Analysis
-
max time kernel
190s -
max time network
228s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2023 18:36
Static task
static1
Behavioral task
behavioral1
Sample
e51beeef2a2539ff8ef9e4bf7ffdf002.exe
Resource
win7-20230220-en
General
-
Target
e51beeef2a2539ff8ef9e4bf7ffdf002.exe
-
Size
19.8MB
-
MD5
e51beeef2a2539ff8ef9e4bf7ffdf002
-
SHA1
fb7435fcbe78d1e50364db3bc527a7e394a3cc71
-
SHA256
e09a35ac6c37f4807daf1dcfeb8e2f1fa78003cf1b48b942152ad54152ed2ae6
-
SHA512
363417b1fb3a4fd12267190cde711366b287def6d00a9ceda33f0f71c88c3500ed57553772f10880edef23eb4733c36c009d07fcf1eb775a5a684ce3f6c47d4b
-
SSDEEP
6144:7fQTkfGlJz/us5e2jKFFRavrXQ1SHbboDr21dP:7fQTkfsJL9aS7sfu
Malware Config
Extracted
asyncrat
5.0.5
MunaBC
piddix.duckdns.org:4449
muna123456789
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/memory/3720-139-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat -
Executes dropped EXE 2 IoCs
pid Process 3880 teamviewer.exe 3788 teamviewer.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3580 set thread context of 3720 3580 e51beeef2a2539ff8ef9e4bf7ffdf002.exe 81 PID 3880 set thread context of 1576 3880 teamviewer.exe 93 PID 3788 set thread context of 3468 3788 teamviewer.exe 105 -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4048 schtasks.exe 4140 schtasks.exe 4888 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3720 AppLaunch.exe Token: SeDebugPrivilege 1576 AppLaunch.exe Token: SeDebugPrivilege 3468 AppLaunch.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 3580 wrote to memory of 3720 3580 e51beeef2a2539ff8ef9e4bf7ffdf002.exe 81 PID 3580 wrote to memory of 3720 3580 e51beeef2a2539ff8ef9e4bf7ffdf002.exe 81 PID 3580 wrote to memory of 3720 3580 e51beeef2a2539ff8ef9e4bf7ffdf002.exe 81 PID 3580 wrote to memory of 3720 3580 e51beeef2a2539ff8ef9e4bf7ffdf002.exe 81 PID 3580 wrote to memory of 3720 3580 e51beeef2a2539ff8ef9e4bf7ffdf002.exe 81 PID 3580 wrote to memory of 3720 3580 e51beeef2a2539ff8ef9e4bf7ffdf002.exe 81 PID 3580 wrote to memory of 3720 3580 e51beeef2a2539ff8ef9e4bf7ffdf002.exe 81 PID 3580 wrote to memory of 3720 3580 e51beeef2a2539ff8ef9e4bf7ffdf002.exe 81 PID 3580 wrote to memory of 2316 3580 e51beeef2a2539ff8ef9e4bf7ffdf002.exe 82 PID 3580 wrote to memory of 2316 3580 e51beeef2a2539ff8ef9e4bf7ffdf002.exe 82 PID 3580 wrote to memory of 2316 3580 e51beeef2a2539ff8ef9e4bf7ffdf002.exe 82 PID 3580 wrote to memory of 4928 3580 e51beeef2a2539ff8ef9e4bf7ffdf002.exe 84 PID 3580 wrote to memory of 4928 3580 e51beeef2a2539ff8ef9e4bf7ffdf002.exe 84 PID 3580 wrote to memory of 4928 3580 e51beeef2a2539ff8ef9e4bf7ffdf002.exe 84 PID 3580 wrote to memory of 1180 3580 e51beeef2a2539ff8ef9e4bf7ffdf002.exe 86 PID 3580 wrote to memory of 1180 3580 e51beeef2a2539ff8ef9e4bf7ffdf002.exe 86 PID 3580 wrote to memory of 1180 3580 e51beeef2a2539ff8ef9e4bf7ffdf002.exe 86 PID 4928 wrote to memory of 4048 4928 cmd.exe 88 PID 4928 wrote to memory of 4048 4928 cmd.exe 88 PID 4928 wrote to memory of 4048 4928 cmd.exe 88 PID 3880 wrote to memory of 1576 3880 teamviewer.exe 93 PID 3880 wrote to memory of 1576 3880 teamviewer.exe 93 PID 3880 wrote to memory of 1576 3880 teamviewer.exe 93 PID 3880 wrote to memory of 1576 3880 teamviewer.exe 93 PID 3880 wrote to memory of 1576 3880 teamviewer.exe 93 PID 3880 wrote to memory of 1576 3880 teamviewer.exe 93 PID 3880 wrote to memory of 1576 3880 teamviewer.exe 93 PID 3880 wrote to memory of 1576 3880 teamviewer.exe 93 PID 3880 wrote to memory of 4100 3880 teamviewer.exe 92 PID 3880 wrote to memory of 4100 3880 teamviewer.exe 92 PID 3880 wrote to memory of 4100 3880 teamviewer.exe 92 PID 3880 wrote to memory of 4276 3880 teamviewer.exe 94 PID 3880 wrote to memory of 4276 3880 teamviewer.exe 94 PID 3880 wrote to memory of 4276 3880 teamviewer.exe 94 PID 3880 wrote to memory of 1320 3880 teamviewer.exe 95 PID 3880 wrote to memory of 1320 3880 teamviewer.exe 95 PID 3880 wrote to memory of 1320 3880 teamviewer.exe 95 PID 4276 wrote to memory of 4140 4276 cmd.exe 100 PID 4276 wrote to memory of 4140 4276 cmd.exe 100 PID 4276 wrote to memory of 4140 4276 cmd.exe 100 PID 3788 wrote to memory of 3468 3788 teamviewer.exe 105 PID 3788 