Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
18-02-2023 05:28
Static task
static1
Behavioral task
behavioral1
Sample
FUDSilentCrypt.exe
Resource
win7-20220812-en
General
-
Target
FUDSilentCrypt.exe
-
Size
53.0MB
-
MD5
377475407f594a9a3054c3b012b52889
-
SHA1
aab2a193aae478408be5b41f9c24a4d7e7ecf5ff
-
SHA256
73da672e9c1adc2e13625aeb89bcc6f78382ff96ee41c25a6ccb817bc65e8521
-
SHA512
68bce781a24c83713747695a6e19cd38b6066eb8c4866ca91c668190abf07aa99ac07e63059ae0b3c4564b1f7f97c0b818378ff2a2458b9100ef4597db68c89b
-
SSDEEP
6144:Ih0CzEeWuPeZ3NUMOnpTdioT2NeLGp/uwONct43+4gU:W9zEGPeZ3Megce6pGHNu47gU
Malware Config
Extracted
asyncrat
0.5.7B
Default
194.49.94.163:6606
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
RuntimeService.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 7 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Payload.exe asyncrat C:\Users\Admin\AppData\Local\Temp\Payload.exe asyncrat behavioral2/memory/4536-139-0x0000000000370000-0x0000000000382000-memory.dmp asyncrat C:\Users\Admin\AppData\Roaming\RuntimeService.exe asyncrat C:\Users\Admin\AppData\Roaming\RuntimeService.exe asyncrat C:\Users\Admin\AppData\Local\Temp\Payload.exe asyncrat C:\Users\Admin\AppData\Local\Temp\Payload.exe asyncrat -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
FUDSilentCrypt.exePayload.exeRuntimeService.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FUDSilentCrypt.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Payload.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation RuntimeService.exe -
Executes dropped EXE 5 IoCs
Processes:
Payload.exeRuntimeService.exeRuntimeService.exePayload.exeRuntimeService.exepid process 4536 Payload.exe 1072 RuntimeService.exe 3208 RuntimeService.exe 1284 Payload.exe 3156 RuntimeService.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 2636 schtasks.exe 4288 schtasks.exe 2960 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1844 timeout.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
Processes:
Payload.exepid process 4536 Payload.exe 4536 Payload.exe 4536 Payload.exe 4536 Payload.exe 4536 Payload.exe 4536 Payload.exe 4536 Payload.exe 4536 Payload.exe 4536 Payload.exe 4536 Payload.exe 4536 Payload.exe 4536 Payload.exe 4536 Payload.exe 4536 Payload.exe 4536 Payload.exe 4536 Payload.exe 4536 Payload.exe 4536 Payload.exe 4536 Payload.exe 4536 Payload.exe 4536 Payload.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Payload.exeRuntimeService.exedescription pid process Token: SeDebugPrivilege 4536 Payload.exe Token: SeDebugPrivilege 1072 RuntimeService.exe -
Suspicious use of WriteProcessMemory 45 IoCs
Processes:
FUDSilentCrypt.execmd.exePayload.execmd.execmd.exeRuntimeService.execmd.exedescription pid process target process PID 2532 wrote to memory of 4536 2532 FUDSilentCrypt.exe Payload.exe PID 2532 wrote to memory of 4536 2532 FUDSilentCrypt.exe Payload.exe PID 2532 wrote to memory of 4536 2532 FUDSilentCrypt.exe Payload.exe PID 2532 wrote to memory of 3480 2532 FUDSilentCrypt.exe cmd.exe PID 2532 wrote to memory of 3480 2532 FUDSilentCrypt.exe cmd.exe PID 2532 wrote to memory of 3480 2532 FUDSilentCrypt.exe cmd.exe PID 2532 wrote to memory of 4692 2532 FUDSilentCrypt.exe cmd.exe PID 2532 