Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23-03-2023 09:39
Static task
static1
Behavioral task
behavioral1
Sample
Odeme22323.exe
Resource
win7-20230220-en
General
-
Target
Odeme22323.exe
-
Size
814KB
-
MD5
5cb296788614c0cbd3c912d8d2fdca36
-
SHA1
ff9d0762b965ac37faa9f4c3cf9faaa0d1ec57ae
-
SHA256
a68850f869d5a33aeedeb894e6ab9c743d35be9da971dea04361664fc00cca18
-
SHA512
5e4e918c13292f8bd4f349862a01e19dd03ae7e6f8a600c8a63b262c74584d1a1c4e2c4dd82402e4f0c4e8686ac110b217c2144af5df4709478b2960e177fe84
-
SSDEEP
24576:wNA3R5drX2D7hXzwX4acpkEFhVesL0P6NuxLHb:p5ETpLA6NcLHb
Malware Config
Extracted
asyncrat
0.5.7B
Mnock
mooroopecamroy.sytes.net:1452
mooroopecamroy.sytes.net:1432
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
crssi.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1844-162-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Odeme22323.exewagfhdg.sfx.exewagfhdg.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation Odeme22323.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation wagfhdg.sfx.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation wagfhdg.exe -
Executes dropped EXE 5 IoCs
Processes:
wagfhdg.sfx.exewagfhdg.exewagfhdg.execrssi.execrssi.exepid process 3188 wagfhdg.sfx.exe 4492 wagfhdg.exe 1844 wagfhdg.exe 1948 crssi.exe 1048 crssi.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
wagfhdg.execrssi.exedescription pid process target process PID 4492 set thread context of 1844 4492 wagfhdg.exe wagfhdg.exe PID 1948 set thread context of 1048 1948 crssi.exe crssi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2596 timeout.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
wagfhdg.exepid process 1844 wagfhdg.exe 1844 wagfhdg.exe 1844 wagfhdg.exe 1844 wagfhdg.exe 1844 wagfhdg.exe 1844 wagfhdg.exe 1844 wagfhdg.exe 1844 wagfhdg.exe 1844 wagfhdg.exe 1844 wagfhdg.exe 1844 wagfhdg.exe 1844 wagfhdg.exe 1844 wagfhdg.exe 1844 wagfhdg.exe 1844 wagfhdg.exe 1844 wagfhdg.exe 1844 wagfhdg.exe 1844 wagfhdg.exe 1844 wagfhdg.exe 1844 wagfhdg.exe 1844 wagfhdg.exe 1844 wagfhdg.exe 1844 wagfhdg.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
wagfhdg.exewagfhdg.execrssi.execrssi.exedescription pid process Token: SeDebugPrivilege 4492 wagfhdg.exe Token: SeDebugPrivilege 1844 wagfhdg.exe Token: SeDebugPrivilege 1948 crssi.exe Token: SeDebugPrivilege 1048 crssi.exe -
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
Odeme22323.execmd.exewagfhdg.sfx.exewagfhdg.exewagfhdg.execmd.execmd.execrssi.exedescription pid process target process PID 2188 wrote to memory of 5012 2188 Odeme22323.exe cmd.exe PID 2188 wrote to memory of 5012 2188 Odeme22323.exe cmd.exe PID 2188 wrote to memory of 5012 2188 Odeme22323.exe cmd.exe PID 5012 wrote to memory of 3188 5012 cmd.exe wagfhdg.sfx.exe PID 5012 wrote to memory of 3188 5012 cmd.exe wagfhdg.sfx.exe PID 5012 wrote to memory of 3188 5012 cmd.exe