wrote to memory of 3468 3788 teamviewer.exe 105 PID 3788 wrote to memory of 3468 3788 teamviewer.exe 105 PID 3788 wrote to memory of 3468 3788 teamviewer.exe 105 PID 3788 wrote to memory of 3468 3788 teamviewer.exe 105 PID 3788 wrote to memory of 3468 3788 teamviewer.exe 105 PID 3788 wrote to memory of 3468 3788 teamviewer.exe 105 PID 3788 wrote to memory of 3468 3788 teamviewer.exe 105 PID 3788 wrote to memory of 4916 3788 teamviewer.exe 106 PID 3788 wrote to memory of 4916 3788 teamviewer.exe 106 PID 3788 wrote to memory of 4916 3788 teamviewer.exe 106 PID 3788 wrote to memory of 2324 3788 teamviewer.exe 107 PID 3788 wrote to memory of 2324 3788 teamviewer.exe 107 PID 3788 wrote to memory of 2324 3788 teamviewer.exe 107 PID 3788 wrote to memory of 2272 3788 teamviewer.exe 109 PID 3788 wrote to memory of 2272 3788 teamviewer.exe 109 PID 3788 wrote to memory of 2272 3788 teamviewer.exe 109 PID 2324 wrote to memory of 4888 2324 cmd.exe 112 PID 2324 wrote to memory of 4888 2324 cmd.exe 112 PID 2324 wrote to memory of 4888 2324 cmd.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\e51beeef2a2539ff8ef9e4bf7ffdf002.exe"C:\Users\Admin\AppData\Local\Temp\e51beeef2a2539ff8ef9e4bf7ffdf002.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3720
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\teamviewer"2⤵PID:2316
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\teamviewer\teamviewer.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\teamviewer\teamviewer.exe'" /f3⤵
- Creates scheduled task(s)
PID:4048
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\e51beeef2a2539ff8ef9e4bf7ffdf002.exe" "C:\Users\Admin\AppData\Roaming\teamviewer\teamviewer.exe"2⤵PID:1180
-
-
C:\Users\Admin\AppData\Roaming\teamviewer\teamviewer.exeC:\Users\Admin\AppData\Roaming\teamviewer\teamviewer.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\teamviewer"2⤵PID:4100
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1576
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\teamviewer\teamviewer.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\teamviewer\teamviewer.exe'" /f3⤵
- Creates scheduled task(s)
PID:4140
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\teamviewer\teamviewer.exe" "C:\Users\Admin\AppData\Roaming\teamviewer\teamviewer.exe"2⤵PID:1320
-
-
C:\Users\Admin\AppData\Roaming\teamviewer\teamviewer.exeC:\Users\Admin\AppData\Roaming\teamviewer\teamviewer.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3468
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\teamviewer"2⤵PID:4916
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\teamviewer\teamviewer.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\teamviewer\teamviewer.exe'" /f3⤵
- Creates scheduled task(s)
PID:4888
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\teamviewer\teamviewer.exe" "C:\Users\Admin\AppData\Roaming\teamviewer\teamviewer.exe"2⤵PID:2272
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
897B
MD592f4b6f7507c9eb3dbe9607784be9c61
SHA157384ce9fa9a49439e167d30bef026723cb4b0ea
SHA256e7f5401d055e47d8f8e2ade1f1040f7a4c432a5ec7744998def48f7b737f8fad
SHA5123653ae4c5ecb219756af2accb58a3b414a688e63f421695abe2d4cc9893ee66b657bc554e0b3d62e7b7663262875124aa30d24e067f2d9f232ae1877dd199a52
-
Filesize
19.8MB
MD5e51beeef2a2539ff8ef9e4bf7ffdf002
SHA1fb7435fcbe78d1e50364db3bc527a7e394a3cc71
SHA256e09a35ac6c37f4807daf1dcfeb8e2f1fa78003cf1b48b942152ad54152ed2ae6
SHA512363417b1fb3a4fd12267190cde711366b287def6d00a9ceda33f0f71c88c3500ed57553772f10880edef23eb4733c36c009d07fcf1eb775a5a684ce3f6c47d4b
-
Filesize
19.8MB
MD5e51beeef2a2539ff8ef9e4bf7ffdf002
SHA1fb7435fcbe78d1e50364db3bc527a7e394a3cc71
SHA256e09a35ac6c37f4807daf1dcfeb8e2f1fa78003cf1b48b942152ad54152ed2ae6
SHA512363417b1fb3a4fd12267190cde711366b287def6d00a9ceda33f0f71c88c3500ed57553772f10880edef23eb4733c36c009d07fcf1eb775a5a684ce3f6c47d4b
-
Filesize
19.8MB
MD5e51beeef2a2539ff8ef9e4bf7ffdf002
SHA1fb7435fcbe78d1e50364db3bc527a7e394a3cc71
SHA256e09a35ac6c37f4807daf1dcfeb8e2f1fa78003cf1b48b942152ad54152ed2ae6
SHA512363417b1fb3a4fd12267190cde711366b287def6d00a9ceda33f0f71c88c3500ed57553772f10880edef23eb4733c36c009d07fcf1eb775a5a684ce3f6c47d4b