Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2023 01:07
Behavioral task
behavioral1
Sample
3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe
Resource
win7-20230220-en
General
-
Target
3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe
-
Size
47KB
-
MD5
15812c269dcb051b5b23a540696d5288
-
SHA1
db261e59e91e57ec14f45798bde865c01482ec15
-
SHA256
3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039
-
SHA512
059a96840dc099edd5a859668a531068cb45f37dbe00a2a00233b1b581a35fa5cb17c44631dc01e7588370de230b8733a9934bbfb115d159417c72efba6346ba
-
SSDEEP
768:xOduRtILkWAA+jiFtelDSN+iV08YbygeiCPdYPy22pvEgK/JLZVc6KN:8duNoFtKDs4zb1omJ2pnkJLZVclN
Malware Config
Extracted
asyncrat
1.0.7
System
147.185.221.180:1491
llfesnjkqacrdhbtbu
-
delay
1
-
install
true
-
install_file
THASUPREMETROJAN.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1436-133-0x0000000000EB0000-0x0000000000EC2000-memory.dmp asyncrat C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe asyncrat C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe -
Executes dropped EXE 1 IoCs
Processes:
THASUPREMETROJAN.exepid process 1736 THASUPREMETROJAN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1888 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exeTHASUPREMETROJAN.exepid process 1436 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe 1436 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe 1436 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe 1436 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe 1436 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe 1436 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe 1436 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe 1436 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe 1436 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe 1436 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe 1436 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe 1436 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe 1436 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe 1436 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe 1436 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe 1436 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe 1436 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe 1436 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe 1436 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe 1436 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe 1436 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe 1436 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe 1436 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe 1436 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe 1436 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe 1436 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe 1436 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe 1436 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe 1436 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe 1436 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe 1436 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe 1436 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe 1436 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe 1736 THASUPREMETROJAN.exe 1736 THASUPREMETROJAN.exe 1736 THASUPREMETROJAN.exe 1736 THASUPREMETROJAN.exe 1736 THASUPREMETROJAN.exe 1736 THASUPREMETROJAN.exe 1736 THASUPREMETROJAN.exe 1736 THASUPREMETROJAN.exe 1736 THASUPREMETROJAN.exe 1736 THASUPREMETROJAN.exe 1736 THASUPREMETROJAN.exe 1736 THASUPREMETROJAN.exe 1736 THASUPREMETROJAN.exe 1736 THASUPREMETROJAN.exe 1736 THASUPREMETROJAN.exe 1736 THASUPREMETROJAN.exe 1736 THASUPREMETROJAN.exe 1736 THASUPREMETROJAN.exe 1736 THASUPREMETROJAN.exe 1736 THASUPREMETROJAN.exe 1736 THASUPREMETROJAN.exe 1736 THASUPREMETROJAN.exe 1736 THASUPREMETROJAN.exe 1736 THASUPREMETROJAN.exe 1736 THASUPREMETROJAN.exe 1736 THASUPREMETROJAN.exe 1736 THASUPREMETROJAN.exe 1736 THASUPREMETROJAN.exe 1736 THASUPREMETROJAN.exe 1736 THASUPREMETROJAN.exe 1736 THASUPREMETROJAN.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exeTHASUPREMETROJAN.exedescription pid process Token: SeDebugPrivilege 1436 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe Token: SeDebugPrivilege 1436 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe Token: SeDebugPrivilege 1736 THASUPREMETROJAN.exe Token: SeDebugPrivilege 1736 THASUPREMETROJAN.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.execmd.execmd.exedescription pid process target process PID 1436 wrote to memory of 1564 1436 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe cmd.exe PID 1436 wrote to memory of 1564 1436 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe cmd.exe PID 1436 wrote to memory of 3700 1436 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe cmd.exe PID 1436 wrote to memory of 3700 1436 3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe cmd.exe PID 3700 wrote to memory of 1888 3700 cmd.exe timeout.exe PID 3700 wrote to memory of 1888 3700 cmd.exe timeout.exe PID 1564 wrote to memory of 4376 1564 cmd.exe schtasks.exe PID 1564 wrote to memory of 4376 1564 cmd.exe schtasks.exe PID 3700 wrote to memory of 1736 3700 cmd.exe THASUPREMETROJAN.exe PID 3700 wrote to memory of 1736 3700 cmd.exe THASUPREMETROJAN.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe"C:\Users\Admin\AppData\Local\Temp\3702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "THASUPREMETROJAN" /tr '"C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "THASUPREMETROJAN" /tr '"C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe"'3⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp70C0.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe"C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp70C0.tmp.batFilesize
160B
MD528c41f558947fe10b72a357ddca525bb
SHA1f165a6a1052afa4e9436a5f37e9a8d40b06c6056
SHA256ca5997d2be65665fd47eb811f462c8c5adcd393f8eef36289e8e6fcea434e587
SHA512c99479634ce24d09c3cfdd78686333c78aa589e06198bfb3ca8627f920d7eb06ceda74281e5665b2d9888c5ad7592246a0a67d7af012453d08921d6948d3361e
-
C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exeFilesize
47KB
MD515812c269dcb051b5b23a540696d5288
SHA1db261e59e91e57ec14f45798bde865c01482ec15
SHA2563702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039
SHA512059a96840dc099edd5a859668a531068cb45f37dbe00a2a00233b1b581a35fa5cb17c44631dc01e7588370de230b8733a9934bbfb115d159417c72efba6346ba
-
C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exeFilesize
47KB
MD515812c269dcb051b5b23a540696d5288
SHA1db261e59e91e57ec14f45798bde865c01482ec15
SHA2563702de50af26c3d4288bb4c9c4bde0f0bb0cd98873393b4e38394c6848fad039
SHA512059a96840dc099edd5a859668a531068cb45f37dbe00a2a00233b1b581a35fa5cb17c44631dc01e7588370de230b8733a9934bbfb115d159417c72efba6346ba
-
memory/1436-133-0x0000000000EB0000-0x0000000000EC2000-memory.dmpFilesize
72KB
-
memory/1436-134-0x000000001BC70000-0x000000001BC80000-memory.dmpFilesize
64KB
-
memory/1736-143-0x0000000000A00000-0x0000000000A10000-memory.dmpFilesize
64KB
-
memory/1736-144-0x0000000000A00000-0x0000000000A10000-memory.dmpFilesize
64KB