Analysis
-
max time kernel
60s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
17-02-2023 10:40
Static task
static1
Behavioral task
behavioral1
Sample
document_viewer.exe
Resource
win7-20221111-en
General
-
Target
document_viewer.exe
-
Size
580KB
-
MD5
bc1722ec205a1c5ed34b8766971fe608
-
SHA1
43ded76bf48088b7684879214ad4d66b58ef9a90
-
SHA256
325076c547bffb21683f5bc023739016ad025c0739a7e122aa7289fa91fc88c2
-
SHA512
9eee2a624c14281de538b34032457c53276c3dad67b89989e7f95a3e93dae05e87bda13791aa00d8928d4a9845879d164ff900084ad5a120db44e934b0f89465
-
SSDEEP
12288:bIqDSu4Dsv9thG2SEzak3cgH+/nSsYCrDl0wnhkDsv9t:MqDSu8gLY/nWiuY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.0
Default
179.43.142.197:5789
ncarwpqkcbklyda
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/296-71-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat behavioral1/memory/296-70-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat behavioral1/memory/296-72-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat behavioral1/memory/296-73-0x00000000004116AE-mapping.dmp asyncrat behavioral1/memory/296-75-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat behavioral1/memory/296-77-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat behavioral1/memory/296-83-0x00000000003E0000-0x00000000003EE000-memory.dmp asyncrat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
document_viewer.exedescription pid process target process PID 852 set thread context of 296 852 document_viewer.exe document_viewer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
document_viewer.exepowershell.exepowershell.exedocument_viewer.exepid process 852 document_viewer.exe 852 document_viewer.exe 852 document_viewer.exe 852 document_viewer.exe 1352 powershell.exe 780 powershell.exe 296 document_viewer.exe 296 document_viewer.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
document_viewer.exepowershell.exepowershell.exedocument_viewer.exedescription pid process Token: SeDebugPrivilege 852 document_viewer.exe Token: SeDebugPrivilege 1352 powershell.exe Token: SeDebugPrivilege 780 powershell.exe Token: SeDebugPrivilege 296 document_viewer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
document_viewer.exepid process 296 document_viewer.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
document_viewer.exedescription pid process target process PID 852 wrote to memory of 1352 852 document_viewer.exe powershell.exe PID 852 wrote to memory of 1352 852 document_viewer.exe powershell.exe PID 852 wrote to memory of 1352 852 document_viewer.exe powershell.exe PID 852 wrote to memory of 1352 852 document_viewer.exe powershell.exe PID 852 wrote to memory of 780 852 document_viewer.exe powershell.exe PID 852 wrote to memory of 780 852 document_viewer.exe powershell.exe PID 852 wrote to memory of 780 852 document_viewer.exe powershell.exe PID 852 wrote to memory of 780 852 document_viewer.exe powershell.exe PID 852 wrote to memory of 1984 852 document_viewer.exe schtasks.exe PID 852 wrote to memory of 1984 852 document_viewer.exe schtasks.exe PID 852 wrote to memory of 1984 852 document_viewer.exe schtasks.exe PID 852 wrote to memory of 1984 852 document_viewer.exe schtasks.exe PID 852 wrote to memory of 1844 852 document_viewer.exe document_viewer.exe PID 852 wrote to memory of 1844 852 document_viewer.exe document_viewer.exe PID 852 wrote to memory of 1844 852 document_viewer.exe document_viewer.exe PID 852 wrote to memory of 1844 852 document_viewer.exe document_viewer.exe PID 852 wrote to memory of 296 852 document_viewer.exe document_viewer.exe PID 852 wrote to memory of 296 852 document_viewer.exe document_viewer.exe PID 852 wrote to memory of 296 852 document_viewer.exe document_viewer.exe PID 852 wrote to memory of 296 852 document_viewer.exe document_viewer.exe PID 852 wrote to memory of 296 852 document_viewer.exe document_viewer.exe PID 852 wrote to memory of 296 852 document_viewer.exe document_viewer.exe PID 852 wrote to memory of 296 852 document_viewer.exe document_viewer.exe PID 852 wrote to memory of 296 852 document_viewer.exe document_viewer.exe PID 852 wrote to memory of 296 852 document_viewer.exe document_viewer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\document_viewer.exe"C:\Users\Admin\AppData\Local\Temp\document_viewer.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\document_viewer.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\sDCoBOTNA.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sDCoBOTNA" /XML "C:\Users\Admin\AppData\Local\Temp\tmpBFA8.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\document_viewer.exe"C:\Users\Admin\AppData\Local\Temp\document_viewer.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\document_viewer.exe"C:\Users\Admin\AppData\Local\Temp\document_viewer.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpBFA8.tmpFilesize
1KB
MD5a81475195bfdde24e01c6ed027e3897f
SHA179f538e823999fcf40173d20af80dfff524b997d
SHA2567f432a871ace64d8c379044affef674ac8cb36aa21f049d2768e3673cf3bef8b
SHA5123e4d16067caf26e9860c564040359852b5cef9b00bc08dc55213fbc0875aa4a26ca693cce0a48286a6c301a40424600023cff72deb17d773571c4db765228ba9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD5cb26ad56fd4a5325e33a27ec797b0b52
SHA107fa85b479aaf5f3f8cc5442a03bbfce01bdaff5
SHA256d0cfa8b72fc227b42e32cc495d575b23cd0152c2d5dbf6f0bc0fc013d465e826
SHA512b45ed029e0dc24b48db9fab9bebec83abeecd98f406f6838d436f503377b17dbcbadccd30f4ce80df95247707fe57d8d38a797919b2241ea3fb5c1198fbd2479
-
memory/296-77-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/296-72-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/296-68-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/296-71-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/296-83-0x00000000003E0000-0x00000000003EE000-memory.dmpFilesize
56KB
-
memory/296-75-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/296-70-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/296-73-0x00000000004116AE-mapping.dmp
-
memory/296-84-0x00000000005B0000-0x00000000005B8000-memory.dmpFilesize
32KB
-
memory/296-67-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/780-61-0x0000000000000000-mapping.dmp
-
memory/780-81-0x000000006DC20000-0x000000006E1CB000-memory.dmpFilesize
5.7MB
-
memory/780-79-0x000000006DC20000-0x000000006E1CB000-memory.dmpFilesize
5.7MB
-
memory/852-56-0x00000000003B0000-0x00000000003C4000-memory.dmpFilesize
80KB
-
memory/852-58-0x0000000005290000-0x00000000052F8000-memory.dmpFilesize
416KB
-
memory/852-66-0x0000000004AA0000-0x0000000004ABA000-memory.dmpFilesize
104KB
-
memory/852-54-0x0000000000830000-0x00000000008C8000-memory.dmpFilesize
608KB
-
memory/852-55-0x0000000075FF1000-0x0000000075FF3000-memory.dmpFilesize
8KB
-
memory/852-57-0x0000000000420000-0x000000000042C000-memory.dmpFilesize
48KB
-
memory/1352-80-0x000000006DC20000-0x000000006E1CB000-memory.dmpFilesize
5.7MB
-
memory/1352-82-0x000000006DC20000-0x000000006E1CB000-memory.dmpFilesize
5.7MB
-
memory/1352-59-0x0000000000000000-mapping.dmp
-
memory/1984-62-0x0000000000000000-mapping.dmp