wagfhdg.sfx.exe PID 3188 wrote to memory of 4492 3188 wagfhdg.sfx.exe wagfhdg.exe PID 3188 wrote to memory of 4492 3188 wagfhdg.sfx.exe wagfhdg.exe PID 3188 wrote to memory of 4492 3188 wagfhdg.sfx.exe wagfhdg.exe PID 4492 wrote to memory of 1844 4492 wagfhdg.exe wagfhdg.exe PID 4492 wrote to memory of 1844 4492 wagfhdg.exe wagfhdg.exe PID 4492 wrote to memory of 1844 4492 wagfhdg.exe wagfhdg.exe PID 4492 wrote to memory of 1844 4492 wagfhdg.exe wagfhdg.exe PID 4492 wrote to memory of 1844 4492 wagfhdg.exe wagfhdg.exe PID 4492 wrote to memory of 1844 4492 wagfhdg.exe wagfhdg.exe PID 4492 wrote to memory of 1844 4492 wagfhdg.exe wagfhdg.exe PID 4492 wrote to memory of 1844 4492 wagfhdg.exe wagfhdg.exe PID 1844 wrote to memory of 2040 1844 wagfhdg.exe cmd.exe PID 1844 wrote to memory of 2040 1844 wagfhdg.exe cmd.exe PID 1844 wrote to memory of 2040 1844 wagfhdg.exe cmd.exe PID 1844 wrote to memory of 4000 1844 wagfhdg.exe cmd.exe PID 1844 wrote to memory of 4000 1844 wagfhdg.exe cmd.exe PID 1844 wrote to memory of 4000 1844 wagfhdg.exe cmd.exe PID 4000 wrote to memory of 2596 4000 cmd.exe timeout.exe PID 4000 wrote to memory of 2596 4000 cmd.exe timeout.exe PID 4000 wrote to memory of 2596 4000 cmd.exe timeout.exe PID 2040 wrote to memory of 1392 2040 cmd.exe schtasks.exe PID 2040 wrote to memory of 1392 2040 cmd.exe schtasks.exe PID 2040 wrote to memory of 1392 2040 cmd.exe schtasks.exe PID 4000 wrote to memory of 1948 4000 cmd.exe crssi.exe PID 4000 wrote to memory of 1948 4000 cmd.exe crssi.exe PID 4000 wrote to memory of 1948 4000 cmd.exe crssi.exe PID 1948 wrote to memory of 1048 1948 crssi.exe crssi.exe PID 1948 wrote to memory of 1048 1948 crssi.exe crssi.exe PID 1948 wrote to memory of 1048 1948 crssi.exe crssi.exe PID 1948 wrote to memory of 1048 1948 crssi.exe crssi.exe PID 1948 wrote to memory of 1048 1948 crssi.exe crssi.exe PID 1948 wrote to memory of 1048 1948 crssi.exe crssi.exe PID 1948 wrote to memory of 1048 1948 crssi.exe crssi.exe PID 1948 wrote to memory of 1048 1948 crssi.exe crssi.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Odeme22323.exe"C:\Users\Admin\AppData\Local\Temp\Odeme22323.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hliychjo.cmd" "2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\wagfhdg.sfx.exewagfhdg.sfx.exe -dC:\Users\Admin\AppData\Local\Temp -pldqboofhafugBbsmheutdbtrfcaszjnhjfehfegddeoqxapofdgyayhhddfdtgxdkqekecVohobthtigdge3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\wagfhdg.exe"C:\Users\Admin\AppData\Local\Temp\wagfhdg.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\wagfhdg.exeC:\Users\Admin\AppData\Local\Temp\wagfhdg.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "crssi" /tr '"C:\Users\Admin\AppData\Roaming\crssi.exe"' & exit6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "crssi" /tr '"C:\Users\Admin\AppData\Roaming\crssi.exe"'7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp3420.tmp.bat""6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 37⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\crssi.exe"C:\Users\Admin\AppData\Roaming\crssi.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\crssi.exeC:\Users\Admin\AppData\Roaming\crssi.exe8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\crssi.exe.logFilesize
