Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08-04-2023 16:31
Behavioral task
behavioral1
Sample
thasupreme2(2).exe
Resource
win7-20230220-en
General
-
Target
thasupreme2(2).exe
-
Size
48KB
-
MD5
f66940a7ab4f7db4534b0da7a155741d
-
SHA1
3b0ec707455c8c0b2a465a386b68634b41afe4e2
-
SHA256
e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de
-
SHA512
1ab6588d07b77e852265285e8b86c598638823628d03759e2f116455bce3adf628165eb79eee6517d3f3227879009e72d7de69086e0e16a98f4d492b3b354063
-
SSDEEP
768:2duRtILkWAA+jiYH/lDB2Oaig8Yblge1+A8aLfRvEgK/JYBVc6KN:2duNoYH/l92OSzbifoJnkJYBVclN
Malware Config
Extracted
asyncrat
1.0.7
System
147.185.221.180:1491
llfesnjkqacrdhbtbu
-
delay
1
-
install
true
-
install_file
THASUPREMETROJAN.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1312-133-0x0000000000E30000-0x0000000000E42000-memory.dmp asyncrat C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe asyncrat C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
thasupreme2(2).exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation thasupreme2(2).exe -
Executes dropped EXE 1 IoCs
Processes:
THASUPREMETROJAN.exepid process 1272 THASUPREMETROJAN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 3500 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
thasupreme2(2).exeTHASUPREMETROJAN.exepid process 1312 thasupreme2(2).exe 1312 thasupreme2(2).exe 1312 thasupreme2(2).exe 1312 thasupreme2(2).exe 1312 thasupreme2(2).exe 1312 thasupreme2(2).exe 1312 thasupreme2(2).exe 1312 thasupreme2(2).exe 1312 thasupreme2(2).exe 1312 thasupreme2(2).exe 1312 thasupreme2(2).exe 1312 thasupreme2(2).exe 1312 thasupreme2(2).exe 1312 thasupreme2(2).exe 1312 thasupreme2(2).exe 1312 thasupreme2(2).exe 1312 thasupreme2(2).exe 1312 thasupreme2(2).exe 1312 thasupreme2(2).exe 1312 thasupreme2(2).exe 1312 thasupreme2(2).exe 1312 thasupreme2(2).exe 1312 thasupreme2(2).exe 1312 thasupreme2(2).exe 1312 thasupreme2(2).exe 1312 thasupreme2(2).exe 1312 thasupreme2(2).exe 1312 thasupreme2(2).exe 1312 thasupreme2(2).exe 1312 thasupreme2(2).exe 1312 thasupreme2(2).exe 1312 thasupreme2(2).exe 1312 thasupreme2(2).exe 1312 thasupreme2(2).exe 1312 thasupreme2(2).exe 1312 thasupreme2(2).exe 1312 thasupreme2(2).exe 1312 thasupreme2(2).exe 1312 thasupreme2(2).exe 1312 thasupreme2(2).exe 1312 thasupreme2(2).exe 1272 THASUPREMETROJAN.exe 1272 THASUPREMETROJAN.exe 1272 THASUPREMETROJAN.exe 1272 THASUPREMETROJAN.exe 1272 THASUPREMETROJAN.exe 1272 THASUPREMETROJAN.exe 1272 THASUPREMETROJAN.exe 1272 THASUPREMETROJAN.exe 1272 THASUPREMETROJAN.exe 1272 THASUPREMETROJAN.exe 1272 THASUPREMETROJAN.exe 1272 THASUPREMETROJAN.exe 1272 THASUPREMETROJAN.exe 1272 THASUPREMETROJAN.exe 1272 THASUPREMETROJAN.exe 1272 THASUPREMETROJAN.exe 1272 THASUPREMETROJAN.exe 1272 THASUPREMETROJAN.exe 1272 THASUPREMETROJAN.exe 1272 THASUPREMETROJAN.exe 1272 THASUPREMETROJAN.exe 1272 THASUPREMETROJAN.exe 1272 THASUPREMETROJAN.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
thasupreme2(2).exeTHASUPREMETROJAN.exedescription pid process Token: SeDebugPrivilege 1312 thasupreme2(2).exe Token: SeDebugPrivilege 1312 thasupreme2(2).exe Token: SeDebugPrivilege 1272 THASUPREMETROJAN.exe Token: SeDebugPrivilege 1272 THASUPREMETROJAN.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
thasupreme2(2).execmd.execmd.exedescription pid process target process PID 1312 wrote to memory of 1980 1312 thasupreme2(2).exe cmd.exe PID 1312 wrote to memory of 1980 1312 thasupreme2(2).exe cmd.exe PID 1312 wrote to memory of 5032 1312 thasupreme2(2).exe cmd.exe PID 1312 wrote to memory of 5032 1312 thasupreme2(2).exe cmd.exe PID 1980 wrote to memory of 4996 1980 cmd.exe schtasks.exe PID 1980 wrote to memory of 4996 1980 cmd.exe schtasks.exe PID 5032 wrote to memory of 3500 5032 cmd.exe timeout.exe PID 5032 wrote to memory of 3500 5032 cmd.exe timeout.exe PID 5032 wrote to memory of 1272 5032 cmd.exe THASUPREMETROJAN.exe PID 5032 wrote to memory of 1272 5032 cmd.exe THASUPREMETROJAN.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\thasupreme2(2).exe"C:\Users\Admin\AppData\Local\Temp\thasupreme2(2).exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "THASUPREMETROJAN" /tr '"C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "THASUPREMETROJAN" /tr '"C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe"'3⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp7B3F.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe"C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp7B3F.tmp.batFilesize
160B
MD58b05b90b575cee9c1828f42f0cc97ff9
SHA1dad9a8ff4f22ffd9eb2de49eaa7646db6decffec
SHA25651d336e5c055cca4ef68f83edf3da41e0d4eee15df10816f5409c2f6b4eb6284
SHA5122061872dea68287dc87f8c9ff8a048dc90290f6066bf2a4a32777b7ed4c8c773db365f969df6ef8f2687998ec106109827a463d72e7a11ff83b84f71b863fe48
-
C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exeFilesize
48KB
MD5f66940a7ab4f7db4534b0da7a155741d
SHA13b0ec707455c8c0b2a465a386b68634b41afe4e2
SHA256e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de
SHA5121ab6588d07b77e852265285e8b86c598638823628d03759e2f116455bce3adf628165eb79eee6517d3f3227879009e72d7de69086e0e16a98f4d492b3b354063
-
C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exeFilesize
48KB
MD5f66940a7ab4f7db4534b0da7a155741d
SHA13b0ec707455c8c0b2a465a386b68634b41afe4e2
SHA256e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de
SHA5121ab6588d07b77e852265285e8b86c598638823628d03759e2f116455bce3adf628165eb79eee6517d3f3227879009e72d7de69086e0e16a98f4d492b3b354063
-
memory/1272-143-0x0000000000CE0000-0x0000000000CF0000-memory.dmpFilesize
64KB
-
memory/1272-146-0x0000000000CE0000-0x0000000000CF0000-memory.dmpFilesize
64KB
-
memory/1312-133-0x0000000000E30000-0x0000000000E42000-memory.dmpFilesize
72KB
-
memory/1312-134-0x000000001C890000-0x000000001C8A0000-memory.dmpFilesize
64KB