Analysis

  • max time kernel
    31s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    21/03/2023, 01:56

General

  • Target

    1c0a8ab60132cd737b83b2c9b502dfb2d5e3cf14174cc84e422ca1d19277202b.exe

  • Size

    649KB

  • MD5

    e57213cd46e7e86a091b28a16a75ff63

  • SHA1

    530fc3194363f8aa63559a88f896aad76fdf2eda

  • SHA256

    1c0a8ab60132cd737b83b2c9b502dfb2d5e3cf14174cc84e422ca1d19277202b

  • SHA512

    285bea0686ee38221907a42bb97e3c4ab3eaf9a7b1e6ac4e352e1e1de6232e79a3662705c65e895a7a0779fc4c1d1477d90d94fe0e12cb7963737f6d2c644d05

  • SSDEEP

    12288:NcrNS33L10QdrXjcDnFGUlwKjykzxvsULnXhzl4uZBKhmjleQKetoaLm/:wNA3R5drXoDFH9jdFz7xzCwKWlBtoaL4

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Mnock

C2

mooroopecamroy.sytes.net:1452

mooroopecamroy.sytes.net:1432

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    crssi.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Async RAT payload 3 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 7 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c0a8ab60132cd737b83b2c9b502dfb2d5e3cf14174cc84e422ca1d19277202b.exe
    "C:\Users\Admin\AppData\Local\Temp\1c0a8ab60132cd737b83b2c9b502dfb2d5e3cf14174cc84e422ca1d19277202b.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1772
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\miychjo.cmd" "
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1368
      • C:\Users\Admin\AppData\Local\Temp\isdgdsf.sfx.exe
        isdgdsf.sfx.exe -dC:\Users\Admin\AppData\Local\Temp -pafugBtrfapofdgatdbjfthfegdyddfbshhheuyhdqbookqcaszjnhdeekefhhddghdgvxcVohobthtigdge
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1516
        • C:\Users\Admin\AppData\Local\Temp\isdgdsf.exe
          "C:\Users\Admin\AppData\Local\Temp\isdgdsf.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:576
          • C:\Users\Admin\AppData\Local\Temp\isdgdsf.exe
            C:\Users\Admin\AppData\Local\Temp\isdgdsf.exe
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1580
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "crssi" /tr '"C:\Users\Admin\AppData\Roaming\crssi.exe"' & exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1528
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /create /f /sc onlogon /rl highest /tn "crssi" /tr '"C:\Users\Admin\AppData\Roaming\crssi.exe"'
                7⤵
                • Creates scheduled task(s)
                PID:1968
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp1A17.tmp.bat""
              6⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1724
              • C:\Windows\SysWOW64\timeout.exe
                timeout 3
                7⤵
                • Delays execution with timeout.exe
                PID:1656
              • C:\Users\Admin\AppData\Roaming\crssi.exe
                "C:\Users\Admin\AppData\Roaming\crssi.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1108
                • C:\Users\Admin\AppData\Roaming\crssi.exe
                  C:\Users\Admin\AppData\Roaming\crssi.exe
                  8⤵
                  • Executes dropped EXE
                  PID:820
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:1248

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\isdgdsf.exe

    Filesize

    227KB

    MD5

    fa8a43024023f81bcace81c68c3bd113

    SHA1

    87bf0587d19a57a3f731580a3d90882783152038

    SHA256

    d8fdf0f6da06b4a581200851ae1b0cdefcacc6debde5ea5b3867de22caa6fa6c

    SHA512

    aeb124dace247b976b6d6a94931d4dd45fd79056189790ae8bae4507ded2043a0365143afba6ca8af4a8b2e627ec32d7a235171ec0f538fa6e4064b1d74c9d33

  • C:\Users\Admin\AppData\Local\Temp\isdgdsf.exe

    Filesize

    227KB

    MD5

    fa8a43024023f81bcace81c68c3bd113

    SHA1

    87bf0587d19a57a3f731580a3d90882783152038

    SHA256

    d8fdf0f6da06b4a581200851ae1b0cdefcacc6debde5ea5b3867de22caa6fa6c

    SHA512

    aeb124dace247b976b6d6a94931d4dd45fd79056189790ae8bae4507ded2043a0365143afba6ca8af4a8b2e627ec32d7a235171ec0f538fa6e4064b1d74c9d33

