Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
10-04-2023 02:09
Behavioral task
behavioral1
Sample
e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe
Resource
win7-20230220-en
General
-
Target
e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe
-
Size
48KB
-
MD5
f66940a7ab4f7db4534b0da7a155741d
-
SHA1
3b0ec707455c8c0b2a465a386b68634b41afe4e2
-
SHA256
e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de
-
SHA512
1ab6588d07b77e852265285e8b86c598638823628d03759e2f116455bce3adf628165eb79eee6517d3f3227879009e72d7de69086e0e16a98f4d492b3b354063
-
SSDEEP
768:2duRtILkWAA+jiYH/lDB2Oaig8Yblge1+A8aLfRvEgK/JYBVc6KN:2duNoYH/l92OSzbifoJnkJYBVclN
Malware Config
Extracted
asyncrat
1.0.7
System
147.185.221.180:1491
llfesnjkqacrdhbtbu
-
delay
1
-
install
true
-
install_file
THASUPREMETROJAN.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1156-54-0x00000000011E0000-0x00000000011F2000-memory.dmp asyncrat C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe asyncrat C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe asyncrat behavioral1/memory/1284-68-0x00000000003A0000-0x00000000003B2000-memory.dmp asyncrat -
Executes dropped EXE 1 IoCs
Processes:
THASUPREMETROJAN.exepid process 1284 THASUPREMETROJAN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1984 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exeTHASUPREMETROJAN.exepid process 1156 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe 1156 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe 1284 THASUPREMETROJAN.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exeTHASUPREMETROJAN.exedescription pid process Token: SeDebugPrivilege 1156 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe Token: SeDebugPrivilege 1156 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe Token: SeDebugPrivilege 1284 THASUPREMETROJAN.exe Token: SeDebugPrivilege 1284 THASUPREMETROJAN.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.execmd.execmd.exedescription pid process target process PID 1156 wrote to memory of 1484 1156 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe cmd.exe PID 1156 wrote to memory of 1484 1156 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe cmd.exe PID 1156 wrote to memory of 1484 1156 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe cmd.exe PID 1156 wrote to memory of 952 1156 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe cmd.exe PID 1156 wrote to memory of 952 1156 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe cmd.exe PID 1156 wrote to memory of 952 1156 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe cmd.exe PID 1484 wrote to memory of 520 1484 cmd.exe schtasks.exe PID 1484 wrote to memory of 520 1484 cmd.exe schtasks.exe PID 1484 wrote to memory of 520 1484 cmd.exe schtasks.exe PID 952 wrote to memory of 1984 952 cmd.exe timeout.exe PID 952 wrote to memory of 1984 952 cmd.exe timeout.exe PID 952 wrote to memory of 1984 952 cmd.exe timeout.exe PID 952 wrote to memory of 1284 952 cmd.exe THASUPREMETROJAN.exe PID 952 wrote to memory of 1284 952 cmd.exe THASUPREMETROJAN.exe PID 952 wrote to memory of 1284 952 cmd.exe THASUPREMETROJAN.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe"C:\Users\Admin\AppData\Local\Temp\e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "THASUPREMETROJAN" /tr '"C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "THASUPREMETROJAN" /tr '"C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe"'3⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp118E.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe"C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp118E.tmp.batFilesize
160B
MD511d885b73575306528bcf3ca81e720f5
SHA1333c38f0c7f1167c0c0033b0026af42f0e02b194
SHA256a88dd564b055e11f6b226405310b6ce748a331a71ff6c6b4e56638029dd71c21
SHA512760ee2a024aaf813f9907043b9615b4b77e43c3054d1a778949bebc8f8504392b8ffe98c89ad15faf11002187a9db49516ed40d547fcd787377029758605a17e
-
C:\Users\Admin\AppData\Local\Temp\tmp118E.tmp.batFilesize
160B
MD511d885b73575306528bcf3ca81e720f5
SHA1333c38f0c7f1167c0c0033b0026af42f0e02b194
SHA256a88dd564b055e11f6b226405310b6ce748a331a71ff6c6b4e56638029dd71c21
SHA512760ee2a024aaf813f9907043b9615b4b77e43c3054d1a778949bebc8f8504392b8ffe98c89ad15faf11002187a9db49516ed40d547fcd787377029758605a17e
-
C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exeFilesize
48KB
MD5f66940a7ab4f7db4534b0da7a155741d
SHA13b0ec707455c8c0b2a465a386b68634b41afe4e2
SHA256e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de
SHA5121ab6588d07b77e852265285e8b86c598638823628d03759e2f116455bce3adf628165eb79eee6517d3f3227879009e72d7de69086e0e16a98f4d492b3b354063
-
C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exeFilesize
48KB
MD5f66940a7ab4f7db4534b0da7a155741d
SHA13b0ec707455c8c0b2a465a386b68634b41afe4e2
SHA256e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de
SHA5121ab6588d07b77e852265285e8b86c598638823628d03759e2f116455bce3adf628165eb79eee6517d3f3227879009e72d7de69086e0e16a98f4d492b3b354063
-
memory/1156-54-0x00000000011E0000-0x00000000011F2000-memory.dmpFilesize
72KB
-
memory/1156-55-0x000000001B0E0000-0x000000001B160000-memory.dmpFilesize
512KB
-
memory/1284-68-0x00000000003A0000-0x00000000003B2000-memory.dmpFilesize
72KB