Analysis Overview
SHA256
d50074d48914764b355b89e387636cfbc2d5f5daf17b8afee1490c176afccfbf
Threat Level: Known bad
The file AS000456879.exe was found to be: Known bad.
Malicious Activity Summary
AsyncRat
Async RAT payload
Reads user/profile data of web browsers
Loads dropped DLL
Executes dropped EXE
Adds Run key to start application
Suspicious use of SetThreadContext
Enumerates physical storage devices
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2023-03-22 06:56
Signatures
Analysis: behavioral2
Detonation Overview
Submitted
2023-03-22 06:56
Reported
2023-03-22 06:58
Platform
win10v2004-20230221-en
Max time kernel
143s
Max time network
146s
Command Line
Signatures
AsyncRat
Async RAT payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe | N/A |
Reads user/profile data of web browsers
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jfoktdyh = "C:\\Users\\Admin\\AppData\\Roaming\\pyudmirbwg\\cluqa.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\vubdwujj.exe\" C:\\Users\\Admin\\AppData\\Local\\" | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 2768 set thread context of 1468 | N/A | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe |
Enumerates physical storage devices
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 4380 wrote to memory of 2768 | N/A | C:\Users\Admin\AppData\Local\Temp\AS000456879.exe | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe |
| PID 4380 wrote to memory of 2768 | N/A | C:\Users\Admin\AppData\Local\Temp\AS000456879.exe | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe |
| PID 4380 wrote to memory of 2768 | N/A | C:\Users\Admin\AppData\Local\Temp\AS000456879.exe | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe |
| PID 2768 wrote to memory of 1468 | N/A | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe |
| PID 2768 wrote to memory of 1468 | N/A | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe |
| PID 2768 wrote to memory of 1468 | N/A | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe |
| PID 2768 wrote to memory of 1468 | N/A | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\AS000456879.exe
"C:\Users\Admin\AppData\Local\Temp\AS000456879.exe"
C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe
"C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe" C:\Users\Admin\AppData\Local\Temp\uszcl.zps
C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe
"C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 176.122.125.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 4.159.190.20.in-addr.arpa | udp |
| US | 93.184.220.29:80 | tcp | |
| US | 8.8.8.8:53 | 199.176.139.52.in-addr.arpa | udp |
| US | 172.245.251.219:2015 | tcp | |
| US | 8.8.8.8:53 | 219.251.245.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 58.55.71.13.in-addr.arpa | udp |
| US | 172.245.251.219:2015 | tcp | |
| US | 8.8.8.8:53 | 76.38.195.152.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.126.166.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 50.4.107.13.in-addr.arpa | udp |
| US | 20.189.173.4:443 | tcp | |
| US | 8.8.8.8:53 | 58.104.205.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 202.74.101.95.in-addr.arpa | udp |
| US | 93.184.221.240:80 | tcp | |
| US | 8.8.8.8:53 | 126.50.247.8.in-addr.arpa | udp |
| US | 93.184.221.240:80 | tcp | |
| NL | 173.223.113.164:443 | tcp |
Files
C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe
| MD5 | adba09c1a1bae1fca7a24748a8088b28 |
| SHA1 | 1657b9e782e90e3ea7c97a0da9efde1568089d56 |
| SHA256 | 9fafdf42926181bee4b0e814907d060568e9578a9ac834069638c699757f2e4b |
| SHA512 | c4b8f329eb42bd4a6ec931366a9cf44be97f406570adf4c4e328da8e032b0b5c00f1ff638760b3183607207f4297b2dc0a818c959187040c229c716a1ee74492 |
C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe
| MD5 | adba09c1a1bae1fca7a24748a8088b28 |
| SHA1 | 1657b9e782e90e3ea7c97a0da9efde1568089d56 |
| SHA256 | 9fafdf42926181bee4b0e814907d060568e9578a9ac834069638c699757f2e4b |
| SHA512 | c4b8f329eb42bd4a6ec931366a9cf44be97f406570adf4c4e328da8e032b0b5c00f1ff638760b3183607207f4297b2dc0a818c959187040c229c716a1ee74492 |