  • C:\Users\Admin\AppData\Local\Temp\isdgdsf.exe

    Filesize

    227KB

    MD5

    fa8a43024023f81bcace81c68c3bd113

    SHA1

    87bf0587d19a57a3f731580a3d90882783152038

    SHA256

    d8fdf0f6da06b4a581200851ae1b0cdefcacc6debde5ea5b3867de22caa6fa6c

    SHA512

    aeb124dace247b976b6d6a94931d4dd45fd79056189790ae8bae4507ded2043a0365143afba6ca8af4a8b2e627ec32d7a235171ec0f538fa6e4064b1d74c9d33

  • C:\Users\Admin\AppData\Local\Temp\isdgdsf.exe

    Filesize

    227KB

    MD5

    fa8a43024023f81bcace81c68c3bd113

    SHA1

    87bf0587d19a57a3f731580a3d90882783152038

    SHA256

    d8fdf0f6da06b4a581200851ae1b0cdefcacc6debde5ea5b3867de22caa6fa6c

    SHA512

    aeb124dace247b976b6d6a94931d4dd45fd79056189790ae8bae4507ded2043a0365143afba6ca8af4a8b2e627ec32d7a235171ec0f538fa6e4064b1d74c9d33

  • C:\Users\Admin\AppData\Local\Temp\isdgdsf.sfx.exe

    Filesize

    461KB

    MD5

    b1ee1ffa82722a9780001f272f455f8a

    SHA1

    e0a251d7694d5f0aa243c5f833e1f3a4de63e571

    SHA256

    63382ae32e99dc17d18e7067d44a4cbc5b6a0fac4f0f66e9531fa6dc3839593d

    SHA512

    15ed6d31bd9cd1bd1b44f555368518244b143e4a8388c767c49909debcb2861601c30e08bfb129f7d5227910c9cc552e5ddbed6e0b9283d8aaeae6eee75ea369

  • C:\Users\Admin\AppData\Local\Temp\isdgdsf.sfx.exe

    Filesize

    461KB

    MD5

    b1ee1ffa82722a9780001f272f455f8a

    SHA1

    e0a251d7694d5f0aa243c5f833e1f3a4de63e571

    SHA256

    63382ae32e99dc17d18e7067d44a4cbc5b6a0fac4f0f66e9531fa6dc3839593d

    SHA512

    15ed6d31bd9cd1bd1b44f555368518244b143e4a8388c767c49909debcb2861601c30e08bfb129f7d5227910c9cc552e5ddbed6e0b9283d8aaeae6eee75ea369

  • C:\Users\Admin\AppData\Local\Temp\miychjo.cmd

    Filesize

    10KB

    MD5

    87adf72d3426e9082f7ce47d1d4477a3

    SHA1

    e7d42a7a2a965e61d6b4a84f3fa839b0aec60ec0

    SHA256

    12c1057bee97bc8e7c98dc5f1596c55a8ab0b004ac4e73298c439606af3f3490

    SHA512

    2424858b442b05d02b181e9ce517a2c1bb526c16d8a80acb3987d064a3f891ec1c5a391edcc362636cf3acf1b423cc63157b9f1966a0cd60b379a4ac0dc8cd05

  • C:\Users\Admin\AppData\Local\Temp\miychjo.cmd

    Filesize

    10KB

    MD5

    87adf72d3426e9082f7ce47d1d4477a3

    SHA1

    e7d42a7a2a965e61d6b4a84f3fa839b0aec60ec0

    SHA256

    12c1057bee97bc8e7c98dc5f1596c55a8ab0b004ac4e73298c439606af3f3490

    SHA512

    2424858b442b05d02b181e9ce517a2c1bb526c16d8a80acb3987d064a3f891ec1c5a391edcc362636cf3acf1b423cc63157b9f1966a0cd60b379a4ac0dc8cd05

  • C:\Users\Admin\AppData\Local\Temp\odSwift.jpg

    Filesize

    46KB

    MD5

    57cbd6c513298c42618373a0f752460a

    SHA1

    3dd60b7e98d93f4c2b0b7aa11b9bba3708a5e5c6

    SHA256

    c58d4f70b28185fad7a7411f08731c13ab5c19decad07fc2e422090c090268c2

    SHA512

    0624fe01af7f450b5ed5aef39e1678d66642de0a07edcce74a801a2051e62c7a5d2c057cf6e4b549122583df8f618ecddb81e23200187fecfd7695061fd9d68c

