Analysis

  • max time kernel
    71s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    21-03-2023 19:30

General

  • Target

    tmp.exe

  • Size

    1.6MB

  • MD5

    0e1b2b53ca02872f52ae1c9b19c064e3

  • SHA1

    1ef365bfbc36976de14965ecdf8a2db159de6ed4

  • SHA256

    25f5625ca29d97a097fcf2a3750c20df4b71c00e745b2b0905060e3be36ad77a

  • SHA512

    6bb6010d8a81cc77b30343ebda705fc55b81a5a76a9bc07a3cd2417f2c3e4772b9875813bd447b43de570e50b259e01a253073ee1b332c9c314751536a5de9c1

  • SSDEEP

    49152:7p2Xk24Lko9TQprjvnp2rObS7oP00tcu3WIxJHjiaJ75TL0jljMnAVQcW:dG4LkQT8rjvQqu7a0Ucu5xJHjiY5nQln

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    45.151.135.235
  • Port:
    21
  • Username:
    123
  • Password:
    123

Extracted

Family

asyncrat

C2

103.231.254.62:8848

Mutex

rtdgbregegerger

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Async RAT payload 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1320
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {DEE6E230-9F34-4C3E-AC8A-77B149C11633} S-1-5-21-2647223082-2067913677-935928954-1000:BPOQNXYB\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1988
    • C:\Users\Admin\AppData\Local\Temp\tmp.exe
      C:\Users\Admin\AppData\Local\Temp\tmp.exe
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1376

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    61KB

    MD5

    e71c8443ae0bc2e282c73faead0a6dd3

    SHA1

    0c110c1b01e68edfacaeae64781a37b1995fa94b

    SHA256

    95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

    SHA512

    b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

  • C:\Users\Admin\AppData\Local\Temp\Tar6C71.tmp
    Filesize

    161KB

    MD5

    be2bec6e8c5653136d3e72fe53c98aa3

    SHA1

    a8182d6db17c14671c3d5766c72e58d87c0810de

    SHA256

    1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

    SHA512

    0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

  • memory/1320-56-0x0000000001000000-0x0000000001016000-memory.dmp
    Filesize

    88KB

  • memory/1320-58-0x0000000005E70000-0x0000000005EB0000-memory.dmp
    Filesize

    256KB

  • memory/1320-59-0x0000000005E70000-0x0000000005EB0000-memory.dmp
    Filesize

    256KB

  • memory/1320-78-0x00000000030C0000-0x0000000003132000-memory.dmp
    Filesize

    456KB

  • memory/1320-99-0x0000000005E70000-0x0000000005EB0000-memory.dmp
    Filesize

    256KB

  • memory/1376-103-0x0000000003900000-0x0000000003940000-memory.dmp
    Filesize

    256KB