Analysis
-
max time kernel
31s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
21/03/2023, 01:56
Static task
static1
Behavioral task
behavioral1
Sample
1c0a8ab60132cd737b83b2c9b502dfb2d5e3cf14174cc84e422ca1d19277202b.exe
Resource
win7-20230220-en
General
-
Target
1c0a8ab60132cd737b83b2c9b502dfb2d5e3cf14174cc84e422ca1d19277202b.exe
-
Size
649KB
-
MD5
e57213cd46e7e86a091b28a16a75ff63
-
SHA1
530fc3194363f8aa63559a88f896aad76fdf2eda
-
SHA256
1c0a8ab60132cd737b83b2c9b502dfb2d5e3cf14174cc84e422ca1d19277202b
-
SHA512
285bea0686ee38221907a42bb97e3c4ab3eaf9a7b1e6ac4e352e1e1de6232e79a3662705c65e895a7a0779fc4c1d1477d90d94fe0e12cb7963737f6d2c644d05
-
SSDEEP
12288:NcrNS33L10QdrXjcDnFGUlwKjykzxvsULnXhzl4uZBKhmjleQKetoaLm/:wNA3R5drXoDFH9jdFz7xzCwKWlBtoaL4
Malware Config
Extracted
asyncrat
0.5.7B
Mnock
mooroopecamroy.sytes.net:1452
mooroopecamroy.sytes.net:1432
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
crssi.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 3 IoCs
resource yara_rule behavioral1/memory/1580-102-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1580-105-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1580-107-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
Executes dropped EXE 5 IoCs
pid Process 1516 isdgdsf.sfx.exe 576 isdgdsf.exe 1580 isdgdsf.exe 1108 crssi.exe 820 crssi.exe -
Loads dropped DLL 7 IoCs
pid Process 1368 cmd.exe 1516 isdgdsf.sfx.exe 1516 isdgdsf.sfx.exe 1516 isdgdsf.sfx.exe 1516 isdgdsf.sfx.exe 576 isdgdsf.exe 1724 cmd.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 576 set thread context of 1580 576 isdgdsf.exe 33 PID 1108 set thread context of 820 1108 crssi.exe 42 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1968 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1656 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1580 isdgdsf.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 576 isdgdsf.exe Token: SeDebugPrivilege 1580 isdgdsf.exe Token: SeDebugPrivilege 1108 crssi.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1248 DllHost.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 1772 wrote to memory of 1368 1772 1c0a8ab60132cd737b83b2c9b502dfb2d5e3cf14174cc84e422ca1d19277202b.exe 29 PID 1772 wrote to memory of 1368 1772 1c0a8ab60132cd737b83b2c9b502dfb2d5e3cf14174cc84e422ca1d19277202b.exe 29 PID 1772 wrote to memory of 1368 1772 1c0a8ab60132cd737b83b2c9b502dfb2d5e3cf14174cc84e422ca1d19277202b.exe 29 PID 1772 wrote to memory of 1368 1772 1c0a8ab60132cd737b83b2c9b502dfb2d5e3cf14174cc84e422ca1d19277202b.exe 29 PID 1368 wrote to memory of 1516 1368 cmd.exe 31 PID 1368 wrote to memory of 1516 1368 cmd.exe 31 PID 1368 wrote to memory of 1516 1368 cmd.exe 31 PID 1368 wrote to memory of 1516 1368 cmd.exe 31 PID 1516 wrote to memory of 576 1516 isdgdsf.sfx.exe 32 PID 1516 wrote to memory of 576 1516 isdgdsf.sfx.exe 32 PID 1516 wrote to memory of 576 1516 isdgdsf.sfx.exe 32 PID 1516 wrote to memory of 576 1516 isdgdsf.sfx.exe 32 PID 576 wrote to memory of 1580 576 isdgdsf.exe 33 PID 576 wrote to memory of 1580 576 isdgdsf.exe 33 PID 576 wrote to memory of 1580 576 isdgdsf.exe 33 PID 576 wrote to memory of 1580 576 isdgdsf.exe 33 PID 576 wrote to memory of 1580 576 