wrote to memory of 4692 2532 FUDSilentCrypt.exe cmd.exe PID 2532 wrote to memory of 4692 2532 FUDSilentCrypt.exe cmd.exe PID 2532 wrote to memory of 2088 2532 FUDSilentCrypt.exe cmd.exe PID 2532 wrote to memory of 2088 2532 FUDSilentCrypt.exe cmd.exe PID 2532 wrote to memory of 2088 2532 FUDSilentCrypt.exe cmd.exe PID 4692 wrote to memory of 2636 4692 cmd.exe schtasks.exe PID 4692 wrote to memory of 2636 4692 cmd.exe schtasks.exe PID 4692 wrote to memory of 2636 4692 cmd.exe schtasks.exe PID 4536 wrote to memory of 2452 4536 Payload.exe cmd.exe PID 4536 wrote to memory of 2452 4536 Payload.exe cmd.exe PID 4536 wrote to memory of 2452 4536 Payload.exe cmd.exe PID 4536 wrote to memory of 1008 4536 Payload.exe cmd.exe PID 4536 wrote to memory of 1008 4536 Payload.exe cmd.exe PID 4536 wrote to memory of 1008 4536 Payload.exe cmd.exe PID 1008 wrote to memory of 1844 1008 cmd.exe timeout.exe PID 1008 wrote to memory of 1844 1008 cmd.exe timeout.exe PID 1008 wrote to memory of 1844 1008 cmd.exe timeout.exe PID 2452 wrote to memory of 4288 2452 cmd.exe schtasks.exe PID 2452 wrote to memory of 4288 2452 cmd.exe schtasks.exe PID 2452 wrote to memory of 4288 2452 cmd.exe schtasks.exe PID 1008 wrote to memory of 1072 1008 cmd.exe RuntimeService.exe PID 1008 wrote to memory of 1072 1008 cmd.exe RuntimeService.exe PID 1008 wrote to memory of 1072 1008 cmd.exe RuntimeService.exe PID 3208 wrote to memory of 1284 3208 RuntimeService.exe Payload.exe PID 3208 wrote to memory of 1284 3208 RuntimeService.exe Payload.exe PID 3208 wrote to memory of 1284 3208 RuntimeService.exe Payload.exe PID 3208 wrote to memory of 1256 3208 RuntimeService.exe cmd.exe PID 3208 wrote to memory of 1256 3208 RuntimeService.exe cmd.exe PID 3208 wrote to memory of 1256 3208 RuntimeService.exe cmd.exe PID 3208 wrote to memory of 1436 3208 RuntimeService.exe cmd.exe PID 3208 wrote to memory of 1436 3208 RuntimeService.exe cmd.exe PID 3208 wrote to memory of 1436 3208 RuntimeService.exe cmd.exe PID 3208 wrote to memory of 1676 3208 RuntimeService.exe cmd.exe PID 3208 wrote to memory of 1676 3208 RuntimeService.exe cmd.exe PID 3208 wrote to memory of 1676 3208 RuntimeService.exe cmd.exe PID 1436 wrote to memory of 2960 1436 cmd.exe schtasks.exe PID 1436 wrote to memory of 2960 1436 cmd.exe schtasks.exe PID 1436 wrote to memory of 2960 1436 cmd.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\FUDSilentCrypt.exe"C:\Users\Admin\AppData\Local\Temp\FUDSilentCrypt.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Payload.exe"C:\Users\Admin\AppData\Local\Temp\Payload.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "RuntimeService" /tr '"C:\Users\Admin\AppData\Roaming\RuntimeService.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "RuntimeService" /tr '"C:\Users\Admin\AppData\Roaming\RuntimeService.exe"'4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp5321.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\RuntimeService.exe"C:\Users\Admin\AppData\Roaming\RuntimeService.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\RuntimeService"2⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\RuntimeService\RuntimeService.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\RuntimeService\RuntimeService.exe'" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\FUDSilentCrypt.exe" "C:\Users\Admin\AppData\Roaming\RuntimeService\RuntimeService.exe"2⤵