  • C:\Users\Admin\AppData\Local\Temp\tmp1A17.tmp.bat

    Filesize

    149B

    MD5

    a27a77cade7f6148b77c8d09584f5419

    SHA1

    2454481e2988ab0d668ae9c7a480b49156a25886

    SHA256

    ea13269420b96f623bc175b025f17f170a5bea9d0f849b07fe8dedbacd3600cd

    SHA512

    4b11fc93ddc48c6372984d97a2ddbe72d7f99cff20da3e4d066b026ff712d6365bfb1b35113fee93192b604c7208586ccf1ef2e1d023ecc9d54e54065dd95d2a

  • C:\Users\Admin\AppData\Local\Temp\tmp1A17.tmp.bat

    Filesize

    149B

    MD5

    a27a77cade7f6148b77c8d09584f5419

    SHA1

    2454481e2988ab0d668ae9c7a480b49156a25886

    SHA256

    ea13269420b96f623bc175b025f17f170a5bea9d0f849b07fe8dedbacd3600cd

    SHA512

    4b11fc93ddc48c6372984d97a2ddbe72d7f99cff20da3e4d066b026ff712d6365bfb1b35113fee93192b604c7208586ccf1ef2e1d023ecc9d54e54065dd95d2a

  • C:\Users\Admin\AppData\Roaming\crssi.exe

    Filesize

    227KB

    MD5

    fa8a43024023f81bcace81c68c3bd113

    SHA1

    87bf0587d19a57a3f731580a3d90882783152038

    SHA256

    d8fdf0f6da06b4a581200851ae1b0cdefcacc6debde5ea5b3867de22caa6fa6c

    SHA512

    aeb124dace247b976b6d6a94931d4dd45fd79056189790ae8bae4507ded2043a0365143afba6ca8af4a8b2e627ec32d7a235171ec0f538fa6e4064b1d74c9d33

  • C:\Users\Admin\AppData\Roaming\crssi.exe

    Filesize

    227KB

    MD5

    fa8a43024023f81bcace81c68c3bd113

    SHA1

    87bf0587d19a57a3f731580a3d90882783152038

    SHA256

    d8fdf0f6da06b4a581200851ae1b0cdefcacc6debde5ea5b3867de22caa6fa6c

    SHA512

    aeb124dace247b976b6d6a94931d4dd45fd79056189790ae8bae4507ded2043a0365143afba6ca8af4a8b2e627ec32d7a235171ec0f538fa6e4064b1d74c9d33

  • C:\Users\Admin\AppData\Roaming\crssi.exe

    Filesize

    227KB

    MD5

    fa8a43024023f81bcace81c68c3bd113

    SHA1

    87bf0587d19a57a3f731580a3d90882783152038

    SHA256

    d8fdf0f6da06b4a581200851ae1b0cdefcacc6debde5ea5b3867de22caa6fa6c

    SHA512

    aeb124dace247b976b6d6a94931d4dd45fd79056189790ae8bae4507ded2043a0365143afba6ca8af4a8b2e627ec32d7a235171ec0f538fa6e4064b1d74c9d33

  • \Users\Admin\AppData\Local\Temp\isdgdsf.exe

    Filesize

    227KB

    MD5

    fa8a43024023f81bcace81c68c3bd113

    SHA1

    87bf0587d19a57a3f731580a3d90882783152038

    SHA256

    d8fdf0f6da06b4a581200851ae1b0cdefcacc6debde5ea5b3867de22caa6fa6c

    SHA512

    aeb124dace247b976b6d6a94931d4dd45fd79056189790ae8bae4507ded2043a0365143afba6ca8af4a8b2e627ec32d7a235171ec0f538fa6e4064b1d74c9d33

  • \Users\Admin\AppData\Local\Temp\isdgdsf.exe

    Filesize

    227KB

    MD5

    fa8a43024023f81bcace81c68c3bd113

    SHA1

    87bf0587d19a57a3f731580a3d90882783152038

    SHA256

    d8fdf0f6da06b4a581200851ae1b0cdefcacc6debde5ea5b3867de22caa6fa6c

    SHA512

    aeb124dace247b976b6d6a94931d4dd45fd79056189790ae8bae4507ded2043a0365143afba6ca8af4a8b2e627ec32d7a235171ec0f538fa6e4064b1d74c9d33