706B
MD5d95c58e609838928f0f49837cab7dfd2
SHA155e7139a1e3899195b92ed8771d1ca2c7d53c916
SHA2560407c814aef0d62aec7fd39b7c2f614746f0d8ff41f8ef957736f520f14b0339
SHA512405310b29a833604c6627063bfdcf055a197e01f633ef21da238f1a6415a02e21315d689b4a6669db23e82152bed6f3492afb60963e6b2a0e9bb2ac09a480b5d
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\wagfhdg.exe.logFilesize
706B
MD5d95c58e609838928f0f49837cab7dfd2
SHA155e7139a1e3899195b92ed8771d1ca2c7d53c916
SHA2560407c814aef0d62aec7fd39b7c2f614746f0d8ff41f8ef957736f520f14b0339
SHA512405310b29a833604c6627063bfdcf055a197e01f633ef21da238f1a6415a02e21315d689b4a6669db23e82152bed6f3492afb60963e6b2a0e9bb2ac09a480b5d
-
C:\Users\Admin\AppData\Local\Temp\hliychjo.cmdFilesize
10KB
MD5950e9f9672dd5df3d3c60a21936ab878
SHA1b0d10b65dc7d6bb309445b92ee00763aa72acc2a
SHA256ffd2a2c09552ae541d9cdc5c7d6d98b9aa443c26bfea83f658636cc000159fa8
SHA512058962e872d636341795af3a168b392c413b4e976d9a4b8af0c10b607e082acaa09a716d2bfa084b9f8822b240ac10520eda3369699098457e7d81e81b26e6ba
-
C:\Users\Admin\AppData\Local\Temp\tmp3420.tmp.batFilesize
149B
MD595645c035921b21a9970207e3e935650
SHA1e88937cc91180130d90f7e601c3d136b06a1620b
SHA256476801488f082ece6afbf20a90a73396325cbf94ede4b35e2cecc8e4a4d675bc
SHA512400468c22f112d4dc85872d7c9d5ccb4fef6b4244d0efc165a1c4063e73e33a83f53137b208753a7aedb3b8e3b805c6945706bd76fd42a075eaeaddf9779212d
-
C:\Users\Admin\AppData\Local\Temp\wagfhdg.exeFilesize
227KB
MD51de4ee1525ce376c03e493cd3ca566de
SHA146afa5761516c2e99833d7eb131ef403dc57ae1f
SHA2564c602cfc8d0fed8bf374f651358a3d3f9d99f84b2c333a2b516f6145b64a4f21
SHA51269c2eaa784e4036b673dded9bbf34cd6f47c23e074307341f7656ec91b1cf063aae5eeb3e0215e32869a56882684930dec50905f995e66cfce0a473abd31a71e
-
C:\Users\Admin\AppData\Local\Temp\wagfhdg.exeFilesize
227KB
MD51de4ee1525ce376c03e493cd3ca566de
SHA146afa5761516c2e99833d7eb131ef403dc57ae1f
SHA2564c602cfc8d0fed8bf374f651358a3d3f9d99f84b2c333a2b516f6145b64a4f21
SHA51269c2eaa784e4036b673dded9bbf34cd6f47c23e074307341f7656ec91b1cf063aae5eeb3e0215e32869a56882684930dec50905f995e66cfce0a473abd31a71e
-
C:\Users\Admin\AppData\Local\Temp\wagfhdg.exeFilesize
227KB
MD51de4ee1525ce376c03e493cd3ca566de
SHA146afa5761516c2e99833d7eb131ef403dc57ae1f
SHA2564c602cfc8d0fed8bf374f651358a3d3f9d99f84b2c333a2b516f6145b64a4f21
SHA51269c2eaa784e4036b673dded9bbf34cd6f47c23e074307341f7656ec91b1cf063aae5eeb3e0215e32869a56882684930dec50905f995e66cfce0a473abd31a71e
-
C:\Users\Admin\AppData\Local\Temp\wagfhdg.exeFilesize
227KB
