Analysis Overview
SHA256
d50074d48914764b355b89e387636cfbc2d5f5daf17b8afee1490c176afccfbf
Threat Level: Known bad
The file AS000456879.exe was found to be: Known bad.
Malicious Activity Summary
AsyncRat
Async RAT payload
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Adds Run key to start application
Suspicious use of SetThreadContext
Enumerates physical storage devices
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2023-03-22 06:56
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2023-03-22 06:56
Reported
2023-03-22 06:59
Platform
win7-20230220-en
Max time kernel
141s
Max time network
143s
Command Line
Signatures
AsyncRat
Async RAT payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\AS000456879.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\AS000456879.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows\CurrentVersion\Run\jfoktdyh = "C:\\Users\\Admin\\AppData\\Roaming\\pyudmirbwg\\cluqa.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\vubdwujj.exe\" C:\\Users\\Admin\\AppData\\Local\\" | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 2024 set thread context of 1392 | N/A | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe |
Enumerates physical storage devices
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\AS000456879.exe
"C:\Users\Admin\AppData\Local\Temp\AS000456879.exe"
C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe
"C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe" C:\Users\Admin\AppData\Local\Temp\uszcl.zps
C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe
"C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe"
Network
| Country | Destination | Domain | Proto |
| US | 172.245.251.219:2015 | tcp |
Files
\Users\Admin\AppData\Local\Temp\vubdwujj.exe
| MD5 | adba09c1a1bae1fca7a24748a8088b28 |
| SHA1 | 1657b9e782e90e3ea7c97a0da9efde1568089d56 |
| SHA256 | 9fafdf42926181bee4b0e814907d060568e9578a9ac834069638c699757f2e4b |
| SHA512 | c4b8f329eb42bd4a6ec931366a9cf44be97f406570adf4c4e328da8e032b0b5c00f1ff638760b3183607207f4297b2dc0a818c959187040c229c716a1ee74492 |
\Users\Admin\AppData\Local\Temp\vubdwujj.exe
| MD5 | adba09c1a1bae1fca7a24748a8088b28 |
| SHA1 | 1657b9e782e90e3ea7c97a0da9efde1568089d56 |
| SHA256 | 9fafdf42926181bee4b0e814907d060568e9578a9ac834069638c699757f2e4b |
| SHA512 | c4b8f329eb42bd4a6ec931366a9cf44be97f406570adf4c4e328da8e032b0b5c00f1ff638760b3183607207f4297b2dc0a818c959187040c229c716a1ee74492 |
C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe
| MD5 | adba09c1a1bae1fca7a24748a8088b28 |
| SHA1 | 1657b9e782e90e3ea7c97a0da9efde1568089d56 |
| SHA256 | 9fafdf42926181bee4b0e814907d060568e9578a9ac834069638c699757f2e4b |
| SHA512 | c4b8f329eb42bd4a6ec931366a9cf44be97f406570adf4c4e328da8e032b0b5c00f1ff638760b3183607207f4297b2dc0a818c959187040c229c716a1ee74492 |
C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe
| MD5 | adba09c1a1bae1fca7a24748a8088b28 |
| SHA1 | 1657b9e782e90e3ea7c97a0da9efde1568089d56 |
| SHA256 | 9fafdf42926181bee4b0e814907d060568e9578a9ac834069638c699757f2e4b |
| SHA512 | c4b8f329eb42bd4a6ec931366a9cf44be97f406570adf4c4e328da8e032b0b5c00f1ff638760b3183607207f4297b2dc0a818c959187040c229c716a1ee74492 |
C:\Users\Admin\AppData\Local\Temp\uszcl.zps
| MD5 | 0af0a947a024be23f1ca48d932eacd1e |
| SHA1 | 747ec7d3e0879017c45b911d20b90d9e7257e90d |
| SHA256 | 429576f6e3310e8f0a0033207e8c11c565c545846dc292048feec5df38a1eca2 |
| SHA512 | b9c6cdbfc1232fb290231217dea23bca16eb1db7658f19af4fad29f72b13c033f902487df8ca27d554b5f1c3f302a2bc9ef030870b5e71a80eaa1f78aa36e5dd |
C:\Users\Admin\AppData\Local\Temp\fobmxw.vq
| MD5 | 2507ba304a6d9308621410c2d36296a7 |
| SHA1 | e25523ae784746d60c47cf06eae60cf61e988050 |
| SHA256 | aab883c874ded8ea1c747f001eca69bc9a8f8349ae7ee2dfd5e910f54bfe72f8 |
