Analysis
-
max time kernel
135s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23-03-2023 12:48
Static task
static1
Behavioral task
behavioral1
Sample
Odeme22323.exe
Resource
win7-20230220-en
General
-
Target
Odeme22323.exe
-
Size
814KB
-
MD5
5cb296788614c0cbd3c912d8d2fdca36
-
SHA1
ff9d0762b965ac37faa9f4c3cf9faaa0d1ec57ae
-
SHA256
a68850f869d5a33aeedeb894e6ab9c743d35be9da971dea04361664fc00cca18
-
SHA512
5e4e918c13292f8bd4f349862a01e19dd03ae7e6f8a600c8a63b262c74584d1a1c4e2c4dd82402e4f0c4e8686ac110b217c2144af5df4709478b2960e177fe84
-
SSDEEP
24576:wNA3R5drX2D7hXzwX4acpkEFhVesL0P6NuxLHb:p5ETpLA6NcLHb
Malware Config
Extracted
asyncrat
0.5.7B
Mnock
mooroopecamroy.sytes.net:1452
mooroopecamroy.sytes.net:1432
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
crssi.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4500-162-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
wagfhdg.sfx.exewagfhdg.exeOdeme22323.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation wagfhdg.sfx.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation wagfhdg.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation Odeme22323.exe -
Executes dropped EXE 5 IoCs
Processes:
wagfhdg.sfx.exewagfhdg.exewagfhdg.execrssi.execrssi.exepid process 2956 wagfhdg.sfx.exe 1680 wagfhdg.exe 4500 wagfhdg.exe 1992 crssi.exe 4124 crssi.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
wagfhdg.execrssi.exedescription pid process target process PID 1680 set thread context of 4500 1680 wagfhdg.exe wagfhdg.exe PID 1992 set thread context of 4124 1992 crssi.exe crssi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 3124 timeout.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
wagfhdg.exepid process 4500 wagfhdg.exe 4500 wagfhdg.exe 4500 wagfhdg.exe 4500 wagfhdg.exe 4500 wagfhdg.exe 4500 wagfhdg.exe 4500 wagfhdg.exe 4500 wagfhdg.exe 4500 wagfhdg.exe 4500 wagfhdg.exe 4500 wagfhdg.exe 4500 wagfhdg.exe 4500 wagfhdg.exe 4500 wagfhdg.exe 4500 wagfhdg.exe 4500 wagfhdg.exe 4500 wagfhdg.exe 4500 wagfhdg.exe 4500 wagfhdg.exe 4500 wagfhdg.exe 4500 wagfhdg.exe 4500 wagfhdg.exe 4500 wagfhdg.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
wagfhdg.exewagfhdg.execrssi.execrssi.exedescription pid process Token: SeDebugPrivilege 1680 wagfhdg.exe Token: SeDebugPrivilege 4500 wagfhdg.exe Token: SeDebugPrivilege 1992 crssi.exe Token: SeDebugPrivilege 4124 crssi.exe -
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
Odeme22323.execmd.exewagfhdg.sfx.exewagfhdg.exewagfhdg.execmd.execmd.execrssi.exedescription pid process target process PID 3432 wrote to memory of 1744 3432 Odeme22323.exe cmd.exe PID 3432 wrote to memory of 1744 3432 Odeme22323.exe cmd.exe PID 3432 wrote to memory of 1744 3432 Odeme22323.exe cmd.exe PID 1744 wrote to memory of 2956 1744 cmd.exe wagfhdg.sfx.exe PID 1744 wrote to memory of 2956 1744 cmd.exe wagfhdg.sfx.exe PID 1744 wrote to memory of 