Analysis
-
max time kernel
190s -
max time network
241s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-01-2023 21:29
Static task
static1
Behavioral task
behavioral1
Sample
3a617a7952e9ea3f03052844e4ed2e0262c937d5c62de5e1753ec23dbde3e4a2.exe
Resource
win7-20221111-en
General
-
Target
3a617a7952e9ea3f03052844e4ed2e0262c937d5c62de5e1753ec23dbde3e4a2.exe
-
Size
417KB
-
MD5
eba584dbe102dea11a92683e90bc5306
-
SHA1
3ec661ea74194a24a1468ea932c0f658bdf1080c
-
SHA256
3a617a7952e9ea3f03052844e4ed2e0262c937d5c62de5e1753ec23dbde3e4a2
-
SHA512
6d1f7874809b1416be371be2dbeefa79e0ecbaf782a2800c4a6b6537ef408d3f1c6d13842937dd055e5941d31d3884348d69d0d25a545e43bcd67e6ecadea4e1
-
SSDEEP
12288:NomltV+kni0u8wHEnjQHyUjCa9q9Zsdk:pKFHXj/9q9KS
Malware Config
Extracted
asyncrat
0.5.7B
Default
0.tcp.ngrok.io:6032
Asyn♦cMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_file
svchost.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1608-63-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1608-64-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1608-65-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1608-66-0x000000000040D07E-mapping.dmp asyncrat behavioral1/memory/1608-68-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1608-70-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
3a617a7952e9ea3f03052844e4ed2e0262c937d5c62de5e1753ec23dbde3e4a2.exedescription pid process target process PID 1480 set thread context of 1608 1480 3a617a7952e9ea3f03052844e4ed2e0262c937d5c62de5e1753ec23dbde3e4a2.exe MSBuild.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
3a617a7952e9ea3f03052844e4ed2e0262c937d5c62de5e1753ec23dbde3e4a2.exepid process 1480 3a617a7952e9ea3f03052844e4ed2e0262c937d5c62de5e1753ec23dbde3e4a2.exe 1480 3a617a7952e9ea3f03052844e4ed2e0262c937d5c62de5e1753ec23dbde3e4a2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
3a617a7952e9ea3f03052844e4ed2e0262c937d5c62de5e1753ec23dbde3e4a2.exedescription pid process Token: SeDebugPrivilege 1480 3a617a7952e9ea3f03052844e4ed2e0262c937d5c62de5e1753ec23dbde3e4a2.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
3a617a7952e9ea3f03052844e4ed2e0262c937d5c62de5e1753ec23dbde3e4a2.exedescription pid process target process PID 1480 wrote to memory of 1876 1480 3a617a7952e9ea3f03052844e4ed2e0262c937d5c62de5e1753ec23dbde3e4a2.exe schtasks.exe PID 1480 wrote to memory of 1876 1480 3a617a7952e9ea3f03052844e4ed2e0262c937d5c62de5e1753ec23dbde3e4a2.exe schtasks.exe PID 1480 wrote to memory of 1876 1480 3a617a7952e9ea3f03052844e4ed2e0262c937d5c62de5e1753ec23dbde3e4a2.exe schtasks.exe PID 1480 wrote to memory of 1876 1480 3a617a7952e9ea3f03052844e4ed2e0262c937d5c62de5e1753ec23dbde3e4a2.exe schtasks.exe PID 1480 wrote to memory of 1608 1480 3a617a7952e9ea3f03052844e4ed2e0262c937d5c62de5e1753ec23dbde3e4a2.exe MSBuild.exe PID 1480 wrote to memory of 1608 1480 3a617a7952e9ea3f03052844e4ed2e0262c937d5c62de5e1753ec23dbde3e4a2.exe MSBuild.exe PID 1480 wrote to memory of 1608 1480 3a617a7952e9ea3f03052844e4ed2e0262c937d5c62de5e1753ec23dbde3e4a2.exe MSBuild.exe PID 1480 wrote to memory of 1608 1480 3a617a7952e9ea3f03052844e4ed2e0262c937d5c62de5e1753ec23dbde3e4a2.exe MSBuild.exe PID 1480 wrote to memory of 1608 1480 3a617a7952e9ea3f03052844e4ed2e0262c937d5c62de5e1753ec23dbde3e4a2.exe MSBuild.exe PID 1480 wrote to memory of 1608 1480 3a617a7952e9ea3f03052844e4ed2e0262c937d5c62de5e1753ec23dbde3e4a2.exe MSBuild.exe PID 1480 wrote to memory of 1608 1480 3a617a7952e9ea3f03052844e4ed2e0262c937d5c62de5e1753ec23dbde3e4a2.exe MSBuild.exe PID 1480 wrote to memory of 1608 1480 3a617a7952e9ea3f03052844e4ed2e0262c937d5c62de5e1753ec23dbde3e4a2.exe MSBuild.exe PID 1480 wrote to memory of 1608 1480 3a617a7952e9ea3f03052844e4ed2e0262c937d5c62de5e1753ec23dbde3e4a2.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a617a7952e9ea3f03052844e4ed2e0262c937d5c62de5e1753ec23dbde3e4a2.exe"C:\Users\Admin\AppData\Local\Temp\3a617a7952e9ea3f03052844e4ed2e0262c937d5c62de5e1753ec23dbde3e4a2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QxJiZoTYrf" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1D32.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"{path}"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp1D32.tmpFilesize
1KB
MD5be66e3625568e5899701b1009b8935d5
SHA14d3da312d2a9303e177829015bc60ebbf9bd1047
SHA2562b1dcb73c4871e3e853181f6caacd3c23dca08630d946b2eacc5d9ca7be1239f
SHA5124ab7b35475afe81b833d0385adba1b3a75f98d253e217a987d1c4d3680c1f55bfd048fadfb87e734022fb8c1dcbf2fe3747639e31e1f6885adb4e02ed5596100
-
memory/1480-55-0x0000000076581000-0x0000000076583000-memory.dmpFilesize
8KB
-
memory/1480-56-0x0000000001DC0000-0x0000000001DD2000-memory.dmpFilesize
72KB
-
memory/1480-57-0x0000000000550000-0x000000000058E000-memory.dmpFilesize
248KB
-
memory/1480-54-0x00000000002B0000-0x0000000000320000-memory.dmpFilesize
448KB
-
memory/1608-60-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1608-61-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1608-63-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1608-64-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1608-65-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1608-66-0x000000000040D07E-mapping.dmp
-
memory/1608-68-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1608-70-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1876-58-0x0000000000000000-mapping.dmp