Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
08-04-2023 17:57
Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20230220-en
General
-
Target
Client.exe
-
Size
47KB
-
MD5
15812c269dcb051b5b23a540696d5288
-
SHA1
db261e59e91e57ec14f45798bde865c01482ec15
-
SHA256
3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039
-
SHA512
059a96840dc099edd5a859668a531068cb45f37dbe00a2a00233b1b581a35fa5cb17c44631dc01e7588370de230b8733a9934bbfb115d159417c72efba6346ba
-
SSDEEP
768:xOduRtILkWAA+jiFtelDSN+iV08YbygeiCPdYPy22pvEgK/JLZVc6KN:8duNoFtKDs4zb1omJ2pnkJLZVclN
Malware Config
Extracted
asyncrat
1.0.7
System
147.185.221.180:1491
llfesnjkqacrdhbtbu
-
delay
1
-
install
true
-
install_file
THASUPREMETROJAN.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2008-54-0x0000000000FA0000-0x0000000000FB2000-memory.dmp asyncrat C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe asyncrat C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe asyncrat behavioral1/memory/1904-68-0x0000000000260000-0x0000000000272000-memory.dmp asyncrat behavioral1/memory/1904-69-0x0000000001D10000-0x0000000001D90000-memory.dmp asyncrat -
Executes dropped EXE 1 IoCs
Processes:
THASUPREMETROJAN.exepid process 1904 THASUPREMETROJAN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1984 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Client.exeTHASUPREMETROJAN.exepid process 2008 Client.exe 2008 Client.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe 1904 THASUPREMETROJAN.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
Client.exeTHASUPREMETROJAN.exedescription pid process Token: SeDebugPrivilege 2008 Client.exe Token: SeDebugPrivilege 2008 Client.exe Token: SeDebugPrivilege 1904 THASUPREMETROJAN.exe Token: SeDebugPrivilege 1904 THASUPREMETROJAN.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Client.execmd.execmd.exedescription pid process target process PID 2008 wrote to memory of 768 2008 Client.exe cmd.exe PID 2008 wrote to memory of 768 2008 Client.exe cmd.exe PID 2008 wrote to memory of 768 2008 Client.exe cmd.exe PID 2008 wrote to memory of 1476 2008 Client.exe cmd.exe PID 2008 wrote to memory of 1476 2008 Client.exe cmd.exe PID 2008 wrote to memory of 1476 2008 Client.exe cmd.exe PID 768 wrote to memory of 1596 768 cmd.exe schtasks.exe PID 768 wrote to memory of 1596 768 cmd.exe schtasks.exe PID 768 wrote to memory of 1596 768 cmd.exe schtasks.exe PID 1476 wrote to memory of 1984 1476 cmd.exe timeout.exe PID 1476 wrote to memory of 1984 1476 cmd.exe timeout.exe PID 1476 wrote to memory of 1984 1476 cmd.exe timeout.exe PID 1476 wrote to memory of 1904 1476 cmd.exe THASUPREMETROJAN.exe PID 1476 wrote to memory of 1904 1476 cmd.exe THASUPREMETROJAN.exe PID 1476 wrote to memory of 1904 1476 cmd.exe THASUPREMETROJAN.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "THASUPREMETROJAN" /tr '"C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "THASUPREMETROJAN" /tr '"C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe"'3⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp1259.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe"C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp1259.tmp.batFilesize
160B
MD5410e21b0fc31a47f4d5f592a596ba4d3
SHA1cdaa5f2afe421f4298a019ef60dcd997d5ceab98
SHA256ad1655eb8682ca2d03eaf7267472869c83173d8872618443b9ef2d2008b7de6c
SHA51229d7278a3ab8ad92cbd0ebb07bb6fb6638b8284ec4973c97935663d86295f385ae4fce9dfda7f3bc1627f7b5ce7fee3940c318b1081649c46a0a635cae16b6bf
-
C:\Users\Admin\AppData\Local\Temp\tmp1259.tmp.batFilesize
160B
MD5410e21b0fc31a47f4d5f592a596ba4d3
SHA1cdaa5f2afe421f4298a019ef60dcd997d5ceab98
SHA256ad1655eb8682ca2d03eaf7267472869c83173d8872618443b9ef2d2008b7de6c
SHA51229d7278a3ab8ad92cbd0ebb07bb6fb6638b8284ec4973c97935663d86295f385ae4fce9dfda7f3bc1627f7b5ce7fee3940c318b1081649c46a0a635cae16b6bf
-
C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exeFilesize
47KB
MD515812c269dcb051b5b23a540696d5288
SHA1db261e59e91e57ec14f45798bde865c01482ec15
SHA2563702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039
SHA512059a96840dc099edd5a859668a531068cb45f37dbe00a2a00233b1b581a35fa5cb17c44631dc01e7588370de230b8733a9934bbfb115d159417c72efba6346ba
-
C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exeFilesize
47KB
MD515812c269dcb051b5b23a540696d5288
SHA1db261e59e91e57ec14f45798bde865c01482ec15
SHA2563702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039
SHA512059a96840dc099edd5a859668a531068cb45f37dbe00a2a00233b1b581a35fa5cb17c44631dc01e7588370de230b8733a9934bbfb115d159417c72efba6346ba
-
memory/1904-68-0x0000000000260000-0x0000000000272000-memory.dmpFilesize
72KB
-
memory/1904-69-0x0000000001D10000-0x0000000001D90000-memory.dmpFilesize
512KB
-
memory/2008-54-0x0000000000FA0000-0x0000000000FB2000-memory.dmpFilesize
72KB
-
memory/2008-55-0x000000001B350000-0x000000001B3D0000-memory.dmpFilesize
512KB