Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-12-2022 14:33

General

  • Target

    3a8c396709d693d9a6056b74722088ceb5881b93765df71f7124b1756bb7e72f.exe

  • Size

    49.0MB

  • MD5

    29dbcafd5b93edc917ec738221a4d62d

  • SHA1

    5ef0337f89afaa36072a5bd9a670fdf7c9b7535a

  • SHA256

    3a8c396709d693d9a6056b74722088ceb5881b93765df71f7124b1756bb7e72f

  • SHA512

    800c0efd66509a8fa0816c47f061faf6b01a23b673d98495d2a5412d500feda502f9d7fdfb63a8a05948032fed1b9b63744db9cc0db6c78a1aa97840fca0ed76

  • SSDEEP

    1572864:lJFzuWZZPyH0G/bJafhqikT1M2cgY/Dx2F91jn:lPrZZPyH0mQgikT11cgY/DxG7

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • CoreEntity .NET Packer 2 IoCs

    A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.

  • Async RAT payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 13 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a8c396709d693d9a6056b74722088ceb5881b93765df71f7124b1756bb7e72f.exe
    "C:\Users\Admin\AppData\Local\Temp\3a8c396709d693d9a6056b74722088ceb5881b93765df71f7124b1756bb7e72f.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2056
    • C:\Program Files\Steam++\Steam++.exe
      "C:\Program Files\Steam++\Steam++.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4888
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" -NoLogo
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3480

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Steam++\Steam++.exe
    Filesize

    154.4MB

    MD5

    2e47e423e8d3566c6984f09cc8aa5868

    SHA1

    80d40b0cee6fe5210c21e045aea5b6f0b90977cc

    SHA256

    0c736d6ab33edce6fccba7ebf758c2f4201879aa86102205d62eeb8a7030aa4f

    SHA512

    5287faa54ce68fc88598b56af5730911bf8a6bcf49b5f419ece6e1c1ea94731b5e69433802d305e1e6297a80d41ef793a96f2506aab2e09d0a8b6758432c21e0

  • C:\Program Files\Steam++\Steam++.exe
    Filesize

    154.4MB

    MD5

    2e47e423e8d3566c6984f09cc8aa5868

    SHA1

    80d40b0cee6fe5210c21e045aea5b6f0b90977cc

    SHA256

    0c736d6ab33edce6fccba7ebf758c2f4201879aa86102205d62eeb8a7030aa4f

    SHA512

    5287faa54ce68fc88598b56af5730911bf8a6bcf49b5f419ece6e1c1ea94731b5e69433802d305e1e6297a80d41ef793a96f2506aab2e09d0a8b6758432c21e0

  • C:\Program Files\Steam++\WebView2Loader.dll
    Filesize

    153KB

    MD5

    75bf6c40545560e5013313655b110b93

    SHA1

    b18559fae335597b4e2a679277c4d207fa7849a4

    SHA256

    fb82ac089963e1dee932acce2f86ba34c128770cec4b60bcfd86f95d29e971ab

    SHA512

    da9aaa565b97ea9588bcae6a490eb95f8fae2fa0ed417ede71690462a27d31c4eeb3ffb62c112b9f5cc8832427d450e6417144c928d7e5ead291e7be499f77c3

  • C:\Program Files\Steam++\WebView2Loader.dll
    Filesize

    153KB

    MD5

    75bf6c40545560e5013313655b110b93

    SHA1

    b18559fae335597b4e2a679277c4d207fa7849a4

    SHA256

    fb82ac089963e1dee932acce2f86ba34c128770cec4b60bcfd86f95d29e971ab

    SHA512

    da9aaa565b97ea9588bcae6a490eb95f8fae2fa0ed417ede71690462a27d31c4eeb3ffb62c112b9f5cc8832427d450e6417144c928d7e5ead291e7be499f77c3