2956 1744 cmd.exe wagfhdg.sfx.exe PID 2956 wrote to memory of 1680 2956 wagfhdg.sfx.exe wagfhdg.exe PID 2956 wrote to memory of 1680 2956 wagfhdg.sfx.exe wagfhdg.exe PID 2956 wrote to memory of 1680 2956 wagfhdg.sfx.exe wagfhdg.exe PID 1680 wrote to memory of 4500 1680 wagfhdg.exe wagfhdg.exe PID 1680 wrote to memory of 4500 1680 wagfhdg.exe wagfhdg.exe PID 1680 wrote to memory of 4500 1680 wagfhdg.exe wagfhdg.exe PID 1680 wrote to memory of 4500 1680 wagfhdg.exe wagfhdg.exe PID 1680 wrote to memory of 4500 1680 wagfhdg.exe wagfhdg.exe PID 1680 wrote to memory of 4500 1680 wagfhdg.exe wagfhdg.exe PID 1680 wrote to memory of 4500 1680 wagfhdg.exe wagfhdg.exe PID 1680 wrote to memory of 4500 1680 wagfhdg.exe wagfhdg.exe PID 4500 wrote to memory of 4728 4500 wagfhdg.exe cmd.exe PID 4500 wrote to memory of 4728 4500 wagfhdg.exe cmd.exe PID 4500 wrote to memory of 4728 4500 wagfhdg.exe cmd.exe PID 4500 wrote to memory of 2756 4500 wagfhdg.exe cmd.exe PID 4500 wrote to memory of 2756 4500 wagfhdg.exe cmd.exe PID 4500 wrote to memory of 2756 4500 wagfhdg.exe cmd.exe PID 2756 wrote to memory of 3124 2756 cmd.exe timeout.exe PID 2756 wrote to memory of 3124 2756 cmd.exe timeout.exe PID 2756 wrote to memory of 3124 2756 cmd.exe timeout.exe PID 4728 wrote to memory of 3068 4728 cmd.exe schtasks.exe PID 4728 wrote to memory of 3068 4728 cmd.exe schtasks.exe PID 4728 wrote to memory of 3068 4728 cmd.exe schtasks.exe PID 2756 wrote to memory of 1992 2756 cmd.exe crssi.exe PID 2756 wrote to memory of 1992 2756 cmd.exe crssi.exe PID 2756 wrote to memory of 1992 2756 cmd.exe crssi.exe PID 1992 wrote to memory of 4124 1992 crssi.exe crssi.exe PID 1992 wrote to memory of 4124 1992 crssi.exe crssi.exe PID 1992 wrote to memory of 4124 1992 crssi.exe crssi.exe PID 1992 wrote to memory of 4124 1992 crssi.exe crssi.exe PID 1992 wrote to memory of 4124 1992 crssi.exe crssi.exe PID 1992 wrote to memory of 4124 1992 crssi.exe crssi.exe PID 1992 wrote to memory of 4124 1992 crssi.exe crssi.exe PID 1992 wrote to memory of 4124 1992 crssi.exe crssi.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Odeme22323.exe"C:\Users\Admin\AppData\Local\Temp\Odeme22323.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hliychjo.cmd" "2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\wagfhdg.sfx.exewagfhdg.sfx.exe -dC:\Users\Admin\AppData\Local\Temp -pldqboofhafugBbsmheutdbtrfcaszjnhjfehfegddeoqxapofdgyayhhddfdtgxdkqekecVohobthtigdge3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\wagfhdg.exe"C:\Users\Admin\AppData\Local\Temp\wagfhdg.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\wagfhdg.exeC:\Users\Admin\AppData\Local\Temp\wagfhdg.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "crssi" /tr '"C:\Users\Admin\AppData\Roaming\crssi.exe"' & exit6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "crssi" /tr '"C:\Users\Admin\AppData\Roaming\crssi.exe"'7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp21EF.tmp.bat""6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 37⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\crssi.exe"C:\Users\Admin\AppData\Roaming\crssi.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\crssi.exeC:\Users\Admin\AppData\Roaming\crssi.exe8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\crssi.exe.logFilesize
