Analysis
-
max time kernel
150s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
10-04-2023 01:07
Behavioral task
behavioral1
Sample
3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe
Resource
win7-20230220-en
General
-
Target
3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe
-
Size
47KB
-
MD5
15812c269dcb051b5b23a540696d5288
-
SHA1
db261e59e91e57ec14f45798bde865c01482ec15
-
SHA256
3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039
-
SHA512
059a96840dc099edd5a859668a531068cb45f37dbe00a2a00233b1b581a35fa5cb17c44631dc01e7588370de230b8733a9934bbfb115d159417c72efba6346ba
-
SSDEEP
768:xOduRtILkWAA+jiFtelDSN+iV08YbygeiCPdYPy22pvEgK/JLZVc6KN:8duNoFtKDs4zb1omJ2pnkJLZVclN
Malware Config
Extracted
asyncrat
1.0.7
System
147.185.221.180:1491
llfesnjkqacrdhbtbu
-
delay
1
-
install
true
-
install_file
THASUPREMETROJAN.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1400-54-0x0000000000890000-0x00000000008A2000-memory.dmp asyncrat C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe asyncrat C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe asyncrat behavioral1/memory/1828-68-0x0000000000B80000-0x0000000000B92000-memory.dmp asyncrat -
Executes dropped EXE 1 IoCs
Processes:
THASUPREMETROJAN.exepid process 1828 THASUPREMETROJAN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1804 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exeTHASUPREMETROJAN.exepid process 1400 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe 1400 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe 1828 THASUPREMETROJAN.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exeTHASUPREMETROJAN.exedescription pid process Token: SeDebugPrivilege 1400 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe Token: SeDebugPrivilege 1400 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe Token: SeDebugPrivilege 1828 THASUPREMETROJAN.exe Token: SeDebugPrivilege 1828 THASUPREMETROJAN.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.execmd.execmd.exedescription pid process target process PID 1400 wrote to memory of 1116 1400 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe cmd.exe PID 1400 wrote to memory of 1116 1400 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe cmd.exe PID 1400 wrote to memory of 1116 1400 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe cmd.exe PID 1400 wrote to memory of 112 1400 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe cmd.exe PID 1400 wrote to memory of 112 1400 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe cmd.exe PID 1400 wrote to memory of 112 1400 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe cmd.exe PID 1116 wrote to memory of 1236 1116 cmd.exe schtasks.exe PID 1116 wrote to memory of 1236 1116 cmd.exe schtasks.exe PID 1116 wrote to memory of 1236 1116 cmd.exe schtasks.exe PID 112 wrote to memory of 1804 112 cmd.exe timeout.exe PID 112 wrote to memory of 1804 112 cmd.exe timeout.exe PID 112 wrote to memory of 1804 112 cmd.exe timeout.exe PID 112 wrote to memory of 1828 112 cmd.exe THASUPREMETROJAN.exe PID 112 wrote to memory of 1828 112 cmd.exe THASUPREMETROJAN.exe PID 112 wrote to memory of 1828 112 cmd.exe THASUPREMETROJAN.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe"C:\Users\Admin\AppData\Local\Temp\3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "THASUPREMETROJAN" /tr '"C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "THASUPREMETROJAN" /tr '"C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe"'3⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp21E3.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe"C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp21E3.tmp.batFilesize
160B
MD54ba1bc356466889b1f96090c42fd7c25
SHA180dd55f9511f470cb5f99c5e6fa6f0107e6c43db
SHA256bc00028feab2a862583a8bb748396365e621501252ed4a1b4558f7f8d2f5004a
SHA512e7e9abff8bd18037606932aeb5a380d18e7b7c5efa4206279415ee9aa7f85343381b5ab3217dea9887d404ab3554a531a9283332ae61ccbda29d3172af69c92e
-
C:\Users\Admin\AppData\Local\Temp\tmp21E3.tmp.batFilesize
160B
MD54ba1bc356466889b1f96090c42fd7c25
SHA180dd55f9511f470cb5f99c5e6fa6f0107e6c43db
SHA256bc00028feab2a862583a8bb748396365e621501252ed4a1b4558f7f8d2f5004a
SHA512e7e9abff8bd18037606932aeb5a380d18e7b7c5efa4206279415ee9aa7f85343381b5ab3217dea9887d404ab3554a531a9283332ae61ccbda29d3172af69c92e
-
C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exeFilesize
47KB
MD515812c269dcb051b5b23a540696d5288
SHA1db261e59e91e57ec14f45798bde865c01482ec15
SHA2563702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039
SHA512059a96840dc099edd5a859668a531068cb45f37dbe00a2a00233b1b581a35fa5cb17c44631dc01e7588370de230b8733a9934bbfb115d159417c72efba6346ba
-
C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exeFilesize
47KB
MD515812c269dcb051b5b23a540696d5288
SHA1db261e59e91e57ec14f45798bde865c01482ec15
SHA2563702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039
SHA512059a96840dc099edd5a859668a531068cb45f37dbe00a2a00233b1b581a35fa5cb17c44631dc01e7588370de230b8733a9934bbfb115d159417c72efba6346ba
-
memory/1400-54-0x0000000000890000-0x00000000008A2000-memory.dmpFilesize
72KB
-
memory/1400-55-0x000000001AE80000-0x000000001AF00000-memory.dmpFilesize
512KB
-
memory/1828-68-0x0000000000B80000-0x0000000000B92000-memory.dmpFilesize
72KB
-
memory/1828-69-0x000000001AFF0000-0x000000001B070000-memory.dmpFilesize
512KB
-
memory/1828-70-0x000000001AFF0000-0x000000001B070000-memory.dmpFilesize
512KB