C:\Users\Admin\AppData\Local\Temp\uszcl.zps
| MD5 | 0af0a947a024be23f1ca48d932eacd1e |
| SHA1 | 747ec7d3e0879017c45b911d20b90d9e7257e90d |
| SHA256 | 429576f6e3310e8f0a0033207e8c11c565c545846dc292048feec5df38a1eca2 |
| SHA512 | b9c6cdbfc1232fb290231217dea23bca16eb1db7658f19af4fad29f72b13c033f902487df8ca27d554b5f1c3f302a2bc9ef030870b5e71a80eaa1f78aa36e5dd |
C:\Users\Admin\AppData\Local\Temp\fobmxw.vq
| MD5 | 2507ba304a6d9308621410c2d36296a7 |
| SHA1 | e25523ae784746d60c47cf06eae60cf61e988050 |
| SHA256 | aab883c874ded8ea1c747f001eca69bc9a8f8349ae7ee2dfd5e910f54bfe72f8 |
| SHA512 | 9ac7f6f5baf5715001faa34ec8cc655f1af87a2515ff7f93b131d965d8f93921b34abd5874a99b7a8ba064f783cd219652913724259fae846783a1a33ef016dc |
memory/1468-142-0x0000000000400000-0x0000000000423000-memory.dmp
memory/1468-144-0x0000000000400000-0x0000000000423000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe
| MD5 | adba09c1a1bae1fca7a24748a8088b28 |
| SHA1 | 1657b9e782e90e3ea7c97a0da9efde1568089d56 |
| SHA256 | 9fafdf42926181bee4b0e814907d060568e9578a9ac834069638c699757f2e4b |
| SHA512 | c4b8f329eb42bd4a6ec931366a9cf44be97f406570adf4c4e328da8e032b0b5c00f1ff638760b3183607207f4297b2dc0a818c959187040c229c716a1ee74492 |
memory/1468-145-0x0000000000400000-0x0000000000423000-memory.dmp
memory/1468-147-0x0000000000400000-0x0000000000423000-memory.dmp
memory/1468-148-0x0000000004A60000-0x0000000004A70000-memory.dmp
memory/1468-149-0x0000000004A60000-0x0000000004A70000-memory.dmp
memory/1468-150-0x0000000004A60000-0x0000000004A70000-memory.dmp
memory/1468-151-0x0000000004EF0000-0x0000000004F8C000-memory.dmp
memory/1468-152-0x0000000004F90000-0x0000000005534000-memory.dmp
memory/1468-153-0x0000000005580000-0x00000000055E6000-memory.dmp
memory/1468-157-0x0000000004A60000-0x0000000004A70000-memory.dmp
memory/1468-156-0x0000000004A60000-0x0000000004A70000-memory.dmp
memory/1468-155-0x0000000004A60000-0x0000000004A70000-memory.dmp
memory/1468-158-0x0000000006170000-0x00000000061E6000-memory.dmp
memory/1468-159-0x0000000004A60000-0x0000000004A70000-memory.dmp
memory/1468-160-0x0000000006260000-0x000000000627E000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2023-03-22 06:56
Reported
2023-03-22 06:58
Platform
win7-20230220-en
Max time kernel
141s
Max time network
149s
Command Line
Signatures
AsyncRat
Async RAT payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\AS000456879.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\AS000456879.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe | N/A |
Reads user/profile data of web browsers
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows\CurrentVersion\Run\jfoktdyh = "C:\\Users\\Admin\\AppData\\Roaming\\pyudmirbwg\\cluqa.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\vubdwujj.exe\" C:\\Users\\Admin\\AppData\\Local\\" | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 1172 set thread context of 1400 | N/A | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe |
Enumerates physical storage devices
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\AS000456879.exe
"C:\Users\Admin\AppData\Local\Temp\AS000456879.exe"
C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe
"C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe" C:\Users\Admin\AppData\Local\Temp\uszcl.zps
C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe
"C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe"
Network
| Country | Destination | Domain | Proto |
| US | 172.245.251.219:2015 | tcp | |
| US | 172.245.251.219:2015 | tcp |
Files
\Users\Admin\AppData\Local\Temp\vubdwujj.exe
| MD5 | adba09c1a1bae1fca7a24748a8088b28 |
| SHA1 | 1657b9e782e90e3ea7c97a0da9efde1568089d56 |
| SHA256 | 9fafdf42926181bee4b0e814907d060568e9578a9ac834069638c699757f2e4b |
| SHA512 | c4b8f329eb42bd4a6ec931366a9cf44be97f406570adf4c4e328da8e032b0b5c00f1ff638760b3183607207f4297b2dc0a818c959187040c229c716a1ee74492 |
\Users\Admin\AppData\Local\Temp\vubdwujj.exe
| MD5 | adba09c1a1bae1fca7a24748a8088b28 |