706B
MD5d95c58e609838928f0f49837cab7dfd2
SHA155e7139a1e3899195b92ed8771d1ca2c7d53c916
SHA2560407c814aef0d62aec7fd39b7c2f614746f0d8ff41f8ef957736f520f14b0339
SHA512405310b29a833604c6627063bfdcf055a197e01f633ef21da238f1a6415a02e21315d689b4a6669db23e82152bed6f3492afb60963e6b2a0e9bb2ac09a480b5d
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\wagfhdg.exe.logFilesize
706B
MD5d95c58e609838928f0f49837cab7dfd2
SHA155e7139a1e3899195b92ed8771d1ca2c7d53c916
SHA2560407c814aef0d62aec7fd39b7c2f614746f0d8ff41f8ef957736f520f14b0339
SHA512405310b29a833604c6627063bfdcf055a197e01f633ef21da238f1a6415a02e21315d689b4a6669db23e82152bed6f3492afb60963e6b2a0e9bb2ac09a480b5d
-
C:\Users\Admin\AppData\Local\Temp\hliychjo.cmdFilesize
10KB
MD5950e9f9672dd5df3d3c60a21936ab878
SHA1b0d10b65dc7d6bb309445b92ee00763aa72acc2a
SHA256ffd2a2c09552ae541d9cdc5c7d6d98b9aa443c26bfea83f658636cc000159fa8
SHA512058962e872d636341795af3a168b392c413b4e976d9a4b8af0c10b607e082acaa09a716d2bfa084b9f8822b240ac10520eda3369699098457e7d81e81b26e6ba
-
C:\Users\Admin\AppData\Local\Temp\tmp21EF.tmp.batFilesize
149B
MD53a4c93fb1c80f80278695b5a5a51210f
SHA112ad88516e01f09a0309ed69d877ff547fcefff4
SHA2564469241150920fdd8c8fef6039b4d9b69f37acde232b146b1cc086efdaed4e97
SHA512665c408f4baa527e2f53a629248fdb306ab05c10b1ad4f39aa5d8b4386f9f9cca1286fc7306f2ef312584bd2c848d1503812d1d60de77dcc2925172117ad998f
-
C:\Users\Admin\AppData\Local\Temp\wagfhdg.exeFilesize
227KB
MD51de4ee1525ce376c03e493cd3ca566de
SHA146afa5761516c2e99833d7eb131ef403dc57ae1f
SHA2564c602cfc8d0fed8bf374f651358a3d3f9d99f84b2c333a2b516f6145b64a4f21
SHA51269c2eaa784e4036b673dded9bbf34cd6f47c23e074307341f7656ec91b1cf063aae5eeb3e0215e32869a56882684930dec50905f995e66cfce0a473abd31a71e
-
C:\Users\Admin\AppData\Local\Temp\wagfhdg.exeFilesize
227KB
MD51de4ee1525ce376c03e493cd3ca566de
SHA146afa5761516c2e99833d7eb131ef403dc57ae1f
SHA2564c602cfc8d0fed8bf374f651358a3d3f9d99f84b2c333a2b516f6145b64a4f21
SHA51269c2eaa784e4036b673dded9bbf34cd6f47c23e074307341f7656ec91b1cf063aae5eeb3e0215e32869a56882684930dec50905f995e66cfce0a473abd31a71e
-
C:\Users\Admin\AppData\Local\Temp\wagfhdg.exeFilesize
227KB
MD51de4ee1525ce376c03e493cd3ca566de
SHA146afa5761516c2e99833d7eb131ef403dc57ae1f
SHA2564c602cfc8d0fed8bf374f651358a3d3f9d99f84b2c333a2b516f6145b64a4f21
SHA51269c2eaa784e4036b673dded9bbf34cd6f47c23e074307341f7656ec91b1cf063aae5eeb3e0215e32869a56882684930dec50905f995e66cfce0a473abd31a71e
-
C:\Users\Admin\AppData\Local\Temp\wagfhdg.exeFilesize
227KB
