Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2023 02:09
Behavioral task
behavioral1
Sample
e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe
Resource
win7-20230220-en
General
-
Target
e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe
-
Size
48KB
-
MD5
f66940a7ab4f7db4534b0da7a155741d
-
SHA1
3b0ec707455c8c0b2a465a386b68634b41afe4e2
-
SHA256
e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de
-
SHA512
1ab6588d07b77e852265285e8b86c598638823628d03759e2f116455bce3adf628165eb79eee6517d3f3227879009e72d7de69086e0e16a98f4d492b3b354063
-
SSDEEP
768:2duRtILkWAA+jiYH/lDB2Oaig8Yblge1+A8aLfRvEgK/JYBVc6KN:2duNoYH/l92OSzbifoJnkJYBVclN
Malware Config
Extracted
asyncrat
1.0.7
System
147.185.221.180:1491
llfesnjkqacrdhbtbu
-
delay
1
-
install
true
-
install_file
THASUPREMETROJAN.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3180-133-0x0000000000DF0000-0x0000000000E02000-memory.dmp asyncrat C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe asyncrat C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe -
Executes dropped EXE 1 IoCs
Processes:
THASUPREMETROJAN.exepid process 4212 THASUPREMETROJAN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1968 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exeTHASUPREMETROJAN.exepid process 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe 4212 THASUPREMETROJAN.exe 4212 THASUPREMETROJAN.exe 4212 THASUPREMETROJAN.exe 4212 THASUPREMETROJAN.exe 4212 THASUPREMETROJAN.exe 4212 THASUPREMETROJAN.exe 4212 THASUPREMETROJAN.exe 4212 THASUPREMETROJAN.exe 4212 THASUPREMETROJAN.exe 4212 THASUPREMETROJAN.exe 4212 THASUPREMETROJAN.exe 4212 THASUPREMETROJAN.exe 4212 THASUPREMETROJAN.exe 4212 THASUPREMETROJAN.exe 4212 THASUPREMETROJAN.exe 4212 THASUPREMETROJAN.exe 4212 THASUPREMETROJAN.exe 4212 THASUPREMETROJAN.exe 4212 THASUPREMETROJAN.exe 4212 THASUPREMETROJAN.exe 4212 THASUPREMETROJAN.exe 4212 THASUPREMETROJAN.exe 4212 THASUPREMETROJAN.exe 4212 THASUPREMETROJAN.exe 4212 THASUPREMETROJAN.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exeTHASUPREMETROJAN.exedescription pid process Token: SeDebugPrivilege 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe Token: SeDebugPrivilege 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe Token: SeDebugPrivilege 4212 THASUPREMETROJAN.exe Token: SeDebugPrivilege 4212 THASUPREMETROJAN.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.execmd.execmd.exedescription pid process target process PID 3180 wrote to memory of 4920 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe cmd.exe PID 3180 wrote to memory of 4920 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe cmd.exe PID 3180 wrote to memory of 1356 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe cmd.exe PID 3180 wrote to memory of 1356 3180 e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe cmd.exe PID 4920 wrote to memory of 4864 4920 cmd.exe schtasks.exe PID 4920 wrote to memory of 4864 4920 cmd.exe schtasks.exe PID 1356 wrote to memory of 1968 1356 cmd.exe timeout.exe PID 1356 wrote to memory of 1968 1356 cmd.exe timeout.exe PID 1356 wrote to memory of 4212 1356 cmd.exe THASUPREMETROJAN.exe PID 1356 wrote to memory of 4212 1356 cmd.exe THASUPREMETROJAN.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe"C:\Users\Admin\AppData\Local\Temp\e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "THASUPREMETROJAN" /tr '"C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "THASUPREMETROJAN" /tr '"C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe"'3⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp6B90.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe"C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp6B90.tmp.batFilesize
160B
MD5346fb8783be5ad636a33db5bc0631cec
SHA1c6df8845f37f0661a68026bff83b913fe4714d2a
SHA256d2940d404a5a7b1f51289f1840e226d4566c44419e9ce2c9b18d8b0691f86dd2
SHA5120e35052aa1eca9f0fff062a263714acdb9194b134491173cf5f3434599005d4f7a7d938bf6b73ec3762f0ec4533bcc1e38caf2d6c7e2d974bc64cdef6e14a1a9
-
C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exeFilesize
48KB
MD5f66940a7ab4f7db4534b0da7a155741d
SHA13b0ec707455c8c0b2a465a386b68634b41afe4e2
SHA256e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de
SHA5121ab6588d07b77e852265285e8b86c598638823628d03759e2f116455bce3adf628165eb79eee6517d3f3227879009e72d7de69086e0e16a98f4d492b3b354063
-
C:\Users\Admin\AppData\Roaming\THASUPREMETROJAN.exeFilesize
48KB
MD5f66940a7ab4f7db4534b0da7a155741d
SHA13b0ec707455c8c0b2a465a386b68634b41afe4e2
SHA256e9862583e03d49e791f0aaabb974ba4054cea75a57fec9660b59dd3342cd65de
SHA5121ab6588d07b77e852265285e8b86c598638823628d03759e2f116455bce3adf628165eb79eee6517d3f3227879009e72d7de69086e0e16a98f4d492b3b354063
-
memory/3180-133-0x0000000000DF0000-0x0000000000E02000-memory.dmpFilesize
72KB
-
memory/3180-134-0x000000001C720000-0x000000001C730000-memory.dmpFilesize
64KB
-
memory/4212-143-0x00000000022B0000-0x00000000022C0000-memory.dmpFilesize
64KB
-
memory/4212-144-0x00000000022B0000-0x00000000022C0000-memory.dmpFilesize
64KB