Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2023 14:49
Static task
static1
Behavioral task
behavioral1
Sample
95a3f149f32f979d93fb121ce69c44a0675ae7597ae1346b836a0f0ef2a08c78.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
95a3f149f32f979d93fb121ce69c44a0675ae7597ae1346b836a0f0ef2a08c78.exe
Resource
win10v2004-20220812-en
General
-
Target
95a3f149f32f979d93fb121ce69c44a0675ae7597ae1346b836a0f0ef2a08c78.exe
-
Size
258KB
-
MD5
1985c36cdbb06273876e5f31f9b9366b
-
SHA1
74f30afdca2c62a8ff593e8fa255e26a718bbaed
-
SHA256
95a3f149f32f979d93fb121ce69c44a0675ae7597ae1346b836a0f0ef2a08c78
-
SHA512
71f8d5d27d70e2a9cdca9a9955f907496a227061bc79b7ba6ba0681fa700c4762d0ac8f6a50cb8246f94a3ac305e58dee42bbeb3646c7281b200b2d89467196e
-
SSDEEP
3072:vbw0rds5QHlrDAN6JajEBafUM6Wpn2WQfdwzfFFfbp6Vvgx84y/jdMM4qOLXECuc:kONrDAN6J3afwluFpHyRMR00are
Malware Config
Extracted
asyncrat
0.5.7B
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:1604
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\sex.exe asyncrat C:\Users\Admin\AppData\Local\Temp\sex.exe asyncrat behavioral2/memory/2688-140-0x0000000000670000-0x0000000000682000-memory.dmp asyncrat -
Executes dropped EXE 2 IoCs
Processes:
RunIt.exesex.exepid process 3444 RunIt.exe 2688 sex.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
95a3f149f32f979d93fb121ce69c44a0675ae7597ae1346b836a0f0ef2a08c78.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95a3f149f32f979d93fb121ce69c44a0675ae7597ae1346b836a0f0ef2a08c78.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
RunIt.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rnts.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Rnts.exe" RunIt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
sex.exedescription pid process Token: SeDebugPrivilege 2688 sex.exe Token: SeDebugPrivilege 2688 sex.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
95a3f149f32f979d93fb121ce69c44a0675ae7597ae1346b836a0f0ef2a08c78.exedescription pid process target process PID 4776 wrote to memory of 2688 4776 95a3f149f32f979d93fb121ce69c44a0675ae7597ae1346b836a0f0ef2a08c78.exe sex.exe PID 4776 wrote to memory of 2688 4776 95a3f149f32f979d93fb121ce69c44a0675ae7597ae1346b836a0f0ef2a08c78.exe sex.exe PID 4776 wrote to memory of 2688 4776 95a3f149f32f979d93fb121ce69c44a0675ae7597ae1346b836a0f0ef2a08c78.exe sex.exe PID 4776 wrote to memory of 3444 4776 95a3f149f32f979d93fb121ce69c44a0675ae7597ae1346b836a0f0ef2a08c78.exe RunIt.exe PID 4776 wrote to memory of 3444 4776 95a3f149f32f979d93fb121ce69c44a0675ae7597ae1346b836a0f0ef2a08c78.exe RunIt.exe PID 4776 wrote to memory of 3444 4776 95a3f149f32f979d93fb121ce69c44a0675ae7597ae1346b836a0f0ef2a08c78.exe RunIt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\95a3f149f32f979d93fb121ce69c44a0675ae7597ae1346b836a0f0ef2a08c78.exe"C:\Users\Admin\AppData\Local\Temp\95a3f149f32f979d93fb121ce69c44a0675ae7597ae1346b836a0f0ef2a08c78.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\sex.exe"C:\Users\Admin\AppData\Local\Temp\sex.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\RunIt.exe"C:\Users\Admin\AppData\Local\Temp\RunIt.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RunIt.exeFilesize
143KB
MD5d067619856f7f3079375960f62b99369
SHA1964d548557dec3aa8e851526b71adca4b4ddbfd5
SHA2569770561d2a27dbc16c230fe88af51f718d7d6274fcd63a3f109c381be848b4a9
SHA5121ec891082ac133833217ce8314f6d163451c5554b789cbf8a5ff0d5ebd0b55a7ec49ea5c408bf784e6952a37526de9e77e6c39b9a4ea3b950c3fda44e7f973b8
-
C:\Users\Admin\AppData\Local\Temp\RunIt.exeFilesize
143KB
MD5d067619856f7f3079375960f62b99369
SHA1964d548557dec3aa8e851526b71adca4b4ddbfd5
SHA2569770561d2a27dbc16c230fe88af51f718d7d6274fcd63a3f109c381be848b4a9
SHA5121ec891082ac133833217ce8314f6d163451c5554b789cbf8a5ff0d5ebd0b55a7ec49ea5c408bf784e6952a37526de9e77e6c39b9a4ea3b950c3fda44e7f973b8
-
C:\Users\Admin\AppData\Local\Temp\sex.exeFilesize
45KB
MD5638cb409c295f9f8e9344253974bbee9
SHA10bee4c240d141f5ed41caa8cd3d4417c551240b9
SHA2560551b731ffdcd6265f0ae3cfe686df6f5dff0d6659d022e280b4d5e88fa3cd78
SHA512d4322b2fa2a7e8706bdc29061f1c6b08c481da300d39a24902a6ddabe58978824627e0f828c6cbd74423e9b878a15b00c739a83c4cfd4fef62f603b9bb04b97d
-
C:\Users\Admin\AppData\Local\Temp\sex.exeFilesize
45KB
MD5638cb409c295f9f8e9344253974bbee9
SHA10bee4c240d141f5ed41caa8cd3d4417c551240b9
SHA2560551b731ffdcd6265f0ae3cfe686df6f5dff0d6659d022e280b4d5e88fa3cd78
SHA512d4322b2fa2a7e8706bdc29061f1c6b08c481da300d39a24902a6ddabe58978824627e0f828c6cbd74423e9b878a15b00c739a83c4cfd4fef62f603b9bb04b97d
-
memory/2688-140-0x0000000000670000-0x0000000000682000-memory.dmpFilesize
72KB
-
memory/2688-134-0x0000000000000000-mapping.dmp
-
memory/2688-146-0x0000000005070000-0x00000000050D6000-memory.dmpFilesize
408KB
-
memory/3444-135-0x0000000000000000-mapping.dmp
-
memory/3444-141-0x00000000003F0000-0x000000000041A000-memory.dmpFilesize
168KB
-
memory/3444-142-0x0000000005430000-0x00000000059D4000-memory.dmpFilesize
5.6MB
-
memory/3444-143-0x0000000004F20000-0x0000000004FB2000-memory.dmpFilesize
584KB
-
memory/3444-144-0x0000000005040000-0x00000000050DC000-memory.dmpFilesize
624KB
-
memory/3444-145-0x0000000004FD0000-0x0000000004FDA000-memory.dmpFilesize
40KB
-
memory/4776-133-0x00007FFC86D70000-0x00007FFC87831000-memory.dmpFilesize
10.8MB
-
memory/4776-132-0x00000000009C0000-0x0000000000A08000-memory.dmpFilesize
288KB
-
memory/4776-147-0x00007FFC86D70000-0x00007FFC87831000-memory.dmpFilesize
10.8MB