| SHA1 | 1657b9e782e90e3ea7c97a0da9efde1568089d56 |
| SHA256 | 9fafdf42926181bee4b0e814907d060568e9578a9ac834069638c699757f2e4b |
| SHA512 | c4b8f329eb42bd4a6ec931366a9cf44be97f406570adf4c4e328da8e032b0b5c00f1ff638760b3183607207f4297b2dc0a818c959187040c229c716a1ee74492 |
C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe
| MD5 | adba09c1a1bae1fca7a24748a8088b28 |
| SHA1 | 1657b9e782e90e3ea7c97a0da9efde1568089d56 |
| SHA256 | 9fafdf42926181bee4b0e814907d060568e9578a9ac834069638c699757f2e4b |
| SHA512 | c4b8f329eb42bd4a6ec931366a9cf44be97f406570adf4c4e328da8e032b0b5c00f1ff638760b3183607207f4297b2dc0a818c959187040c229c716a1ee74492 |
C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe
| MD5 | adba09c1a1bae1fca7a24748a8088b28 |
| SHA1 | 1657b9e782e90e3ea7c97a0da9efde1568089d56 |
| SHA256 | 9fafdf42926181bee4b0e814907d060568e9578a9ac834069638c699757f2e4b |
| SHA512 | c4b8f329eb42bd4a6ec931366a9cf44be97f406570adf4c4e328da8e032b0b5c00f1ff638760b3183607207f4297b2dc0a818c959187040c229c716a1ee74492 |
C:\Users\Admin\AppData\Local\Temp\uszcl.zps
| MD5 | 0af0a947a024be23f1ca48d932eacd1e |
| SHA1 | 747ec7d3e0879017c45b911d20b90d9e7257e90d |
| SHA256 | 429576f6e3310e8f0a0033207e8c11c565c545846dc292048feec5df38a1eca2 |
| SHA512 | b9c6cdbfc1232fb290231217dea23bca16eb1db7658f19af4fad29f72b13c033f902487df8ca27d554b5f1c3f302a2bc9ef030870b5e71a80eaa1f78aa36e5dd |
C:\Users\Admin\AppData\Local\Temp\fobmxw.vq
| MD5 | 2507ba304a6d9308621410c2d36296a7 |
| SHA1 | e25523ae784746d60c47cf06eae60cf61e988050 |
| SHA256 | aab883c874ded8ea1c747f001eca69bc9a8f8349ae7ee2dfd5e910f54bfe72f8 |
| SHA512 | 9ac7f6f5baf5715001faa34ec8cc655f1af87a2515ff7f93b131d965d8f93921b34abd5874a99b7a8ba064f783cd219652913724259fae846783a1a33ef016dc |
C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe
| MD5 | adba09c1a1bae1fca7a24748a8088b28 |
| SHA1 | 1657b9e782e90e3ea7c97a0da9efde1568089d56 |
| SHA256 | 9fafdf42926181bee4b0e814907d060568e9578a9ac834069638c699757f2e4b |
| SHA512 | c4b8f329eb42bd4a6ec931366a9cf44be97f406570adf4c4e328da8e032b0b5c00f1ff638760b3183607207f4297b2dc0a818c959187040c229c716a1ee74492 |
\Users\Admin\AppData\Local\Temp\vubdwujj.exe
| MD5 | adba09c1a1bae1fca7a24748a8088b28 |
| SHA1 | 1657b9e782e90e3ea7c97a0da9efde1568089d56 |
| SHA256 | 9fafdf42926181bee4b0e814907d060568e9578a9ac834069638c699757f2e4b |
| SHA512 | c4b8f329eb42bd4a6ec931366a9cf44be97f406570adf4c4e328da8e032b0b5c00f1ff638760b3183607207f4297b2dc0a818c959187040c229c716a1ee74492 |
memory/1400-69-0x0000000000400000-0x0000000000423000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe
| MD5 | adba09c1a1bae1fca7a24748a8088b28 |
| SHA1 | 1657b9e782e90e3ea7c97a0da9efde1568089d56 |
| SHA256 | 9fafdf42926181bee4b0e814907d060568e9578a9ac834069638c699757f2e4b |
| SHA512 | c4b8f329eb42bd4a6ec931366a9cf44be97f406570adf4c4e328da8e032b0b5c00f1ff638760b3183607207f4297b2dc0a818c959187040c229c716a1ee74492 |
memory/1400-72-0x0000000000400000-0x0000000000423000-memory.dmp
memory/1400-74-0x0000000000310000-0x0000000000322000-memory.dmp
memory/1400-75-0x0000000000400000-0x0000000000423000-memory.dmp
memory/1400-76-0x0000000004580000-0x00000000045C0000-memory.dmp
memory/1400-77-0x0000000004580000-0x00000000045C0000-memory.dmp
memory/1400-96-0x0000000005D20000-0x0000000005D88000-memory.dmp
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
| MD5 | e71c8443ae0bc2e282c73faead0a6dd3 |
| SHA1 | 0c110c1b01e68edfacaeae64781a37b1995fa94b |
| SHA256 | 95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72 |
| SHA512 | b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6 |
C:\Users\Admin\AppData\Local\Temp\Tar4449.tmp
| MD5 | be2bec6e8c5653136d3e72fe53c98aa3 |
| SHA1 | a8182d6db17c14671c3d5766c72e58d87c0810de |
| SHA256 | 1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd |
| SHA512 | 0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff |
memory/1400-117-0x0000000004AF0000-0x0000000004AFA000-memory.dmp
memory/1400-118-0x0000000005D90000-0x0000000005E20000-memory.dmp
memory/1400-119-0x0000000005E20000-0x0000000005E80000-memory.dmp