-
C:\Users\Admin\AppData\Roaming\RuntimeService\RuntimeService.exeC:\Users\Admin\AppData\Roaming\RuntimeService\RuntimeService.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Payload.exe"C:\Users\Admin\AppData\Local\Temp\Payload.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\RuntimeService"2⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\RuntimeService\RuntimeService.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\RuntimeService\RuntimeService.exe'" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\RuntimeService\RuntimeService.exe" "C:\Users\Admin\AppData\Roaming\RuntimeService\RuntimeService.exe"2⤵
-
C:\Users\Admin\AppData\Roaming\RuntimeService\RuntimeService.exeC:\Users\Admin\AppData\Roaming\RuntimeService\RuntimeService.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Payload.exe.logFilesize
614B
MD554920f388010333559bdff225040761d
SHA1040972bf1fc83014f10c45832322c094f883ce30
SHA2569ed5449a36700939987209c7a2974b9cc669b8b22c7c4e7936f35dda0a4dc359
SHA512e17aa5d1328b3bfd3754d15b3c2eded98653d90c7b326f941522e0b3bd6f557880246a6bc69047facb42eb97d2e0ed6c46148dfe95a98669fc4e1d07c21a285c
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RuntimeService.exe.logFilesize
897B
MD59dbc3adfc8775fe4c552c3db86475f8e
SHA1ad7f64bdfeb6d7aa14362f9d3f95f621d3eee57d
SHA256a4e385e6475e7d3864441a655560adc3a91f407ed7d3e3f77a6a444d1f84889e
SHA5129b95a3a0d084dfc3707ee18b81d724e7ef30dad39ef9dbd394734fb0d4af8ddc609b92660d6105f6888ad7c192d82732106e8594cdd8b31a7acdaec50d902e1c
-
C:\Users\Admin\AppData\Local\Temp\Payload.exeFilesize
45KB
MD53dfaaf4e5b35b91fc538c9dc5c60b744
SHA1493e9bf280746ffb2e8e95c0e5c14bb031fc9548
SHA25665b334e703494d3e8594c706a128e13e0a6b06f4d4f822fa1553f82c161f986c
SHA51218b44f89ac4a7078c9a4bcb811f3ffe8276bb81ae6adebc30122ea5bb0a975dcca553b3f9580b51288c4d7c40191910c639a7b6a5474905833cf7305770c16b5
-
C:\Users\Admin\AppData\Local\Temp\Payload.exeFilesize
45KB
MD53dfaaf4e5b35b91fc538c9dc5c60b744
SHA1493e9bf280746ffb2e8e95c0e5c14bb031fc9548
SHA25665b334e703494d3e8594c706a128e13e0a6b06f4d4f822fa1553f82c161f986c
SHA51218b44f89ac4a7078c9a4bcb811f3ffe8276bb81ae6adebc30122ea5bb0a975dcca553b3f9580b51288c4d7c40191910c639a7b6a5474905833cf7305770c16b5
-
C:\Users\Admin\AppData\Local\Temp\Payload.exeFilesize
45KB
MD53dfaaf4e5b35b91fc538c9dc5c60b744
SHA1493e9bf280746ffb2e8e95c0e5c14bb031fc9548
SHA25665b334e703494d3e8594c706a128e13e0a6b06f4d4f822fa1553f82c161f986c
SHA51218b44f89ac4a7078c9a4bcb811f3ffe8276bb81ae6adebc30122ea5bb0a975dcca553b3f9580b51288c4d7c40191910c639a7b6a5474905833cf7305770c16b5
-
C:\Users\Admin\AppData\Local\Temp\Payload.exeFilesize
45KB
MD53dfaaf4e5b35b91fc538c9dc5c60b744
SHA1493e9bf280746ffb2e8e95c0e5c14bb031fc9548
SHA25665b334e703494d3e8594c706a128e13e0a6b06f4d4f822fa1553f82c161f986c
SHA51218b44f89ac4a7078c9a4bcb811f3ffe8276bb81ae6adebc30122ea5bb0a975dcca553b3f9580b51288c4d7c40191910c639a7b6a5474905833cf7305770c16b5
-
C:\Users\Admin\AppData\Local\Temp\tmp5321.tmp.batFilesize
158B
MD57070309dd520c4323a7696f3762e9970
SHA1477998f7c43e6fe6c13b41a51ca1fc3597ce3b11
