Analysis
-
max time kernel
139s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23/12/2022, 04:18
Behavioral task
behavioral1
Sample
3730cde00a18eb51a69cec2c0f7fec25.exe
Resource
win7-20220812-en
General
-
Target
3730cde00a18eb51a69cec2c0f7fec25.exe
-
Size
48KB
-
MD5
3730cde00a18eb51a69cec2c0f7fec25
-
SHA1
e1e674276906eeb2edbc3def8d5b29d30e3ea860
-
SHA256
5a55e8151e99ae52f6fb48e25cdf6d7d2fc6e531b6050a250fc4f53d480aa3ac
-
SHA512
5ca253deebcd29f4473a79c0a485d6eb8995f51a6831a19e547da57c99fe4bd9ee59a0cf44c3be5635225e7abbaef7f04ed716bbeeaec8e55da7029bb7c4b09b
-
SSDEEP
768:j5F603LoILkWAt+jipNRipp8YblgyDPhvEgK/JzZVc6KN:j5F6RtpNWzbiWnkJzZVclN
Malware Config
Extracted
asyncrat
1.0.7
Default
DcRatMutex_qwqdanchun
-
delay
1
-
install
true
-
install_file
SystemUI.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/AjHdtULH
Signatures
-
Async RAT payload 3 IoCs
resource yara_rule behavioral2/memory/2620-132-0x0000000000F10000-0x0000000000F22000-memory.dmp asyncrat behavioral2/files/0x000600000002318a-141.dat asyncrat behavioral2/files/0x000600000002318a-142.dat asyncrat -
Executes dropped EXE 1 IoCs
pid Process 672 SystemUI.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 3730cde00a18eb51a69cec2c0f7fec25.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2768 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1212 timeout.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 2620 3730cde00a18eb51a69cec2c0f7fec25.exe 2620 3730cde00a18eb51a69cec2c0f7fec25.exe 2620 3730cde00a18eb51a69cec2c0f7fec25.exe 2620 3730cde00a18eb51a69cec2c0f7fec25.exe 2620 3730cde00a18eb51a69cec2c0f7fec25.exe 2620 3730cde00a18eb51a69cec2c0f7fec25.exe 2620 3730cde00a18eb51a69cec2c0f7fec25.exe 2620 3730cde00a18eb51a69cec2c0f7fec25.exe 2620 3730cde00a18eb51a69cec2c0f7fec25.exe 2620 3730cde00a18eb51a69cec2c0f7fec25.exe 2620 3730cde00a18eb51a69cec2c0f7fec25.exe 2620 3730cde00a18eb51a69cec2c0f7fec25.exe 2620 3730cde00a18eb51a69cec2c0f7fec25.exe 2620 3730cde00a18eb51a69cec2c0f7fec25.exe 2620 3730cde00a18eb51a69cec2c0f7fec25.exe 2620 3730cde00a18eb51a69cec2c0f7fec25.exe 2620 3730cde00a18eb51a69cec2c0f7fec25.exe 2620 3730cde00a18eb51a69cec2c0f7fec25.exe 2620 3730cde00a18eb51a69cec2c0f7fec25.exe 2620 3730cde00a18eb51a69cec2c0f7fec25.exe 2620 3730cde00a18eb51a69cec2c0f7fec25.exe 2620 3730cde00a18eb51a69cec2c0f7fec25.exe 2620 3730cde00a18eb51a69cec2c0f7fec25.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2620 3730cde00a18eb51a69cec2c0f7fec25.exe Token: SeDebugPrivilege 672 SystemUI.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2620 wrote to memory of 4240 2620 3730cde00a18eb51a69cec2c0f7fec25.exe 80 PID 2620 wrote to memory of 4240 2620 3730cde00a18eb51a69cec2c0f7fec25.exe 80 PID 2620 wrote to memory of 4328 2620 3730cde00a18eb51a69cec2c0f7fec25.exe 82 PID 2620 wrote to memory of 4328 2620 3730cde00a18eb51a69cec2c0f7fec25.exe 82 PID 4240 wrote to memory of 2768 4240 cmd.exe 84 PID 4240 wrote to memory of 2768 4240 cmd.exe 84 PID 4328 wrote to memory of 1212 4328 cmd.exe 85 PID 4328 wrote to memory of 1212 4328 cmd.exe 85 PID 4328 wrote to memory of 672 4328 cmd.exe 89 PID 4328 wrote to memory of 672 4328 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\3730cde00a18eb51a69cec2c0f7fec25.exe"C:\Users\Admin\AppData\Local\Temp\3730cde00a18eb51a69cec2c0f7fec25.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "SystemUI" /tr '"C:\Users\Admin\AppData\Roaming\SystemUI.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "SystemUI" /tr '"C:\Users\Admin\AppData\Roaming\SystemUI.exe"'3⤵
- Creates scheduled task(s)
PID:2768
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp7043.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:1212
-
-
C:\Users\Admin\AppData\Roaming\SystemUI.exe"C:\Users\Admin\AppData\Roaming\SystemUI.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:672
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD537872f2399c796c1759c538797514bdc
SHA15464d3ed42cbea828eb6d5b96fb58c561824be96
SHA2567e63f24d1e2379d9794fbccd90142bb4e1e704620b6372e4554728324a6445ef
SHA51224a59648d56fa1e94f2221a3dd4b7045423da7f2e066a93ea59f535b236fb80e1af445fc1ce8107733698794c2d44e612a0b0f734045f1175ee33b68293b47a0
-
Filesize
48KB
MD53730cde00a18eb51a69cec2c0f7fec25
SHA1e1e674276906eeb2edbc3def8d5b29d30e3ea860
SHA2565a55e8151e99ae52f6fb48e25cdf6d7d2fc6e531b6050a250fc4f53d480aa3ac
SHA5125ca253deebcd29f4473a79c0a485d6eb8995f51a6831a19e547da57c99fe4bd9ee59a0cf44c3be5635225e7abbaef7f04ed716bbeeaec8e55da7029bb7c4b09b
-
Filesize
48KB
MD53730cde00a18eb51a69cec2c0f7fec25
SHA1e1e674276906eeb2edbc3def8d5b29d30e3ea860
SHA2565a55e8151e99ae52f6fb48e25cdf6d7d2fc6e531b6050a250fc4f53d480aa3ac
SHA5125ca253deebcd29f4473a79c0a485d6eb8995f51a6831a19e547da57c99fe4bd9ee59a0cf44c3be5635225e7abbaef7f04ed716bbeeaec8e55da7029bb7c4b09b