Analysis
-
max time kernel
32s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
21/03/2023, 16:28
Behavioral task
behavioral1
Sample
LafameBeta.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
LafameBeta.exe
Resource
win10v2004-20230220-en
General
-
Target
LafameBeta.exe
-
Size
45KB
-
MD5
a7f473e14b7c3e56561ff51f87b2f279
-
SHA1
799bb3816916db3e6e92ff665c34e020cf444859
-
SHA256
05b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361
-
SHA512
eb118655b71c4b04cc9da4de9f943b98ce9c7ca562835a39a757a4e5f333da0fdcb39c34eec0f5351855875a301078ecc96126af32c17f4f1eff512c4cdc5e69
-
SSDEEP
768:TuERVThg5RXWUr/+1mo2qD84lNVx1VEHUPIKFjbmgX3inm6AhL1uQHQoBDZTx:TuERVThaa2AlQKNb5XSTApHdTx
Malware Config
Extracted
asyncrat
0.5.7B
COM Surrogate
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:1604
127.0.0.1:14576
127.0.0.1:15074
4.tcp.eu.ngrok.io:6606
4.tcp.eu.ngrok.io:7707
4.tcp.eu.ngrok.io:8808
4.tcp.eu.ngrok.io:1604
4.tcp.eu.ngrok.io:14576
4.tcp.eu.ngrok.io:15074
7.tcp.eu.ngrok.io:6606
7.tcp.eu.ngrok.io:7707
7.tcp.eu.ngrok.io:8808
7.tcp.eu.ngrok.io:1604
7.tcp.eu.ngrok.io:14576
7.tcp.eu.ngrok.io:15074
COM Surrogate
-
delay
3
-
install
true
-
install_file
Microsoftfixer.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 6 IoCs
resource yara_rule behavioral1/memory/2044-54-0x00000000002B0000-0x00000000002C2000-memory.dmp asyncrat behavioral1/files/0x000a0000000122f6-65.dat asyncrat behavioral1/files/0x000a0000000122f6-66.dat asyncrat behavioral1/files/0x000a0000000122f6-67.dat asyncrat behavioral1/memory/1244-68-0x0000000001260000-0x0000000001272000-memory.dmp asyncrat behavioral1/memory/1244-69-0x0000000000290000-0x00000000002D0000-memory.dmp asyncrat -
Executes dropped EXE 1 IoCs
pid Process 1244 Microsoftfixer.exe -
Loads dropped DLL 1 IoCs
pid Process 1564 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1820 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1480 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2044 LafameBeta.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2044 LafameBeta.exe Token: SeDebugPrivilege 1244 Microsoftfixer.exe Token: SeDebugPrivilege 1244 Microsoftfixer.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2044 wrote to memory of 760 2044 LafameBeta.exe 29 PID 2044 wrote to memory of 760 2044 LafameBeta.exe 29 PID 2044 wrote to memory of 760 2044 LafameBeta.exe 29 PID 2044 wrote to memory of 760 2044 LafameBeta.exe 29 PID 2044 wrote to memory of 1564 2044 LafameBeta.exe 31 PID 2044 wrote to memory of 1564 2044 LafameBeta.exe 31 PID 2044 wrote to memory of 1564 2044 LafameBeta.exe 31 PID 2044 wrote to memory of 1564 2044 LafameBeta.exe 31 PID 760 wrote to memory of 1820 760 cmd.exe 33 PID 760 wrote to memory of 1820 760 cmd.exe 33 PID 760 wrote to memory of 1820 760 cmd.exe 33 PID 760 wrote to memory of 1820 760 cmd.exe 33 PID 1564 wrote to memory of 1480 1564 cmd.exe 34 PID 1564 wrote to memory of 1480 1564 cmd.exe 34 PID 1564 wrote to memory of 1480 1564 cmd.exe 34 PID 1564 wrote to memory of 1480 1564 cmd.exe 34 PID 1564 wrote to memory of 1244 1564 cmd.exe 35 PID 1564 wrote to memory of 1244 1564 cmd.exe 35 PID 1564 wrote to memory of 1244 1564 cmd.exe 35 PID 1564 wrote to memory of 1244 1564 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\LafameBeta.exe"C:\Users\Admin\AppData\Local\Temp\LafameBeta.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Microsoftfixer" /tr '"C:\Users\Admin\AppData\Roaming\Microsoftfixer.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Microsoftfixer" /tr '"C:\Users\Admin\AppData\Roaming\Microsoftfixer.exe"'3⤵
- Creates scheduled task(s)
PID:1820
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp2231.tmp.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:1480
-
-
C:\Users\Admin\AppData\Roaming\Microsoftfixer.exe"C:\Users\Admin\AppData\Roaming\Microsoftfixer.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1244
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
158B
MD5bfac891a901c43b87f0074324b54a87e
SHA1ef835c4b134b8810f04ee1c2294c14c005f77f63
SHA256605b5e92b678de0a3a98a17a180b2a45342f3fe4e019acd1d55d251e9475d6fd
SHA512d6a349ccdbbe595e86b80ca37d18ac947692e2e34bdb8e4820e58a1bbb65ffbe1c644e21e85ddc88a595601fbda1cffe2684c56a4485e55ba3dc64174f461002
-
Filesize
158B
MD5bfac891a901c43b87f0074324b54a87e
SHA1ef835c4b134b8810f04ee1c2294c14c005f77f63
SHA256605b5e92b678de0a3a98a17a180b2a45342f3fe4e019acd1d55d251e9475d6fd
SHA512d6a349ccdbbe595e86b80ca37d18ac947692e2e34bdb8e4820e58a1bbb65ffbe1c644e21e85ddc88a595601fbda1cffe2684c56a4485e55ba3dc64174f461002
-
Filesize
45KB
MD5a7f473e14b7c3e56561ff51f87b2f279
SHA1799bb3816916db3e6e92ff665c34e020cf444859
SHA25605b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361
SHA512eb118655b71c4b04cc9da4de9f943b98ce9c7ca562835a39a757a4e5f333da0fdcb39c34eec0f5351855875a301078ecc96126af32c17f4f1eff512c4cdc5e69
-
Filesize
45KB
MD5a7f473e14b7c3e56561ff51f87b2f279
SHA1799bb3816916db3e6e92ff665c34e020cf444859
SHA25605b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361
SHA512eb118655b71c4b04cc9da4de9f943b98ce9c7ca562835a39a757a4e5f333da0fdcb39c34eec0f5351855875a301078ecc96126af32c17f4f1eff512c4cdc5e69
-
Filesize
45KB
MD5a7f473e14b7c3e56561ff51f87b2f279
SHA1799bb3816916db3e6e92ff665c34e020cf444859
SHA25605b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361
SHA512eb118655b71c4b04cc9da4de9f943b98ce9c7ca562835a39a757a4e5f333da0fdcb39c34eec0f5351855875a301078ecc96126af32c17f4f1eff512c4cdc5e69