| SHA512 | 9ac7f6f5baf5715001faa34ec8cc655f1af87a2515ff7f93b131d965d8f93921b34abd5874a99b7a8ba064f783cd219652913724259fae846783a1a33ef016dc |
C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe
| MD5 | adba09c1a1bae1fca7a24748a8088b28 |
| SHA1 | 1657b9e782e90e3ea7c97a0da9efde1568089d56 |
| SHA256 | 9fafdf42926181bee4b0e814907d060568e9578a9ac834069638c699757f2e4b |
| SHA512 | c4b8f329eb42bd4a6ec931366a9cf44be97f406570adf4c4e328da8e032b0b5c00f1ff638760b3183607207f4297b2dc0a818c959187040c229c716a1ee74492 |
\Users\Admin\AppData\Local\Temp\vubdwujj.exe
| MD5 | adba09c1a1bae1fca7a24748a8088b28 |
| SHA1 | 1657b9e782e90e3ea7c97a0da9efde1568089d56 |
| SHA256 | 9fafdf42926181bee4b0e814907d060568e9578a9ac834069638c699757f2e4b |
| SHA512 | c4b8f329eb42bd4a6ec931366a9cf44be97f406570adf4c4e328da8e032b0b5c00f1ff638760b3183607207f4297b2dc0a818c959187040c229c716a1ee74492 |
memory/1392-69-0x0000000000400000-0x0000000000423000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe
| MD5 | adba09c1a1bae1fca7a24748a8088b28 |
| SHA1 | 1657b9e782e90e3ea7c97a0da9efde1568089d56 |
| SHA256 | 9fafdf42926181bee4b0e814907d060568e9578a9ac834069638c699757f2e4b |
| SHA512 | c4b8f329eb42bd4a6ec931366a9cf44be97f406570adf4c4e328da8e032b0b5c00f1ff638760b3183607207f4297b2dc0a818c959187040c229c716a1ee74492 |
memory/1392-72-0x0000000000400000-0x0000000000423000-memory.dmp
memory/1392-74-0x0000000000530000-0x0000000000542000-memory.dmp
memory/1392-75-0x0000000000530000-0x0000000000542000-memory.dmp
memory/1392-76-0x0000000000400000-0x0000000000423000-memory.dmp
memory/1392-77-0x00000000046E0000-0x0000000004720000-memory.dmp
memory/1392-78-0x00000000046E0000-0x0000000004720000-memory.dmp
memory/1392-97-0x00000000046E0000-0x0000000004720000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2023-03-22 06:56
Reported
2023-03-22 06:59
Platform
win10v2004-20230220-en
Max time kernel
143s
Max time network
152s
Command Line
Signatures
AsyncRat
Async RAT payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe | N/A |
Reads user/profile data of web browsers
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jfoktdyh = "C:\\Users\\Admin\\AppData\\Roaming\\pyudmirbwg\\cluqa.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\vubdwujj.exe\" C:\\Users\\Admin\\AppData\\Local\\" | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 1268 set thread context of 244 | N/A | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe |
Enumerates physical storage devices
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1504 wrote to memory of 1268 | N/A | C:\Users\Admin\AppData\Local\Temp\AS000456879.exe | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe |
| PID 1504 wrote to memory of 1268 | N/A | C:\Users\Admin\AppData\Local\Temp\AS000456879.exe | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe |
| PID 1504 wrote to memory of 1268 | N/A | C:\Users\Admin\AppData\Local\Temp\AS000456879.exe | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe |
| PID 1268 wrote to memory of 244 | N/A | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe |
| PID 1268 wrote to memory of 244 | N/A | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe |
| PID 1268 wrote to memory of 244 | N/A | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe |
| PID 1268 wrote to memory of 244 | N/A | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe | C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\AS000456879.exe
"C:\Users\Admin\AppData\Local\Temp\AS000456879.exe"
C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe
"C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe" C:\Users\Admin\AppData\Local\Temp\uszcl.zps
C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe
"C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.248.3.254:80 | tcp | |
| US | 8.8.8.8:53 | 76.38.195.152.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 134.17.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 216.74.101.95.in-addr.arpa | udp |
| US | 172.245.251.219:2015 | tcp | |
| US | 8.8.8.8:53 | 219.251.245.172.in-addr.arpa | udp |
| US | 172.245.251.219:2015 | tcp | |
| US | 8.8.8.8:53 | 209.205.72.20.in-addr.arpa | udp |
| IE | 13.69.239.74:443 | tcp | |
| US | 8.8.8.8:53 | 103.169.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 45.8.109.52.in-addr.arpa | udp |
| US | 93.184.221.240:80 | tcp | |
| US | 8.8.8.8:53 | 0.205.248.87.in-addr.arpa | udp |
| NL | 173.223.113.164:443 | tcp | |
| NL | 173.223.113.131:80 | tcp | |
| US | 204.79.197.203:80 | tcp |
Files
C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe
| MD5 | adba09c1a1bae1fca7a24748a8088b28 |
| SHA1 | 1657b9e782e90e3ea7c97a0da9efde1568089d56 |
| SHA256 | 9fafdf42926181bee4b0e814907d060568e9578a9ac834069638c699757f2e4b |
| SHA512 | c4b8f329eb42bd4a6ec931366a9cf44be97f406570adf4c4e328da8e032b0b5c00f1ff638760b3183607207f4297b2dc0a818c959187040c229c716a1ee74492 |
C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe
| MD5 | adba09c1a1bae1fca7a24748a8088b28 |
| SHA1 | 1657b9e782e90e3ea7c97a0da9efde1568089d56 |
| SHA256 | 9fafdf42926181bee4b0e814907d060568e9578a9ac834069638c699757f2e4b |
| SHA512 | c4b8f329eb42bd4a6ec931366a9cf44be97f406570adf4c4e328da8e032b0b5c00f1ff638760b3183607207f4297b2dc0a818c959187040c229c716a1ee74492 |
C:\Users\Admin\AppData\Local\Temp\uszcl.zps
| MD5 | 0af0a947a024be23f1ca48d932eacd1e |
| SHA1 | 747ec7d3e0879017c45b911d20b90d9e7257e90d |
| SHA256 | 429576f6e3310e8f0a0033207e8c11c565c545846dc292048feec5df38a1eca2 |
| SHA512 | b9c6cdbfc1232fb290231217dea23bca16eb1db7658f19af4fad29f72b13c033f902487df8ca27d554b5f1c3f302a2bc9ef030870b5e71a80eaa1f78aa36e5dd |
memory/1268-140-0x00000000006B0000-0x00000000006B2000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\fobmxw.vq
| MD5 | 2507ba304a6d9308621410c2d36296a7 |
| SHA1 | e25523ae784746d60c47cf06eae60cf61e988050 |
| SHA256 | aab883c874ded8ea1c747f001eca69bc9a8f8349ae7ee2dfd5e910f54bfe72f8 |
| SHA512 | 9ac7f6f5baf5715001faa34ec8cc655f1af87a2515ff7f93b131d965d8f93921b34abd5874a99b7a8ba064f783cd219652913724259fae846783a1a33ef016dc |
memory/244-143-0x0000000000400000-0x0000000000423000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe
| MD5 | adba09c1a1bae1fca7a24748a8088b28 |
| SHA1 | 1657b9e782e90e3ea7c97a0da9efde1568089d56 |
| SHA256 | 9fafdf42926181bee4b0e814907d060568e9578a9ac834069638c699757f2e4b |
| SHA512 | c4b8f329eb42bd4a6ec931366a9cf44be97f406570adf4c4e328da8e032b0b5c00f1ff638760b3183607207f4297b2dc0a818c959187040c229c716a1ee74492 |
memory/244-145-0x0000000000400000-0x0000000000423000-memory.dmp
memory/244-146-0x0000000000400000-0x0000000000423000-memory.dmp
memory/244-147-0x0000000000400000-0x0000000000423000-memory.dmp
memory/244-149-0x0000000004960000-0x0000000004970000-memory.dmp
memory/244-150-0x0000000004960000-0x0000000004970000-memory.dmp
memory/244-151-0x0000000004960000-0x0000000004970000-memory.dmp
memory/244-152-0x0000000004960000-0x0000000004970000-memory.dmp
memory/244-153-0x0000000004BB0000-0x0000000004C4C000-memory.dmp
memory/244-154-0x0000000004C50000-0x00000000051F4000-memory.dmp
memory/244-155-0x0000000005240000-0x00000000052A6000-memory.dmp
memory/244-157-0x0000000006030000-0x00000000060A6000-memory.dmp
memory/244-158-0x0000000004960000-0x0000000004970000-memory.dmp
memory/244-159-0x0000000004960000-0x0000000004970000-memory.dmp
memory/244-160-0x0000000004960000-0x0000000004970000-memory.dmp
memory/244-161-0x0000000006120000-0x000000000613E000-memory.dmp
memory/244-162-0x0000000004960000-0x0000000004970000-memory.dmp