Analysis
-
max time kernel
151s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23-03-2023 01:37
Behavioral task
behavioral1
Sample
05b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
05b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361.exe
Resource
win10v2004-20230220-en
General
-
Target
05b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361.exe
-
Size
45KB
-
MD5
a7f473e14b7c3e56561ff51f87b2f279
-
SHA1
799bb3816916db3e6e92ff665c34e020cf444859
-
SHA256
05b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361
-
SHA512
eb118655b71c4b04cc9da4de9f943b98ce9c7ca562835a39a757a4e5f333da0fdcb39c34eec0f5351855875a301078ecc96126af32c17f4f1eff512c4cdc5e69
-
SSDEEP
768:TuERVThg5RXWUr/+1mo2qD84lNVx1VEHUPIKFjbmgX3inm6AhL1uQHQoBDZTx:TuERVThaa2AlQKNb5XSTApHdTx
Malware Config
Extracted
asyncrat
0.5.7B
COM Surrogate
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:1604
127.0.0.1:14576
127.0.0.1:15074
4.tcp.eu.ngrok.io:6606
4.tcp.eu.ngrok.io:7707
4.tcp.eu.ngrok.io:8808
4.tcp.eu.ngrok.io:1604
4.tcp.eu.ngrok.io:14576
4.tcp.eu.ngrok.io:15074
7.tcp.eu.ngrok.io:6606
7.tcp.eu.ngrok.io:7707
7.tcp.eu.ngrok.io:8808
7.tcp.eu.ngrok.io:1604
7.tcp.eu.ngrok.io:14576
7.tcp.eu.ngrok.io:15074
COM Surrogate
-
delay
3
-
install
true
-
install_file
Microsoftfixer.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3192-133-0x0000000000F40000-0x0000000000F52000-memory.dmp asyncrat C:\Users\Admin\AppData\Roaming\Microsoftfixer.exe asyncrat C:\Users\Admin\AppData\Roaming\Microsoftfixer.exe asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
05b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation 05b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361.exe -
Executes dropped EXE 1 IoCs
Processes:
Microsoftfixer.exepid process 4472 Microsoftfixer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 948 timeout.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
05b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361.exepid process 3192 05b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361.exe 3192 05b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361.exe 3192 05b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361.exe 3192 05b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361.exe 3192 05b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361.exe 3192 05b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361.exe 3192 05b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361.exe 3192 05b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361.exe 3192 05b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361.exe 3192 05b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361.exe 3192 05b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361.exe 3192 05b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361.exe 3192 05b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361.exe 3192 05b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361.exe 3192 05b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361.exe 3192 05b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361.exe 3192 05b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361.exe 3192 05b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361.exe 3192 05b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361.exe 3192 05b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361.exe 3192 05b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361.exe 3192 05b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361.exe 3192 05b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
05b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361.exeMicrosoftfixer.exedescription pid process Token: SeDebugPrivilege 3192 05b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361.exe Token: SeDebugPrivilege 4472 Microsoftfixer.exe Token: SeDebugPrivilege 4472 Microsoftfixer.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
05b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361.execmd.execmd.exedescription pid process target process PID 3192 wrote to memory of 3956 3192 05b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361.exe cmd.exe PID 3192 wrote to memory of 3956 3192 05b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361.exe cmd.exe PID 3192 wrote to memory of 3956 3192 05b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361.exe cmd.exe PID 3192 wrote to memory of 3652 3192 05b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361.exe cmd.exe PID 3192 wrote to memory of 3652 3192 05b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361.exe cmd.exe PID 3192 wrote to memory of 3652 3192 05b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361.exe cmd.exe PID 3956 wrote to memory of 4116 3956 cmd.exe schtasks.exe PID 3956 wrote to memory of 4116 3956 cmd.exe schtasks.exe PID 3956 wrote to memory of 4116 3956 cmd.exe schtasks.exe PID 3652 wrote to memory of 948 3652 cmd.exe timeout.exe PID 3652 wrote to memory of 948 3652 cmd.exe timeout.exe PID 3652 wrote to memory of 948 3652 cmd.exe timeout.exe PID 3652 wrote to memory of 4472 3652 cmd.exe Microsoftfixer.exe PID 3652 wrote to memory of 4472 3652 cmd.exe Microsoftfixer.exe PID 3652 wrote to memory of 4472 3652 cmd.exe Microsoftfixer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\05b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361.exe"C:\Users\Admin\AppData\Local\Temp\05b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Microsoftfixer" /tr '"C:\Users\Admin\AppData\Roaming\Microsoftfixer.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Microsoftfixer" /tr '"C:\Users\Admin\AppData\Roaming\Microsoftfixer.exe"'3⤵
- Creates scheduled task(s)
PID:4116
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpE43A.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:948
-
-
C:\Users\Admin\AppData\Roaming\Microsoftfixer.exe"C:\Users\Admin\AppData\Roaming\Microsoftfixer.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4472
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
158B
MD5a0bd5c1ad2a4a7b72fe795c708b75697
SHA118a959e7c08e6a919dceb7a286fdd5e6314c1124
SHA2561ced53008aaf4dba8cc5a8cb15e8ec7c658424aec1196e07504467229b200c99
SHA512d2afb4ef0080219eb71425984e186ad95747c792cfcbea5f61189c600823b7848fa69b91ef2fbbca6548e7ae701d55e8b55fd01f91ba1c852b764010e1b6c931
-
Filesize
45KB
MD5a7f473e14b7c3e56561ff51f87b2f279
SHA1799bb3816916db3e6e92ff665c34e020cf444859
SHA25605b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361
SHA512eb118655b71c4b04cc9da4de9f943b98ce9c7ca562835a39a757a4e5f333da0fdcb39c34eec0f5351855875a301078ecc96126af32c17f4f1eff512c4cdc5e69
-
Filesize
45KB
MD5a7f473e14b7c3e56561ff51f87b2f279
SHA1799bb3816916db3e6e92ff665c34e020cf444859
SHA25605b1080658b2c922f7becdb930e8f9fc34822b27982a4d89784f335565df7361
SHA512eb118655b71c4b04cc9da4de9f943b98ce9c7ca562835a39a757a4e5f333da0fdcb39c34eec0f5351855875a301078ecc96126af32c17f4f1eff512c4cdc5e69