  • C:\Program Files\Steam++\av_libGLESv2.dll
    Filesize

    4.2MB

    MD5

    73d2fb4c35d323813a86e3bf5c85c345

    SHA1

    81f751a34e0c25bdea93902a19a94a49ce1495df

    SHA256

    85b3aee47c0e0eaf3a5ea5c75ba8131387a12639b6a0ef280c28531fb77695ae

    SHA512

    e81677cc9b99ff3d54f67000a60489603e01a896f90c4ef0c883b82e2fdb7b90d2899c078958b3f060a20373b99cb6c4deb7f64cc4c7e0ba2a708209f4684ca4

  • C:\Program Files\Steam++\av_libglesv2.dll
    Filesize

    4.2MB

    MD5

    73d2fb4c35d323813a86e3bf5c85c345

    SHA1

    81f751a34e0c25bdea93902a19a94a49ce1495df

    SHA256

    85b3aee47c0e0eaf3a5ea5c75ba8131387a12639b6a0ef280c28531fb77695ae

    SHA512

    e81677cc9b99ff3d54f67000a60489603e01a896f90c4ef0c883b82e2fdb7b90d2899c078958b3f060a20373b99cb6c4deb7f64cc4c7e0ba2a708209f4684ca4

  • C:\Program Files\Steam++\e_sqlite3.DLL
    Filesize

    1.6MB

    MD5

    64a9875bdcfb249d9767dbbf204c3767

    SHA1

    0642bea6f89ee8c11c219e918e980679056c2ed5

    SHA256

    897ad444fbffd05a5a7ed681687d92a784d9a16dc1ccb466439f89b772270a6d

    SHA512

    a1fa0cefe2dd6eb26faf6cc6c7c2e7a79c4e35dd5dc9ad01fee02040ea0c2cdf722d6fa5b9c42d3a6345ced0167e29bf0d3f4da229d09ad5ff7ab117bdbab529

  • C:\Program Files\Steam++\e_sqlite3.dll
    Filesize

    1.6MB

    MD5

    64a9875bdcfb249d9767dbbf204c3767

    SHA1

    0642bea6f89ee8c11c219e918e980679056c2ed5

    SHA256

    897ad444fbffd05a5a7ed681687d92a784d9a16dc1ccb466439f89b772270a6d

    SHA512

    a1fa0cefe2dd6eb26faf6cc6c7c2e7a79c4e35dd5dc9ad01fee02040ea0c2cdf722d6fa5b9c42d3a6345ced0167e29bf0d3f4da229d09ad5ff7ab117bdbab529

  • C:\Program Files\Steam++\libHarfBuzzSharp.DLL
    Filesize

    893KB

    MD5

    eaa6c0d42c8967d86a39808806c49869

    SHA1

    0d73478de8d07446dc41c69ca8da606d3253e7ac

    SHA256

    8d5d5236f4d0fc61e1c5b3ecc69370061c06f3682cc4f339476d8a6c41bcd02a

    SHA512

    b159f620e57a77649416916e1626e3fe992fe6228521614478d50f5e02152d22d0290e673796e7e536b3de31e8d87ea5ec319a4b1d66db913bcf2dfe371f0063

  • C:\Program Files\Steam++\libHarfBuzzSharp.dll
    Filesize

    893KB

    MD5

    eaa6c0d42c8967d86a39808806c49869

    SHA1

    0d73478de8d07446dc41c69ca8da606d3253e7ac

    SHA256

    8d5d5236f4d0fc61e1c5b3ecc69370061c06f3682cc4f339476d8a6c41bcd02a

    SHA512

    b159f620e57a77649416916e1626e3fe992fe6228521614478d50f5e02152d22d0290e673796e7e536b3de31e8d87ea5ec319a4b1d66db913bcf2dfe371f0063

  • C:\Program Files\Steam++\libSkiaSharp.DLL
    Filesize

    9.0MB

    MD5

    70d45a6d44b56f1be6a3146f5f3b32f2

    SHA1

    067616d01714b49b0109eb38c60497f333ffb72a

    SHA256

    62dc810c091965e8981efbe071d602108c08f60b57737b0fe5fe7066b84eaaf4

    SHA512

    d638b94ad6654deff506640fdb71845727f125b3d28965a5612532b0a5de518aee5b2c62e894436028c9d6ca82ff2d4091ae175305a8b599dd511788bf3f749c