isdgdsf.exe 33 PID 576 wrote to memory of 1580 576 isdgdsf.exe 33 PID 576 wrote to memory of 1580 576 isdgdsf.exe 33 PID 576 wrote to memory of 1580 576 isdgdsf.exe 33 PID 576 wrote to memory of 1580 576 isdgdsf.exe 33 PID 1580 wrote to memory of 1528 1580 isdgdsf.exe 35 PID 1580 wrote to memory of 1528 1580 isdgdsf.exe 35 PID 1580 wrote to memory of 1528 1580 isdgdsf.exe 35 PID 1580 wrote to memory of 1528 1580 isdgdsf.exe 35 PID 1580 wrote to memory of 1724 1580 isdgdsf.exe 37 PID 1580 wrote to memory of 1724 1580 isdgdsf.exe 37 PID 1580 wrote to memory of 1724 1580 isdgdsf.exe 37 PID 1580 wrote to memory of 1724 1580 isdgdsf.exe 37 PID 1724 wrote to memory of 1656 1724 cmd.exe 39 PID 1724 wrote to memory of 1656 1724 cmd.exe 39 PID 1724 wrote to memory of 1656 1724 cmd.exe 39 PID 1724 wrote to memory of 1656 1724 cmd.exe 39 PID 1528 wrote to memory of 1968 1528 cmd.exe 40 PID 1528 wrote to memory of 1968 1528 cmd.exe 40 PID 1528 wrote to memory of 1968 1528 cmd.exe 40 PID 1528 wrote to memory of 1968 1528 cmd.exe 40 PID 1724 wrote to memory of 1108 1724 cmd.exe 41 PID 1724 wrote to memory of 1108 1724 cmd.exe 41 PID 1724 wrote to memory of 1108 1724 cmd.exe 41 PID 1724 wrote to memory of 1108 1724 cmd.exe 41 PID 1108 wrote to memory of 820 1108 crssi.exe 42 PID 1108 wrote to memory of 820 1108 crssi.exe 42 PID 1108 wrote to memory of 820 1108 crssi.exe 42 PID 1108 wrote to memory of 820 1108 crssi.exe 42 PID 1108 wrote to memory of 820 1108 crssi.exe 42 PID 1108 wrote to memory of 820 1108 crssi.exe 42 PID 1108 wrote to memory of 820 1108 crssi.exe 42 PID 1108 wrote to memory of 820 1108 crssi.exe 42 PID 1108 wrote to memory of 820 1108 crssi.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c0a8ab60132cd737b83b2c9b502dfb2d5e3cf14174cc84e422ca1d19277202b.exe"C:\Users\Admin\AppData\Local\Temp\1c0a8ab60132cd737b83b2c9b502dfb2d5e3cf14174cc84e422ca1d19277202b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\miychjo.cmd" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\isdgdsf.sfx.exeisdgdsf.sfx.exe -dC:\Users\Admin\AppData\Local\Temp -pafugBtrfapofdgatdbjfthfegdyddfbshhheuyhdqbookqcaszjnhdeekefhhddghdgvxcVohobthtigdge3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\isdgdsf.exe"C:\Users\Admin\AppData\Local\Temp\isdgdsf.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Users\Admin\AppData\Local\Temp\isdgdsf.exeC:\Users\Admin\AppData\Local\Temp\isdgdsf.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "crssi" /tr '"C:\Users\Admin\AppData\Roaming\crssi.exe"' & exit6⤵
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "crssi" /tr '"C:\Users\Admin\AppData\Roaming\crssi.exe"'7⤵
- Creates scheduled task(s)
PID:1968
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp1A17.tmp.bat""6⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\timeout.exetimeout 37⤵
- Delays execution with timeout.exe
PID:1656
-
-
C:\Users\Admin\AppData\Roaming\crssi.exe"C:\Users\Admin\AppData\Roaming\crssi.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Roaming\crssi.exeC:\Users\Admin\AppData\Roaming\crssi.exe8⤵
- Executes dropped EXE
PID:820
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:1248
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
