Analysis
-
max time kernel
77s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
26-03-2023 07:27
Static task
static1
Behavioral task
behavioral1
Sample
1f96941dc2540d33d143719ec73bb9cc.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1f96941dc2540d33d143719ec73bb9cc.exe
Resource
win10v2004-20230221-en
General
-
Target
1f96941dc2540d33d143719ec73bb9cc.exe
-
Size
1.7MB
-
MD5
1f96941dc2540d33d143719ec73bb9cc
-
SHA1
c89543d4efcb4e8f74a2716dcb9bb2fbd2f94cee
-
SHA256
6385b31519c35421fe238e9e51ff6aee15c9e3719eaeb1d86aaea0b074be687b
-
SHA512
7bb6cd9e680b5f851249b1d77c507e2f7623af1828bbdfb4ac13e29c92b484bf02c906de23cfa8853ebf390ebc87380bd87d15a8bfb2c1487eb0fa644b0dea80
-
SSDEEP
24576:LR9Ot09OX7l348A5NyRQ80zEbiRRCRnOO8v6JnOk6PzdNhCQa61NEzMvPJgqqaF6:hz+Rn0tqaWxuGND
Malware Config
Extracted
asyncrat
0.5.7B
ZF
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:11334
139.180.143.50:6606
139.180.143.50:7707
139.180.143.50:8808
139.180.143.50:11334
GPT_Conn4
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2040-76-0x000000001B2B0000-0x000000001B2C2000-memory.dmp asyncrat -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
1f96941dc2540d33d143719ec73bb9cc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows\CurrentVersion\Run\Hfxioqcy = "\"C:\\Users\\Admin\\AppData\\Roaming\\Eacayjaokvn\\Hfxioqcy.exe\"" 1f96941dc2540d33d143719ec73bb9cc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 784 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exe1f96941dc2540d33d143719ec73bb9cc.exedescription pid process Token: SeDebugPrivilege 784 powershell.exe Token: SeDebugPrivilege 2040 1f96941dc2540d33d143719ec73bb9cc.exe Token: SeDebugPrivilege 2040 1f96941dc2540d33d143719ec73bb9cc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
1f96941dc2540d33d143719ec73bb9cc.exedescription pid process target process PID 2040 wrote to memory of 784 2040 1f96941dc2540d33d143719ec73bb9cc.exe powershell.exe PID 2040 wrote to memory of 784 2040 1f96941dc2540d33d143719ec73bb9cc.exe powershell.exe PID 2040 wrote to memory of 784 2040 1f96941dc2540d33d143719ec73bb9cc.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f96941dc2540d33d143719ec73bb9cc.exe"C:\Users\Admin\AppData\Local\Temp\1f96941dc2540d33d143719ec73bb9cc.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/784-73-0x0000000002450000-0x00000000024D0000-memory.dmpFilesize
512KB
-
memory/784-65-0x0000000002220000-0x0000000002228000-memory.dmpFilesize
32KB
-
memory/784-66-0x0000000002450000-0x00000000024D0000-memory.dmpFilesize
512KB
-
memory/784-67-0x0000000002450000-0x00000000024D0000-memory.dmpFilesize
512KB
-
memory/784-74-0x0000000002450000-0x00000000024D0000-memory.dmpFilesize
512KB
-
memory/784-72-0x0000000002450000-0x00000000024D0000-memory.dmpFilesize
512KB
-
memory/784-64-0x000000001B120000-0x000000001B402000-memory.dmpFilesize
2.9MB
-
memory/784-68-0x0000000002450000-0x00000000024D0000-memory.dmpFilesize
512KB
-
memory/784-71-0x0000000002450000-0x00000000024D0000-memory.dmpFilesize
512KB
-
memory/2040-59-0x000000001BD60000-0x000000001BDE0000-memory.dmpFilesize
512KB
-
memory/2040-76-0x000000001B2B0000-0x000000001B2C2000-memory.dmpFilesize
72KB
-
memory/2040-69-0x000000001BD60000-0x000000001BDE0000-memory.dmpFilesize
512KB
-
memory/2040-70-0x000000001BD60000-0x000000001BDE0000-memory.dmpFilesize
512KB
-
memory/2040-78-0x00000000025E0000-0x00000000025F5000-memory.dmpFilesize
84KB
-
memory/2040-55-0x0000000000550000-0x0000000000575000-memory.dmpFilesize
148KB
-
memory/2040-54-0x0000000000F10000-0x00000000010CE000-memory.dmpFilesize
1.7MB
-
memory/2040-58-0x000000001BF30000-0x000000001BFC2000-memory.dmpFilesize
584KB
-
memory/2040-57-0x000000001BDE0000-0x000000001BF2C000-memory.dmpFilesize
1.3MB
-
memory/2040-77-0x0000000000D10000-0x0000000000D11000-memory.dmpFilesize
4KB
-
memory/2040-56-0x000000001BD60000-0x000000001BDE0000-memory.dmpFilesize
512KB