Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    31-01-2023 08:56

General

  • Target

    915218971d799dd8d84bcf104a727d40f5bea6456ea20d93d97bcd9e771dabf6.exe

  • Size

    550KB

  • MD5

    a47355c5131e669569fd038d40ec3b30

  • SHA1

    5c8069a1ee5a606b8c8614606e63c73abaf9d20b

  • SHA256

    915218971d799dd8d84bcf104a727d40f5bea6456ea20d93d97bcd9e771dabf6

  • SHA512

    6bad6ee4e622273fd67d369a27e8f25cffbc5e38587345cb93597ade4c58225de8245d31cf30edd6a17616b75d5d05c6e8497d4687e0a5d1ea647568bfc81a0f

  • SSDEEP

    12288:Is7nq0Xp2iNUWgMlSYtz8L6guw4YXxtaXryOxRNAeINEFgvMIr:31bfoL342xta3N6

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

192.3.193.136:2023

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Async RAT payload 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\915218971d799dd8d84bcf104a727d40f5bea6456ea20d93d97bcd9e771dabf6.exe
    "C:\Users\Admin\AppData\Local\Temp\915218971d799dd8d84bcf104a727d40f5bea6456ea20d93d97bcd9e771dabf6.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\FOIDdkTkLgtC.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1044
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FOIDdkTkLgtC" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB8C5.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:1168
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
        PID:1384

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmpB8C5.tmp
      Filesize

      1KB

      MD5

      2ba5bde9c5ca6e3807a8dc5f7f3a8f59

      SHA1

      c4c56b989b2fd61611d25a147b6d337fd51aed7d

      SHA256

      1b9576dedbfe9cbf6c11c636f709de097af8552267c5bc56819606201880d0e9

      SHA512

      c5e1a805014a4252087a2e9173ca996af684172467f6cec0574c1336e99a54b9472a0075524921231fd2fc66597fa2e7defff2fb8168bd3b4985db7c3214afa5

    • memory/1044-59-0x0000000000000000-mapping.dmp
    • memory/1044-76-0x000000006EE20000-0x000000006F3CB000-memory.dmp
      Filesize

      5.7MB

    • memory/1044-75-0x000000006EE20000-0x000000006F3CB000-memory.dmp
      Filesize

      5.7MB

    • memory/1168-60-0x0000000000000000-mapping.dmp
    • memory/1384-74-0x0000000000400000-0x0000000000412000-memory.dmp
      Filesize

      72KB

    • memory/1384-72-0x0000000000400000-0x0000000000412000-memory.dmp
      Filesize

      72KB

    • memory/1384-69-0x0000000000400000-0x0000000000412000-memory.dmp
      Filesize

      72KB

    • memory/1384-70-0x000000000040C72E-mapping.dmp
    • memory/1384-64-0x0000000000400000-0x0000000000412000-memory.dmp
      Filesize

      72KB

    • memory/1384-65-0x0000000000400000-0x0000000000412000-memory.dmp
      Filesize

      72KB

    • memory/1384-67-0x0000000000400000-0x0000000000412000-memory.dmp
      Filesize

      72KB

    • memory/1384-68-0x0000000000400000-0x0000000000412000-memory.dmp
      Filesize

      72KB

    • memory/1696-58-0x0000000005100000-0x000000000514E000-memory.dmp
      Filesize

      312KB

    • memory/1696-63-0x0000000004EB0000-0x0000000004EC2000-memory.dmp
      Filesize

      72KB

    • memory/1696-54-0x0000000000D20000-0x0000000000DB0000-memory.dmp
      Filesize

      576KB

    • memory/1696-57-0x0000000000600000-0x000000000060A000-memory.dmp
      Filesize

      40KB

    • memory/1696-56-0x0000000000430000-0x0000000000440000-memory.dmp
      Filesize

      64KB

    • memory/1696-55-0x0000000076931000-0x0000000076933000-memory.dmp
      Filesize

      8KB