SHA256ead576e672d0f0bcd384c01312b565fcaea7c46a2e601c74dc80705874a09531
SHA512c24e2ec98f006f58b7f99ad529168b05db1f12cbd421443f2db1efb28473da7eb52056f52bef9b5b6342469c8032adec496b7a1c5e27f50f39d6c9f111846003
-
C:\Users\Admin\AppData\Roaming\RuntimeService.exeFilesize
45KB
MD53dfaaf4e5b35b91fc538c9dc5c60b744
SHA1493e9bf280746ffb2e8e95c0e5c14bb031fc9548
SHA25665b334e703494d3e8594c706a128e13e0a6b06f4d4f822fa1553f82c161f986c
SHA51218b44f89ac4a7078c9a4bcb811f3ffe8276bb81ae6adebc30122ea5bb0a975dcca553b3f9580b51288c4d7c40191910c639a7b6a5474905833cf7305770c16b5
-
C:\Users\Admin\AppData\Roaming\RuntimeService.exeFilesize
45KB
MD53dfaaf4e5b35b91fc538c9dc5c60b744
SHA1493e9bf280746ffb2e8e95c0e5c14bb031fc9548
SHA25665b334e703494d3e8594c706a128e13e0a6b06f4d4f822fa1553f82c161f986c
SHA51218b44f89ac4a7078c9a4bcb811f3ffe8276bb81ae6adebc30122ea5bb0a975dcca553b3f9580b51288c4d7c40191910c639a7b6a5474905833cf7305770c16b5
-
C:\Users\Admin\AppData\Roaming\RuntimeService\RuntimeService.exeFilesize
53.0MB
MD5377475407f594a9a3054c3b012b52889
SHA1aab2a193aae478408be5b41f9c24a4d7e7ecf5ff
SHA25673da672e9c1adc2e13625aeb89bcc6f78382ff96ee41c25a6ccb817bc65e8521
SHA51268bce781a24c83713747695a6e19cd38b6066eb8c4866ca91c668190abf07aa99ac07e63059ae0b3c4564b1f7f97c0b818378ff2a2458b9100ef4597db68c89b
-
C:\Users\Admin\AppData\Roaming\RuntimeService\RuntimeService.exeFilesize
53.0MB
MD5377475407f594a9a3054c3b012b52889
SHA1aab2a193aae478408be5b41f9c24a4d7e7ecf5ff
SHA25673da672e9c1adc2e13625aeb89bcc6f78382ff96ee41c25a6ccb817bc65e8521
SHA51268bce781a24c83713747695a6e19cd38b6066eb8c4866ca91c668190abf07aa99ac07e63059ae0b3c4564b1f7f97c0b818378ff2a2458b9100ef4597db68c89b
-
C:\Users\Admin\AppData\Roaming\RuntimeService\RuntimeService.exeFilesize
53.0MB
MD5377475407f594a9a3054c3b012b52889
SHA1aab2a193aae478408be5b41f9c24a4d7e7ecf5ff
SHA25673da672e9c1adc2e13625aeb89bcc6f78382ff96ee41c25a6ccb817bc65e8521
SHA51268bce781a24c83713747695a6e19cd38b6066eb8c4866ca91c668190abf07aa99ac07e63059ae0b3c4564b1f7f97c0b818378ff2a2458b9100ef4597db68c89b
-
memory/1008-146-0x0000000000000000-mapping.dmp
-
memory/1072-150-0x0000000000000000-mapping.dmp
-
memory/1256-157-0x0000000000000000-mapping.dmp
-
memory/1284-155-0x0000000000000000-mapping.dmp
-
memory/1436-160-0x0000000000000000-mapping.dmp
-
memory/1676-161-0x0000000000000000-mapping.dmp
-
memory/1844-148-0x0000000000000000-mapping.dmp
-
memory/2088-142-0x0000000000000000-mapping.dmp
-
memory/2452-145-0x0000000000000000-mapping.dmp
-
memory/2532-135-0x0000000005110000-0x0000000005176000-memory.dmpFilesize
408KB
-
memory/2532-132-0x0000000000750000-0x000000000079A000-memory.dmpFilesize
296KB
-
memory/2532-133-0x0000000005580000-0x0000000005B24000-memory.dmpFilesize
5.6MB
-
memory/2532-134-0x0000000005070000-0x0000000005102000-memory.dmpFilesize
584KB
-
memory/2636-143-0x0000000000000000-mapping.dmp
-
memory/2960-162-0x0000000000000000-mapping.dmp
-
memory/3480-140-0x0000000000000000-mapping.dmp
-
memory/4288-149-0x0000000000000000-mapping.dmp
-
memory/4536-136-0x0000000000000000-mapping.dmp
-
memory/4536-139-0x0000000000370000-0x0000000000382000-memory.dmpFilesize
72KB
-
memory/4536-144-0x0000000005150000-0x00000000051EC000-memory.dmpFilesize
624KB
-
memory/4692-141-0x0000000000000000-mapping.dmp