  • C:\Program Files\Steam++\libSkiaSharp.dll
    Filesize

    9.0MB

    MD5

    70d45a6d44b56f1be6a3146f5f3b32f2

    SHA1

    067616d01714b49b0109eb38c60497f333ffb72a

    SHA256

    62dc810c091965e8981efbe071d602108c08f60b57737b0fe5fe7066b84eaaf4

    SHA512

    d638b94ad6654deff506640fdb71845727f125b3d28965a5612532b0a5de518aee5b2c62e894436028c9d6ca82ff2d4091ae175305a8b599dd511788bf3f749c

  • C:\Users\Admin\AppData\Local\Temp\nsg986D.tmp\BgWorker.dll
    Filesize

    2KB

    MD5

    33ec04738007e665059cf40bc0f0c22b

    SHA1

    4196759a922e333d9b17bda5369f14c33cd5e3bc

    SHA256

    50f735ab8f3473423e6873d628150bbc0777be7b4f6405247cddf22bb00fb6be

    SHA512

    2318b01f0c2f2f021a618ca3e6e5c24a94df5d00154766b77160203b8b0a177c8581c7b688ffe69be93a69bc7fd06b8a589844d42447f5060fb4bcf94d8a9aef

  • C:\Users\Admin\AppData\Local\Temp\nsg986D.tmp\BgWorker.dll
    Filesize

    2KB

    MD5

    33ec04738007e665059cf40bc0f0c22b

    SHA1

    4196759a922e333d9b17bda5369f14c33cd5e3bc

    SHA256

    50f735ab8f3473423e6873d628150bbc0777be7b4f6405247cddf22bb00fb6be

    SHA512

    2318b01f0c2f2f021a618ca3e6e5c24a94df5d00154766b77160203b8b0a177c8581c7b688ffe69be93a69bc7fd06b8a589844d42447f5060fb4bcf94d8a9aef

  • C:\Users\Admin\AppData\Local\Temp\nsg986D.tmp\System.dll
    Filesize

    11KB

    MD5

    bf712f32249029466fa86756f5546950

    SHA1

    75ac4dc4808ac148ddd78f6b89a51afbd4091c2e

    SHA256

    7851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af

    SHA512

    13f69959b28416e0b8811c962a49309dca3f048a165457051a28a3eb51377dcaf99a15e86d7eee8f867a9e25ecf8c44da370ac8f530eeae7b5252eaba64b96f4

  • C:\Users\Admin\AppData\Local\Temp\nsg986D.tmp\System.dll
    Filesize

    11KB

    MD5

    bf712f32249029466fa86756f5546950

    SHA1

    75ac4dc4808ac148ddd78f6b89a51afbd4091c2e

    SHA256

    7851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af

    SHA512

    13f69959b28416e0b8811c962a49309dca3f048a165457051a28a3eb51377dcaf99a15e86d7eee8f867a9e25ecf8c44da370ac8f530eeae7b5252eaba64b96f4

  • C:\Users\Admin\AppData\Local\Temp\nsg986D.tmp\nsNiuniuSkin.dll
    Filesize

    982KB

    MD5

    149cfa10b1d18a65e2d0407d1a5930ea

    SHA1

    ba678e9857b405c434eacdbf1f322c75bd568db4

    SHA256

    548b7113ae115d936a790760a46c3a50ddbae6ddaf163e6510007d1c280a5488

    SHA512

    5b977dfb3ee61b5e65ceaf0f31b871b95129896862b17c9eb9690dd2d560830d2b16cb95ab729cf80a0c069a04052d43a0f9288756caf0958353346c05dc2c6b

  • C:\Users\Admin\AppData\Local\Temp\nsg986D.tmp\nsProcess.dll
    Filesize

    4KB

    MD5

    88d3e48d1c1a051c702d47046ade7b4c

    SHA1

    8fc805a8b7900b6ba895d1b809a9f3ad4c730d23

    SHA256

    51da07da18a5486b11e0d51ebff77a3f2fcbb4d66b5665d212cc6bda480c4257

    SHA512

    83299dd948b40b4e2c226256d018716dbacfa739d8e882131c7f4c028c0913bc4ed9d770deb252931f3d4890f8f385bd43dcf2a5bfe5b922ec35f4b3144247a7

