Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
08-04-2023 16:31
Behavioral task
behavioral1
Sample
thasupreme2(2).exe
Resource
win7-20230220-en
General
-
Target
thasupreme2(2).exe
-
Size
48KB
-
MD5
f66940a7ab4f7db4534b0da7a155741d
-
SHA1
3b0ec707455c8c0b2a465a386b68634b41afe4e2
-
SHA256
e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de
-
SHA512
1ab6588d07b77e852265285e8b86c598638823628d03759e2f116455bce3adf628165eb79eee6517d3f3227879009e72d7de69086e0e16a98f4d492b3b354063
-
SSDEEP
768:2duRtILkWAA+jiYH/lDB2Oaig8Yblge1+A8aLfRvEgK/JYBVc6KN:2duNoYH/l92OSzbifoJnkJYBVclN
Malware Config
Extracted
asyncrat
1.0.7
System
147.185.221.180:1491
llfesnjkqacrdhbtbu
-
delay
1
-
install
true
-
install_file
THASUPREMETROJAN.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1728-54-0x0000000000880000-0x0000000000892000-memory.dmp asyncrat C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe asyncrat C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe asyncrat behavioral1/memory/1696-68-0x0000000000370000-0x0000000000382000-memory.dmp asyncrat -
Executes dropped EXE 1 IoCs
Processes:
THASUPREMETROJAN.exepid process 1696 THASUPREMETROJAN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 516 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
thasupreme2(2).exeTHASUPREMETROJAN.exepid process 1728 thasupreme2(2).exe 1728 thasupreme2(2).exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe 1696 THASUPREMETROJAN.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
thasupreme2(2).exeTHASUPREMETROJAN.exedescription pid process Token: SeDebugPrivilege 1728 thasupreme2(2).exe Token: SeDebugPrivilege 1728 thasupreme2(2).exe Token: SeDebugPrivilege 1696 THASUPREMETROJAN.exe Token: SeDebugPrivilege 1696 THASUPREMETROJAN.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
thasupreme2(2).execmd.execmd.exedescription pid process target process PID 1728 wrote to memory of 2032 1728 thasupreme2(2).exe cmd.exe PID 1728 wrote to memory of 2032 1728 thasupreme2(2).exe cmd.exe PID 1728 wrote to memory of 2032 1728 thasupreme2(2).exe cmd.exe PID 1728 wrote to memory of 1256 1728 thasupreme2(2).exe cmd.exe PID 1728 wrote to memory of 1256 1728 thasupreme2(2).exe cmd.exe PID 1728 wrote to memory of 1256 1728 thasupreme2(2).exe cmd.exe PID 2032 wrote to memory of 564 2032 cmd.exe schtasks.exe PID 2032 wrote to memory of 564 2032 cmd.exe schtasks.exe PID 2032 wrote to memory of 564 2032 cmd.exe schtasks.exe PID 1256 wrote to memory of 516 1256 cmd.exe timeout.exe PID 1256 wrote to memory of 516 1256 cmd.exe timeout.exe PID 1256 wrote to memory of 516 1256 cmd.exe timeout.exe PID 1256 wrote to memory of 1696 1256 cmd.exe THASUPREMETROJAN.exe PID 1256 wrote to memory of 1696 1256 cmd.exe THASUPREMETROJAN.exe PID 1256 wrote to memory of 1696 1256 cmd.exe THASUPREMETROJAN.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\thasupreme2(2).exe"C:\Users\Admin\AppData\Local\Temp\thasupreme2(2).exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "THASUPREMETROJAN" /tr '"C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "THASUPREMETROJAN" /tr '"C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe"'3⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp16CC.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe"C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp16CC.tmp.batFilesize
160B
MD535fa79d70635697c4f1942ac8ab9a253
SHA1835d8289e4f49014778164aab549c30f3aa253d9
SHA256f2f173dedb8abc258c8fe89c9ed96f482b69dc20bbcf3307405afb93a91fa46b
SHA5128a4587e444c908bfb31bcf5dc700185ef6de4d1c6f5346eb0c57ae6f6fa5f0798d1595903d3933d6a27f53805553b0882eedfc63b5c53a4456d6959b1c1653d9
-
C:\Users\Admin\AppData\Local\Temp\tmp16CC.tmp.batFilesize
160B
MD535fa79d70635697c4f1942ac8ab9a253
SHA1835d8289e4f49014778164aab549c30f3aa253d9
SHA256f2f173dedb8abc258c8fe89c9ed96f482b69dc20bbcf3307405afb93a91fa46b
SHA5128a4587e444c908bfb31bcf5dc700185ef6de4d1c6f5346eb0c57ae6f6fa5f0798d1595903d3933d6a27f53805553b0882eedfc63b5c53a4456d6959b1c1653d9
-
C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exeFilesize
48KB
MD5f66940a7ab4f7db4534b0da7a155741d
SHA13b0ec707455c8c0b2a465a386b68634b41afe4e2
SHA256e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de
SHA5121ab6588d07b77e852265285e8b86c598638823628d03759e2f116455bce3adf628165eb79eee6517d3f3227879009e72d7de69086e0e16a98f4d492b3b354063
-
C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exeFilesize
48KB
MD5f66940a7ab4f7db4534b0da7a155741d
SHA13b0ec707455c8c0b2a465a386b68634b41afe4e2
SHA256e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de
SHA5121ab6588d07b77e852265285e8b86c598638823628d03759e2f116455bce3adf628165eb79eee6517d3f3227879009e72d7de69086e0e16a98f4d492b3b354063
-
memory/1696-68-0x0000000000370000-0x0000000000382000-memory.dmpFilesize
72KB
-
memory/1696-69-0x000000001B120000-0x000000001B1A0000-memory.dmpFilesize
512KB
-
memory/1696-87-0x000000001B120000-0x000000001B1A0000-memory.dmpFilesize
512KB
-
memory/1728-54-0x0000000000880000-0x0000000000892000-memory.dmpFilesize
72KB
-
memory/1728-55-0x000000001AF10000-0x000000001AF90000-memory.dmpFilesize
512KB