227KB
MD5fa8a43024023f81bcace81c68c3bd113
SHA187bf0587d19a57a3f731580a3d90882783152038
SHA256d8fdf0f6da06b4a581200851ae1b0cdefcacc6debde5ea5b3867de22caa6fa6c
SHA512aeb124dace247b976b6d6a94931d4dd45fd79056189790ae8bae4507ded2043a0365143afba6ca8af4a8b2e627ec32d7a235171ec0f538fa6e4064b1d74c9d33
-
Filesize
227KB
MD5fa8a43024023f81bcace81c68c3bd113
SHA187bf0587d19a57a3f731580a3d90882783152038
SHA256d8fdf0f6da06b4a581200851ae1b0cdefcacc6debde5ea5b3867de22caa6fa6c
SHA512aeb124dace247b976b6d6a94931d4dd45fd79056189790ae8bae4507ded2043a0365143afba6ca8af4a8b2e627ec32d7a235171ec0f538fa6e4064b1d74c9d33
-
Filesize
227KB
MD5fa8a43024023f81bcace81c68c3bd113
SHA187bf0587d19a57a3f731580a3d90882783152038
SHA256d8fdf0f6da06b4a581200851ae1b0cdefcacc6debde5ea5b3867de22caa6fa6c
SHA512aeb124dace247b976b6d6a94931d4dd45fd79056189790ae8bae4507ded2043a0365143afba6ca8af4a8b2e627ec32d7a235171ec0f538fa6e4064b1d74c9d33
-
Filesize
227KB
MD5fa8a43024023f81bcace81c68c3bd113
SHA187bf0587d19a57a3f731580a3d90882783152038
SHA256d8fdf0f6da06b4a581200851ae1b0cdefcacc6debde5ea5b3867de22caa6fa6c
SHA512aeb124dace247b976b6d6a94931d4dd45fd79056189790ae8bae4507ded2043a0365143afba6ca8af4a8b2e627ec32d7a235171ec0f538fa6e4064b1d74c9d33
-
Filesize
461KB
MD5b1ee1ffa82722a9780001f272f455f8a
SHA1e0a251d7694d5f0aa243c5f833e1f3a4de63e571
SHA25663382ae32e99dc17d18e7067d44a4cbc5b6a0fac4f0f66e9531fa6dc3839593d
SHA51215ed6d31bd9cd1bd1b44f555368518244b143e4a8388c767c49909debcb2861601c30e08bfb129f7d5227910c9cc552e5ddbed6e0b9283d8aaeae6eee75ea369
-
Filesize
461KB
MD5b1ee1ffa82722a9780001f272f455f8a
SHA1e0a251d7694d5f0aa243c5f833e1f3a4de63e571
SHA25663382ae32e99dc17d18e7067d44a4cbc5b6a0fac4f0f66e9531fa6dc3839593d
SHA51215ed6d31bd9cd1bd1b44f555368518244b143e4a8388c767c49909debcb2861601c30e08bfb129f7d5227910c9cc552e5ddbed6e0b9283d8aaeae6eee75ea369
-
Filesize
10KB
MD587adf72d3426e9082f7ce47d1d4477a3
SHA1e7d42a7a2a965e61d6b4a84f3fa839b0aec60ec0
SHA25612c1057bee97bc8e7c98dc5f1596c55a8ab0b004ac4e73298c439606af3f3490
SHA5122424858b442b05d02b181e9ce517a2c1bb526c16d8a80acb3987d064a3f891ec1c5a391edcc362636cf3acf1b423cc63157b9f1966a0cd60b379a4ac0dc8cd05
-
Filesize
10KB
MD587adf72d3426e9082f7ce47d1d4477a3
SHA1e7d42a7a2a965e61d6b4a84f3fa839b0aec60ec0
SHA25612c1057bee97bc8e7c98dc5f1596c55a8ab0b004ac4e73298c439606af3f3490
SHA5122424858b442b05d02b181e9ce517a2c1bb526c16d8a80acb3987d064a3f891ec1c5a391edcc362636cf3acf1b423cc63157b9f1966a0cd60b379a4ac0dc8cd05
-
Filesize
46KB
MD557cbd6c513298c42618373a0f752460a
SHA13dd60b7e98d93f4c2b0b7aa11b9bba3708a5e5c6
SHA256c58d4f70b28185fad7a7411f08731c13ab5c19decad07fc2e422090c090268c2
SHA5120624fe01af7f450b5ed5aef39e1678d66642de0a07edcce74a801a2051e62c7a5d2c057cf6e4b549122583df8f618ecddb81e23200187fecfd7695061fd9d68c
-
Filesize
149B
MD5a27a77cade7f6148b77c8d09584f5419
SHA12454481e2988ab0d668ae9c7a480b49156a25886
SHA256ea13269420b96f623bc175b025f17f170a5bea9d0f849b07fe8dedbacd3600cd
SHA5124b11fc93ddc48c6372984d97a2ddbe72d7f99cff20da3e4d066b026ff712d6365bfb1b35113fee93192b604c7208586ccf1ef2e1d023ecc9d54e54065dd95d2a
-
Filesize
149B
MD5a27a77cade7f6148b77c8d09584f5419
SHA12454481e2988ab0d668ae9c7a480b49156a25886
SHA256ea13269420b96f623bc175b025f17f170a5bea9d0f849b07fe8dedbacd3600cd