MD51de4ee1525ce376c03e493cd3ca566de
SHA146afa5761516c2e99833d7eb131ef403dc57ae1f
SHA2564c602cfc8d0fed8bf374f651358a3d3f9d99f84b2c333a2b516f6145b64a4f21
SHA51269c2eaa784e4036b673dded9bbf34cd6f47c23e074307341f7656ec91b1cf063aae5eeb3e0215e32869a56882684930dec50905f995e66cfce0a473abd31a71e
-
C:\Users\Admin\AppData\Local\Temp\wagfhdg.sfx.exeFilesize
624KB
MD5745b22b339c45b4d0955f8e776dfd729
SHA15603f977b25900da600d4fb8dd2fc659afe6f7cd
SHA256fecdac4a0a26f13f4089497be9e56de44dd6ce4d2a645ef992bdc817e9546a1f
SHA5122ea4528adbdff20f4af51823d9e52714e79d5eb8fc4ea01889c398b920dfe1cf2edbb6479b1fc90f9f3477a9a9887a513db03b16013dab7fb78d493566307d64
-
C:\Users\Admin\AppData\Local\Temp\wagfhdg.sfx.exeFilesize
624KB
MD5745b22b339c45b4d0955f8e776dfd729
SHA15603f977b25900da600d4fb8dd2fc659afe6f7cd
SHA256fecdac4a0a26f13f4089497be9e56de44dd6ce4d2a645ef992bdc817e9546a1f
SHA5122ea4528adbdff20f4af51823d9e52714e79d5eb8fc4ea01889c398b920dfe1cf2edbb6479b1fc90f9f3477a9a9887a513db03b16013dab7fb78d493566307d64
-
C:\Users\Admin\AppData\Roaming\crssi.exeFilesize
227KB
MD51de4ee1525ce376c03e493cd3ca566de
SHA146afa5761516c2e99833d7eb131ef403dc57ae1f
SHA2564c602cfc8d0fed8bf374f651358a3d3f9d99f84b2c333a2b516f6145b64a4f21
SHA51269c2eaa784e4036b673dded9bbf34cd6f47c23e074307341f7656ec91b1cf063aae5eeb3e0215e32869a56882684930dec50905f995e66cfce0a473abd31a71e
-
C:\Users\Admin\AppData\Roaming\crssi.exeFilesize
227KB
MD51de4ee1525ce376c03e493cd3ca566de
SHA146afa5761516c2e99833d7eb131ef403dc57ae1f
SHA2564c602cfc8d0fed8bf374f651358a3d3f9d99f84b2c333a2b516f6145b64a4f21
SHA51269c2eaa784e4036b673dded9bbf34cd6f47c23e074307341f7656ec91b1cf063aae5eeb3e0215e32869a56882684930dec50905f995e66cfce0a473abd31a71e
-
C:\Users\Admin\AppData\Roaming\crssi.exeFilesize
227KB
MD51de4ee1525ce376c03e493cd3ca566de
SHA146afa5761516c2e99833d7eb131ef403dc57ae1f
SHA2564c602cfc8d0fed8bf374f651358a3d3f9d99f84b2c333a2b516f6145b64a4f21
SHA51269c2eaa784e4036b673dded9bbf34cd6f47c23e074307341f7656ec91b1cf063aae5eeb3e0215e32869a56882684930dec50905f995e66cfce0a473abd31a71e
-
memory/1048-180-0x0000000005870000-0x0000000005880000-memory.dmpFilesize
64KB
-
memory/1048-181-0x0000000005870000-0x0000000005880000-memory.dmpFilesize
64KB
-
memory/1844-162-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1844-166-0x00000000057B0000-0x00000000057C0000-memory.dmpFilesize
64KB
-
memory/1844-167-0x0000000005840000-0x00000000058A6000-memory.dmpFilesize
408KB
-
memory/1948-175-0x0000000005840000-0x0000000005850000-memory.dmpFilesize
64KB
-
memory/4492-161-0x000000000DF60000-0x000000000DFF2000-memory.dmpFilesize
584KB
-
memory/4492-160-0x000000000E470000-0x000000000EA14000-memory.dmpFilesize
5.6MB
-
memory/4492-159-0x000000000DE20000-0x000000000DEBC000-memory.dmpFilesize
624KB
-
memory/4492-158-0x0000000005250000-0x0000000005260000-memory.dmpFilesize
64KB
-
memory/4492-157-0x0000000000820000-0x000000000085E000-memory.dmpFilesize
248KB