  • C:\Users\Admin\AppData\Local\Temp\nsg986D.tmp\nsProcess.dll
    Filesize

    4KB

    MD5

    88d3e48d1c1a051c702d47046ade7b4c

    SHA1

    8fc805a8b7900b6ba895d1b809a9f3ad4c730d23

    SHA256

    51da07da18a5486b11e0d51ebff77a3f2fcbb4d66b5665d212cc6bda480c4257

    SHA512

    83299dd948b40b4e2c226256d018716dbacfa739d8e882131c7f4c028c0913bc4ed9d770deb252931f3d4890f8f385bd43dcf2a5bfe5b922ec35f4b3144247a7

  • C:\Users\Admin\AppData\Local\Temp\nsg986D.tmp\nsis7zU.dll
    Filesize

    313KB

    MD5

    06a47571ac922f82c098622b2f5f6f63

    SHA1

    8a581c33b7f2029c41edaad55d024fc0d2d7c427

    SHA256

    e4ab3064f2e094910ae80104ef9d371ccb74ebbeeed592582cf099acd83f5fe9

    SHA512

    04b3d18042f1faa536e1393179f412a5644d2cf691fbc14970f79df5c0594eeedb0826b495807a3243f27aaa0380423c1f975fe857f32e057309bb3f2a529a83

  • memory/3480-188-0x0000000000000000-mapping.dmp
  • memory/3480-189-0x000001C5BBD20000-0x000001C5BBD42000-memory.dmp
    Filesize

    136KB

  • memory/3480-197-0x00007FFF23D40000-0x00007FFF24801000-memory.dmp
    Filesize

    10.8MB

  • memory/3480-192-0x00007FFF23D40000-0x00007FFF24801000-memory.dmp
    Filesize

    10.8MB

  • memory/3480-191-0x000001C5D5C50000-0x000001C5D5CC6000-memory.dmp
    Filesize

    472KB

  • memory/3480-190-0x000001C5D5C00000-0x000001C5D5C44000-memory.dmp
    Filesize

    272KB

  • memory/4888-167-0x00000174E1FF0000-0x00000174E2030000-memory.dmp
    Filesize

    256KB

  • memory/4888-170-0x00000174E2400000-0x00000174E24A6000-memory.dmp
    Filesize

    664KB

  • memory/4888-158-0x00000174E20A0000-0x00000174E2257000-memory.dmp
    Filesize

    1.7MB

  • memory/4888-155-0x00000174E1D50000-0x00000174E1D8E000-memory.dmp
    Filesize

    248KB

  • memory/4888-152-0x00000174E1D90000-0x00000174E1DC4000-memory.dmp
    Filesize

    208KB

  • memory/4888-164-0x00000174E1ED0000-0x00000174E1EE3000-memory.dmp
    Filesize

    76KB

  • memory/4888-173-0x00000174E2030000-0x00000174E206C000-memory.dmp
    Filesize

    240KB

  • memory/4888-161-0x00000174E1F60000-0x00000174E1FE3000-memory.dmp
    Filesize

    524KB

  • memory/4888-179-0x00000174E1F20000-0x00000174E1F45000-memory.dmp
    Filesize

    148KB

  • memory/4888-149-0x00000174C1410000-0x00000174C1419000-memory.dmp
    Filesize

    36KB

  • memory/4888-146-0x00000174E1DF0000-0x00000174E1EC5000-memory.dmp
    Filesize

    852KB

  • memory/4888-143-0x0000000180000000-0x0000000180A23000-memory.dmp
    Filesize

    10.1MB

  • memory/4888-140-0x0000000000000000-mapping.dmp
  • memory/4888-176-0x00000174E1DE0000-0x00000174E1DED000-memory.dmp
    Filesize

    52KB