Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08-04-2023 17:57
Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20230220-en
General
-
Target
Client.exe
-
Size
47KB
-
MD5
15812c269dcb051b5b23a540696d5288
-
SHA1
db261e59e91e57ec14f45798bde865c01482ec15
-
SHA256
3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039
-
SHA512
059a96840dc099edd5a859668a531068cb45f37dbe00a2a00233b1b581a35fa5cb17c44631dc01e7588370de230b8733a9934bbfb115d159417c72efba6346ba
-
SSDEEP
768:xOduRtILkWAA+jiFtelDSN+iV08YbygeiCPdYPy22pvEgK/JLZVc6KN:8duNoFtKDs4zb1omJ2pnkJLZVclN
Malware Config
Extracted
asyncrat
1.0.7
System
147.185.221.180:1491
llfesnjkqacrdhbtbu
-
delay
1
-
install
true
-
install_file
THASUPREMETROJAN.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2604-133-0x0000000000250000-0x0000000000262000-memory.dmp asyncrat C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe asyncrat C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Client.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation Client.exe -
Executes dropped EXE 1 IoCs
Processes:
THASUPREMETROJAN.exepid process 4380 THASUPREMETROJAN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 568 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Client.exeTHASUPREMETROJAN.exepid process 2604 Client.exe 2604 Client.exe 2604 Client.exe 2604 Client.exe 2604 Client.exe 2604 Client.exe 2604 Client.exe 2604 Client.exe 2604 Client.exe 2604 Client.exe 2604 Client.exe 2604 Client.exe 2604 Client.exe 2604 Client.exe 2604 Client.exe 2604 Client.exe 2604 Client.exe 2604 Client.exe 2604 Client.exe 2604 Client.exe 2604 Client.exe 2604 Client.exe 2604 Client.exe 2604 Client.exe 2604 Client.exe 2604 Client.exe 2604 Client.exe 2604 Client.exe 2604 Client.exe 2604 Client.exe 2604 Client.exe 2604 Client.exe 2604 Client.exe 2604 Client.exe 2604 Client.exe 2604 Client.exe 2604 Client.exe 2604 Client.exe 2604 Client.exe 2604 Client.exe 2604 Client.exe 2604 Client.exe 2604 Client.exe 4380 THASUPREMETROJAN.exe 4380 THASUPREMETROJAN.exe 4380 THASUPREMETROJAN.exe 4380 THASUPREMETROJAN.exe 4380 THASUPREMETROJAN.exe 4380 THASUPREMETROJAN.exe 4380 THASUPREMETROJAN.exe 4380 THASUPREMETROJAN.exe 4380 THASUPREMETROJAN.exe 4380 THASUPREMETROJAN.exe 4380 THASUPREMETROJAN.exe 4380 THASUPREMETROJAN.exe 4380 THASUPREMETROJAN.exe 4380 THASUPREMETROJAN.exe 4380 THASUPREMETROJAN.exe 4380 THASUPREMETROJAN.exe 4380 THASUPREMETROJAN.exe 4380 THASUPREMETROJAN.exe 4380 THASUPREMETROJAN.exe 4380 THASUPREMETROJAN.exe 4380 THASUPREMETROJAN.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
Client.exeTHASUPREMETROJAN.exedescription pid process Token: SeDebugPrivilege 2604 Client.exe Token: SeDebugPrivilege 2604 Client.exe Token: SeDebugPrivilege 4380 THASUPREMETROJAN.exe Token: SeDebugPrivilege 4380 THASUPREMETROJAN.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
Client.execmd.execmd.exedescription pid process target process PID 2604 wrote to memory of 2276 2604 Client.exe cmd.exe PID 2604 wrote to memory of 2276 2604 Client.exe cmd.exe PID 2604 wrote to memory of 1428 2604 Client.exe cmd.exe PID 2604 wrote to memory of 1428 2604 Client.exe cmd.exe PID 2276 wrote to memory of 3560 2276 cmd.exe schtasks.exe PID 2276 wrote to memory of 3560 2276 cmd.exe schtasks.exe PID 1428 wrote to memory of 568 1428 cmd.exe timeout.exe PID 1428 wrote to memory of 568 1428 cmd.exe timeout.exe PID 1428 wrote to memory of 4380 1428 cmd.exe THASUPREMETROJAN.exe PID 1428 wrote to memory of 4380 1428 cmd.exe THASUPREMETROJAN.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "THASUPREMETROJAN" /tr '"C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "THASUPREMETROJAN" /tr '"C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe"'3⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp76CB.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe"C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp76CB.tmp.batFilesize
160B
MD5593b2008650b9f4e650747ed6d993bf4
SHA1692ca1c9189a318c86400c9c8c63437ed5f1f64a
SHA2567f13133f05ea3a8238235b0abfc08432ae60d5684779bbbd54cfe698f61c4a7c
SHA5120270ea3e796f6ccac1d1587850dccd93d0a6f3535babe7b32d7f4f8774d2022ee3afc93fc48c5ceeb6dffb199b4c5bf16f64e1fc1c9cf7ead6714f9f6e2213e9
-
C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exeFilesize
47KB
MD515812c269dcb051b5b23a540696d5288
SHA1db261e59e91e57ec14f45798bde865c01482ec15
SHA2563702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039
SHA512059a96840dc099edd5a859668a531068cb45f37dbe00a2a00233b1b581a35fa5cb17c44631dc01e7588370de230b8733a9934bbfb115d159417c72efba6346ba
-
C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exeFilesize
47KB
MD515812c269dcb051b5b23a540696d5288
SHA1db261e59e91e57ec14f45798bde865c01482ec15
SHA2563702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039
SHA512059a96840dc099edd5a859668a531068cb45f37dbe00a2a00233b1b581a35fa5cb17c44631dc01e7588370de230b8733a9934bbfb115d159417c72efba6346ba
-
memory/2604-133-0x0000000000250000-0x0000000000262000-memory.dmpFilesize
72KB
-
memory/2604-134-0x0000000002420000-0x0000000002430000-memory.dmpFilesize
64KB
-
memory/4380-143-0x000000001BCD0000-0x000000001BCE0000-memory.dmpFilesize
64KB
-
memory/4380-144-0x000000001BA50000-0x000000001BB9E000-memory.dmpFilesize
1.3MB
-
memory/4380-145-0x000000001BCD0000-0x000000001BCE0000-memory.dmpFilesize
64KB
-
memory/4380-147-0x000000001BA50000-0x000000001BB9E000-memory.dmpFilesize
1.3MB