb20b0bc94cc7c6f9ec133635756f

  • C:\Users\Admin\AppData\Local\Temp\sbuwe.exe
    Filesize

    99KB

    MD5

    51b1213e3b3ac55e28bdfb6ba8e68d65

    SHA1

    f7db5144b7510e4f47385d9e892ab0ec5e8b528c

    SHA256

    a6f1575a17540db945d22247f41b80f00b8f1a5d85a63d0c2aa7fb9aa405bd3f

    SHA512

    6652ae87cf05151769f70fdc2d771dd09edda183758acc18f86d707bbaa65c51c57f9443c053ab5677e260ca836f257d2eccb20b0bc94cc7c6f9ec133635756f

  • C:\Users\Admin\AppData\Local\Temp\sbuwe.exe
    Filesize

    99KB

    MD5

    51b1213e3b3ac55e28bdfb6ba8e68d65

    SHA1

    f7db5144b7510e4f47385d9e892ab0ec5e8b528c

    SHA256

    a6f1575a17540db945d22247f41b80f00b8f1a5d85a63d0c2aa7fb9aa405bd3f

    SHA512

    6652ae87cf05151769f70fdc2d771dd09edda183758acc18f86d707bbaa65c51c57f9443c053ab5677e260ca836f257d2eccb20b0bc94cc7c6f9ec133635756f

  • C:\Users\Admin\AppData\Local\Temp\sbuwe.exe
    Filesize

    99KB

    MD5

    51b1213e3b3ac55e28bdfb6ba8e68d65

    SHA1

    f7db5144b7510e4f47385d9e892ab0ec5e8b528c

    SHA256

    a6f1575a17540db945d22247f41b80f00b8f1a5d85a63d0c2aa7fb9aa405bd3f

    SHA512

    6652ae87cf05151769f70fdc2d771dd09edda183758acc18f86d707bbaa65c51c57f9443c053ab5677e260ca836f257d2eccb20b0bc94cc7c6f9ec133635756f

  • C:\Users\Admin\AppData\Local\Temp\sbuwe.exe
    Filesize

    99KB

    MD5

    51b1213e3b3ac55e28bdfb6ba8e68d65

    SHA1

    f7db5144b7510e4f47385d9e892ab0ec5e8b528c

    SHA256

    a6f1575a17540db945d22247f41b80f00b8f1a5d85a63d0c2aa7fb9aa405bd3f

    SHA512

    6652ae87cf05151769f70fdc2d771dd09edda183758acc18f86d707bbaa65c51c57f9443c053ab5677e260ca836f257d2eccb20b0bc94cc7c6f9ec133635756f

  • C:\Users\Admin\AppData\Local\Temp\sbuwe.exe
    Filesize

    99KB

    MD5

    51b1213e3b3ac55e28bdfb6ba8e68d65

    SHA1

    f7db5144b7510e4f47385d9e892ab0ec5e8b528c

    SHA256

    a6f1575a17540db945d22247f41b80f00b8f1a5d85a63d0c2aa7fb9aa405bd3f

    SHA512

    6652ae87cf05151769f70fdc2d771dd09edda183758acc18f86d707bbaa65c51c57f9443c053ab5677e260ca836f257d2eccb20b0bc94cc7c6f9ec133635756f

  • C:\Users\Admin\AppData\Local\Temp\sbuwe.exe
    Filesize

    99KB

    MD5

    51b1213e3b3ac55e28bdfb6ba8e68d65

    SHA1

    f7db5144b7510e4f47385d9e892ab0ec5e8b528c

    SHA256

    a6f1575a17540db945d22247f41b80f00b8f1a5d85a63d0c2aa7fb9aa405bd3f

    SHA512

    6652ae87cf05151769f70fdc2d771dd09edda183758acc18f86d707bbaa65c51c57f9443c053ab5677e260ca836f257d2eccb20b0bc94cc7c6f9ec133635756f

  • C:\Users\Admin\AppData\Local\Temp\scmky.pqz
    Filesize

    66KB

    MD5

    1c57157238cd8136733d20228666fc29

    SHA1

    9a7ed5d6e7413bf269b6725625bd6594dba9eb3e

    SHA256

    050c95c5cf12d9ccdbca94b80e7b0c59a3670e4571c853ae7d47ccc7f2bbc4cc

    SHA512

    ba3fc8c777f2e2f4b74ad1a09eafc3d5f64cb92ddb80cac2812268eac05719cb4a8725ca898ef7c8e0f4093775cf9e5b7454ca1c3bd50133236ab76c9362151c

  • memory/308-145-0x0000000000000000-mapping.dmp
  • memory/308-147-0x0000000000400000-0x0000000000427000-memory.dmp
    Filesize

    156KB

  • memory/308-148-0x0000000005740000-0x00000000057DC000-memory.dmp
    Filesize

    624KB

  • memory/308-149-0x0000000005D90000-0x0000000006334000-memory.dmp
    Filesize

    5.6MB

  • memory/308-150-0x0000000005850000-0x00000000058B6000-memory.dmp
    Filesize

    408KB

  • memory/1032-139-0x0000000000000000-mapping.dmp
  • memory/1504-143-0x0000000000000000-mapping.dmp
  • memory/2172-141-0x0000000000000000-mapping.dmp
  • memory/2232-132-0x0000000000000000-mapping.dmp
  • memory/4460-137-0x0000000000000000-mapping.dmp