Analysis

  • max time kernel
    149s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    29-01-2023 21:28

General

  • Target

    6815ff5dc021df4556f774108073648ca9191f7634c9fca94707d54ef686ee38.exe

  • Size

    195KB

  • MD5

    66a167b944c4ea45a207f551e2c9fc28

  • SHA1

    88703c2bf165899ec004dab9f5f273c46a8d286c

  • SHA256

    6815ff5dc021df4556f774108073648ca9191f7634c9fca94707d54ef686ee38

  • SHA512

    89d647f0593518fa63976e168588c41bacd91bd6be59550e535a27ca7d817f29705830ce5ad3810a76096934d66216afb3f4f670309c102f1f4c496027969370

  • SSDEEP

    1536:hu0Fi41HYlZuIyPGSRfxp6kghBtdhv/oOK5XjJwkA1MmnQTNSbgjxAAnieghr4Dq:huTnaYfshPPD74Jo50093FFd7GEawuJ

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

ValentinMihai-48225.portmap.io:48225=>7119:48225

ValentinMihai-48225.portmap.io:48225=>7119:7119

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    Windows Defender SmartScreen.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Async RAT payload 7 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6815ff5dc021df4556f774108073648ca9191f7634c9fca94707d54ef686ee38.exe
    "C:\Users\Admin\AppData\Local\Temp\6815ff5dc021df4556f774108073648ca9191f7634c9fca94707d54ef686ee38.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:956
    • C:\Users\Admin\AppData\Local\build.exe
      "C:\Users\Admin\AppData\Local\build.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:876
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Windows Defender SmartScreen" /tr '"C:\Users\Admin\AppData\Roaming\Windows Defender SmartScreen.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1940
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn "Windows Defender SmartScreen" /tr '"C:\Users\Admin\AppData\Roaming\Windows Defender SmartScreen.exe"'
          4⤵
          • Creates scheduled task(s)
          PID:1652
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp80A5.tmp.bat""
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1172
        • C:\Windows\SysWOW64\timeout.exe
          timeout 3
          4⤵
          • Delays execution with timeout.exe
          PID:1640
        • C:\Users\Admin\AppData\Roaming\Windows Defender SmartScreen.exe
          "C:\Users\Admin\AppData\Roaming\Windows Defender SmartScreen.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1632

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp80A5.tmp.bat
    Filesize

    172B

    MD5

    d2c5de9c0aaa4fd55b4ebc0626cfa6b5

    SHA1

    bbc7c9ce3bd9e1b2299595d31ba570afb6717bbb

    SHA256

    54ad0ad5590508bfe7c51723427422ec9196dc3a7542ecc02f16e1d45a30bcdf

    SHA512

    18a0be4bb5f14b9700236de7c22661e03f7e7e8748af31c7ebb107f53f9e8e11224e3dc05beefec42c80bdf929338870b354adefd671baebf1b8327432d5926d

  • C:\Users\Admin\AppData\Local\build.exe
    Filesize

    47KB

    MD5

    20f0a4c172d05e4c9409dfe2dd8f773f

    SHA1

    39af4d0c658263df11c6b9951fa5336b1bedd817

    SHA256

    2dcecfb77772e8dc0b56d6421aa0f782fabe4d1730f29880bfd3edfee98bdc5f

    SHA512

    406dcc9775a66db15e99ea9db277ccdbc15b6f86e09ce0e0ac45cdbb2218ee2440117430574c1aed5c42b28d47a8a997d27221b5e0c1021b722f826858fb43f8

  • C:\Users\Admin\AppData\Local\build.exe
    Filesize

    47KB

    MD5

    20f0a4c172d05e4c9409dfe2dd8f773f

    SHA1

    39af4d0c658263df11c6b9951fa5336b1bedd817

    SHA256

    2dcecfb77772e8dc0b56d6421aa0f782fabe4d1730f29880bfd3edfee98bdc5f

    SHA512

    406dcc9775a66db15e99ea9db277ccdbc15b6f86e09ce0e0ac45cdbb2218ee2440117430574c1aed5c42b28d47a8a997d27221b5e0c1021b722f826858fb43f8

  • C:\Users\Admin\AppData\Roaming\Windows Defender SmartScreen.exe
    Filesize

    47KB

    MD5

    20f0a4c172d05e4c9409dfe2dd8f773f

    SHA1

    39af4d0c658263df11c6b9951fa5336b1bedd817

    SHA256

    2dcecfb77772e8dc0b56d6421aa0f782fabe4d1730f29880bfd3edfee98bdc5f

    SHA512

    406dcc9775a66db15e99ea9db277ccdbc15b6f86e09ce0e0ac45cdbb2218ee2440117430574c1aed5c42b28d47a8a997d27221b5e0c1021b722f826858fb43f8

  • C:\Users\Admin\AppData\Roaming\Windows Defender SmartScreen.exe
    Filesize

    47KB

    MD5

    20f0a4c172d05e4c9409dfe2dd8f773f

    SHA1

    39af4d0c658263df11c6b9951fa5336b1bedd817

    SHA256

    2dcecfb77772e8dc0b56d6421aa0f782fabe4d1730f29880bfd3edfee98bdc5f

    SHA512

    406dcc9775a66db15e99ea9db277ccdbc15b6f86e09ce0e0ac45cdbb2218ee2440117430574c1aed5c42b28d47a8a997d27221b5e0c1021b722f826858fb43f8

  • \Users\Admin\AppData\Roaming\Windows Defender SmartScreen.exe
    Filesize

    47KB

    MD5

    20f0a4c172d05e4c9409dfe2dd8f773f

    SHA1

    39af4d0c658263df11c6b9951fa5336b1bedd817

    SHA256

    2dcecfb77772e8dc0b56d6421aa0f782fabe4d1730f29880bfd3edfee98bdc5f

    SHA512

    406dcc9775a66db15e99ea9db277ccdbc15b6f86e09ce0e0ac45cdbb2218ee2440117430574c1aed5c42b28d47a8a997d27221b5e0c1021b722f826858fb43f8

  • memory/876-58-0x0000000000B90000-0x0000000000BA2000-memory.dmp
    Filesize

    72KB

  • memory/876-59-0x0000000075891000-0x0000000075893000-memory.dmp
    Filesize

    8KB

  • memory/876-55-0x0000000000000000-mapping.dmp
  • memory/956-54-0x0000000000110000-0x0000000000148000-memory.dmp
    Filesize

    224KB

  • memory/1172-61-0x0000000000000000-mapping.dmp
  • memory/1632-67-0x0000000000000000-mapping.dmp
  • memory/1632-69-0x0000000001330000-0x0000000001342000-memory.dmp
    Filesize

    72KB

  • memory/1640-63-0x0000000000000000-mapping.dmp
  • memory/1652-64-0x0000000000000000-mapping.dmp
  • memory/1940-60-0x0000000000000000-mapping.dmp