SHA5124b11fc93ddc48c6372984d97a2ddbe72d7f99cff20da3e4d066b026ff712d6365bfb1b35113fee93192b604c7208586ccf1ef2e1d023ecc9d54e54065dd95d2a
-
Filesize
227KB
MD5fa8a43024023f81bcace81c68c3bd113
SHA187bf0587d19a57a3f731580a3d90882783152038
SHA256d8fdf0f6da06b4a581200851ae1b0cdefcacc6debde5ea5b3867de22caa6fa6c
SHA512aeb124dace247b976b6d6a94931d4dd45fd79056189790ae8bae4507ded2043a0365143afba6ca8af4a8b2e627ec32d7a235171ec0f538fa6e4064b1d74c9d33
-
Filesize
227KB
MD5fa8a43024023f81bcace81c68c3bd113
SHA187bf0587d19a57a3f731580a3d90882783152038
SHA256d8fdf0f6da06b4a581200851ae1b0cdefcacc6debde5ea5b3867de22caa6fa6c
SHA512aeb124dace247b976b6d6a94931d4dd45fd79056189790ae8bae4507ded2043a0365143afba6ca8af4a8b2e627ec32d7a235171ec0f538fa6e4064b1d74c9d33
-
Filesize
227KB
MD5fa8a43024023f81bcace81c68c3bd113
SHA187bf0587d19a57a3f731580a3d90882783152038
SHA256d8fdf0f6da06b4a581200851ae1b0cdefcacc6debde5ea5b3867de22caa6fa6c
SHA512aeb124dace247b976b6d6a94931d4dd45fd79056189790ae8bae4507ded2043a0365143afba6ca8af4a8b2e627ec32d7a235171ec0f538fa6e4064b1d74c9d33
-
Filesize
227KB
MD5fa8a43024023f81bcace81c68c3bd113
SHA187bf0587d19a57a3f731580a3d90882783152038
SHA256d8fdf0f6da06b4a581200851ae1b0cdefcacc6debde5ea5b3867de22caa6fa6c
SHA512aeb124dace247b976b6d6a94931d4dd45fd79056189790ae8bae4507ded2043a0365143afba6ca8af4a8b2e627ec32d7a235171ec0f538fa6e4064b1d74c9d33
-
Filesize
227KB
MD5fa8a43024023f81bcace81c68c3bd113
SHA187bf0587d19a57a3f731580a3d90882783152038
SHA256d8fdf0f6da06b4a581200851ae1b0cdefcacc6debde5ea5b3867de22caa6fa6c
SHA512aeb124dace247b976b6d6a94931d4dd45fd79056189790ae8bae4507ded2043a0365143afba6ca8af4a8b2e627ec32d7a235171ec0f538fa6e4064b1d74c9d33
-
Filesize
227KB
MD5fa8a43024023f81bcace81c68c3bd113
SHA187bf0587d19a57a3f731580a3d90882783152038
SHA256d8fdf0f6da06b4a581200851ae1b0cdefcacc6debde5ea5b3867de22caa6fa6c
SHA512aeb124dace247b976b6d6a94931d4dd45fd79056189790ae8bae4507ded2043a0365143afba6ca8af4a8b2e627ec32d7a235171ec0f538fa6e4064b1d74c9d33
-
Filesize
227KB
MD5fa8a43024023f81bcace81c68c3bd113
SHA187bf0587d19a57a3f731580a3d90882783152038
SHA256d8fdf0f6da06b4a581200851ae1b0cdefcacc6debde5ea5b3867de22caa6fa6c
SHA512aeb124dace247b976b6d6a94931d4dd45fd79056189790ae8bae4507ded2043a0365143afba6ca8af4a8b2e627ec32d7a235171ec0f538fa6e4064b1d74c9d33
-
Filesize
227KB
MD5fa8a43024023f81bcace81c68c3bd113
SHA187bf0587d19a57a3f731580a3d90882783152038
SHA256d8fdf0f6da06b4a581200851ae1b0cdefcacc6debde5ea5b3867de22caa6fa6c
SHA512aeb124dace247b976b6d6a94931d4dd45fd79056189790ae8bae4507ded2043a0365143afba6ca8af4a8b2e627ec32d7a235171ec0f538fa6e4064b1d74c9d33
-
Filesize
461KB
MD5b1ee1ffa82722a9780001f272f455f8a
SHA1e0a251d7694d5f0aa243c5f833e1f3a4de63e571
SHA25663382ae32e99dc17d18e7067d44a4cbc5b6a0fac4f0f66e9531fa6dc3839593d
SHA51215ed6d31bd9cd1bd1b44f555368518244b143e4a8388c767c49909debcb2861601c30e08bfb129f7d5227910c9cc552e5ddbed6e0b9283d8aaeae6eee75ea369
-
Filesize
227KB
MD5fa8a43024023f81bcace81c68c3bd113
SHA187bf0587d19a57a3f731580a3d90882783152038
SHA256d8fdf0f6da06b4a581200851ae1b0cdefcacc6debde5ea5b3867de22caa6fa6c
SHA512aeb124dace247b976b6d6a94931d4dd45fd79056189790ae8bae4507ded2043a0365143afba6ca8af4a8b2e627ec32d7a235171ec0f538fa6e4064b1d74c9d33