MD51de4ee1525ce376c03e493cd3ca566de
SHA146afa5761516c2e99833d7eb131ef403dc57ae1f
SHA2564c602cfc8d0fed8bf374f651358a3d3f9d99f84b2c333a2b516f6145b64a4f21
SHA51269c2eaa784e4036b673dded9bbf34cd6f47c23e074307341f7656ec91b1cf063aae5eeb3e0215e32869a56882684930dec50905f995e66cfce0a473abd31a71e
-
C:\Users\Admin\AppData\Local\Temp\wagfhdg.sfx.exeFilesize
624KB
MD5745b22b339c45b4d0955f8e776dfd729
SHA15603f977b25900da600d4fb8dd2fc659afe6f7cd
SHA256fecdac4a0a26f13f4089497be9e56de44dd6ce4d2a645ef992bdc817e9546a1f
SHA5122ea4528adbdff20f4af51823d9e52714e79d5eb8fc4ea01889c398b920dfe1cf2edbb6479b1fc90f9f3477a9a9887a513db03b16013dab7fb78d493566307d64
-
C:\Users\Admin\AppData\Local\Temp\wagfhdg.sfx.exeFilesize
624KB
MD5745b22b339c45b4d0955f8e776dfd729
SHA15603f977b25900da600d4fb8dd2fc659afe6f7cd
SHA256fecdac4a0a26f13f4089497be9e56de44dd6ce4d2a645ef992bdc817e9546a1f
SHA5122ea4528adbdff20f4af51823d9e52714e79d5eb8fc4ea01889c398b920dfe1cf2edbb6479b1fc90f9f3477a9a9887a513db03b16013dab7fb78d493566307d64
-
C:\Users\Admin\AppData\Roaming\crssi.exeFilesize
227KB
MD51de4ee1525ce376c03e493cd3ca566de
SHA146afa5761516c2e99833d7eb131ef403dc57ae1f
SHA2564c602cfc8d0fed8bf374f651358a3d3f9d99f84b2c333a2b516f6145b64a4f21
SHA51269c2eaa784e4036b673dded9bbf34cd6f47c23e074307341f7656ec91b1cf063aae5eeb3e0215e32869a56882684930dec50905f995e66cfce0a473abd31a71e
-
C:\Users\Admin\AppData\Roaming\crssi.exeFilesize
227KB
MD51de4ee1525ce376c03e493cd3ca566de
SHA146afa5761516c2e99833d7eb131ef403dc57ae1f
SHA2564c602cfc8d0fed8bf374f651358a3d3f9d99f84b2c333a2b516f6145b64a4f21
SHA51269c2eaa784e4036b673dded9bbf34cd6f47c23e074307341f7656ec91b1cf063aae5eeb3e0215e32869a56882684930dec50905f995e66cfce0a473abd31a71e
-
C:\Users\Admin\AppData\Roaming\crssi.exeFilesize
227KB
MD51de4ee1525ce376c03e493cd3ca566de
SHA146afa5761516c2e99833d7eb131ef403dc57ae1f
SHA2564c602cfc8d0fed8bf374f651358a3d3f9d99f84b2c333a2b516f6145b64a4f21
SHA51269c2eaa784e4036b673dded9bbf34cd6f47c23e074307341f7656ec91b1cf063aae5eeb3e0215e32869a56882684930dec50905f995e66cfce0a473abd31a71e
-
memory/1680-161-0x0000000007640000-0x00000000076D2000-memory.dmpFilesize
584KB
-
memory/1680-160-0x0000000005040000-0x0000000005050000-memory.dmpFilesize
64KB
-
memory/1680-159-0x0000000007BF0000-0x0000000008194000-memory.dmpFilesize
5.6MB
-
memory/1680-158-0x00000000075A0000-0x000000000763C000-memory.dmpFilesize
624KB
-
memory/1680-157-0x0000000000650000-0x000000000068E000-memory.dmpFilesize
248KB
-
memory/1992-175-0x0000000005360000-0x0000000005370000-memory.dmpFilesize
64KB
-
memory/4124-180-0x0000000004D70000-0x0000000004D80000-memory.dmpFilesize
64KB
-
memory/4124-181-0x0000000004D70000-0x0000000004D80000-memory.dmpFilesize
64KB
-
memory/4500-162-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4500-166-0x0000000004E70000-0x0000000004E80000-memory.dmpFilesize
64KB
-
memory/4500-167-0x0000000004E80000-0x0000000004EE6000-memory.dmpFilesize
408KB