  • \Users\Admin\AppData\Local\Temp\isdgdsf.exe

    Filesize

    227KB

    MD5

    fa8a43024023f81bcace81c68c3bd113

    SHA1

    87bf0587d19a57a3f731580a3d90882783152038

    SHA256

    d8fdf0f6da06b4a581200851ae1b0cdefcacc6debde5ea5b3867de22caa6fa6c

    SHA512

    aeb124dace247b976b6d6a94931d4dd45fd79056189790ae8bae4507ded2043a0365143afba6ca8af4a8b2e627ec32d7a235171ec0f538fa6e4064b1d74c9d33

  • \Users\Admin\AppData\Local\Temp\isdgdsf.exe

    Filesize

    227KB

    MD5

    fa8a43024023f81bcace81c68c3bd113

    SHA1

    87bf0587d19a57a3f731580a3d90882783152038

    SHA256

    d8fdf0f6da06b4a581200851ae1b0cdefcacc6debde5ea5b3867de22caa6fa6c

    SHA512

    aeb124dace247b976b6d6a94931d4dd45fd79056189790ae8bae4507ded2043a0365143afba6ca8af4a8b2e627ec32d7a235171ec0f538fa6e4064b1d74c9d33

  • \Users\Admin\AppData\Local\Temp\isdgdsf.exe

    Filesize

    227KB

    MD5

    fa8a43024023f81bcace81c68c3bd113

    SHA1

    87bf0587d19a57a3f731580a3d90882783152038

    SHA256

    d8fdf0f6da06b4a581200851ae1b0cdefcacc6debde5ea5b3867de22caa6fa6c

    SHA512

    aeb124dace247b976b6d6a94931d4dd45fd79056189790ae8bae4507ded2043a0365143afba6ca8af4a8b2e627ec32d7a235171ec0f538fa6e4064b1d74c9d33

  • \Users\Admin\AppData\Local\Temp\isdgdsf.sfx.exe

    Filesize

    461KB

    MD5

    b1ee1ffa82722a9780001f272f455f8a

    SHA1

    e0a251d7694d5f0aa243c5f833e1f3a4de63e571

    SHA256

    63382ae32e99dc17d18e7067d44a4cbc5b6a0fac4f0f66e9531fa6dc3839593d

    SHA512

    15ed6d31bd9cd1bd1b44f555368518244b143e4a8388c767c49909debcb2861601c30e08bfb129f7d5227910c9cc552e5ddbed6e0b9283d8aaeae6eee75ea369

  • \Users\Admin\AppData\Roaming\crssi.exe

    Filesize

    227KB

    MD5

    fa8a43024023f81bcace81c68c3bd113

    SHA1

    87bf0587d19a57a3f731580a3d90882783152038

    SHA256

    d8fdf0f6da06b4a581200851ae1b0cdefcacc6debde5ea5b3867de22caa6fa6c

    SHA512

    aeb124dace247b976b6d6a94931d4dd45fd79056189790ae8bae4507ded2043a0365143afba6ca8af4a8b2e627ec32d7a235171ec0f538fa6e4064b1d74c9d33

  • memory/576-96-0x0000000001310000-0x000000000134E000-memory.dmp

    Filesize

    248KB

  • memory/576-99-0x0000000000740000-0x0000000000780000-memory.dmp

    Filesize

    256KB

  • memory/576-98-0x0000000000390000-0x00000000003CC000-memory.dmp

    Filesize

    240KB

  • memory/576-100-0x00000000003D0000-0x00000000003D6000-memory.dmp

    Filesize

    24KB

  • memory/576-97-0x0000000000380000-0x0000000000386000-memory.dmp

    Filesize

    24KB

  • memory/1108-122-0x0000000001250000-0x000000000128E000-memory.dmp

    Filesize

    248KB

  • memory/1108-123-0x0000000001120000-0x0000000001160000-memory.dmp

    Filesize

    256KB

  • memory/1248-78-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/1248-61-0x0000000000100000-0x0000000000102000-memory.dmp

    Filesize

    8KB

  • memory/1248-126-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/1580-109-0x0000000004E50000-0x0000000004E90000-memory.dmp

    Filesize

    256KB

  • memory/1580-107-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/1580-102-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/1580-105-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/1772-60-0x00000000024E0000-0x00000000024E2000-memory.dmp

    Filesize

    8KB