Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
20-05-2023 15:31
Static task
static1
Behavioral task
behavioral1
Sample
svchost.exe
Resource
win7-20230220-en
General
-
Target
svchost.exe
-
Size
4.9MB
-
MD5
6a6d722b4d27203afa3c468ddc6b96b0
-
SHA1
de9c73b7f98ed83dd17903ef41021481e30ef369
-
SHA256
ddd4f8f5f13ada5e5b4bc3d0b0d1a49572b68f600ef3bda720566171f229c5c6
-
SHA512
2418cdd6cf0b8e561847094a82235c83e0a146a2cbe53160f659e4a06192b51a6b7b90bf853a7901e879fc6e833928c4d061bf660e684c73d8ed8465ea1e16ab
-
SSDEEP
49152:jc+tbK8sTWJ708s2iwe0bjIZaxzrzrx8l0n3JjpmdPvoM/ICr5TVD:Y+1KbTWJY8saPbjICzPrGYFpmdPg8V
Malware Config
Extracted
asyncrat
0.5.7B
Microsoft
megaplaneta01.ddns.net:4782
localhost:4782
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 5 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\svchost.exe asyncrat C:\Users\Admin\AppData\Local\svchost.exe asyncrat C:\Users\Admin\AppData\Local\svchost.exe asyncrat behavioral1/memory/340-77-0x0000000000F20000-0x0000000000F32000-memory.dmp asyncrat behavioral1/memory/340-78-0x0000000000E50000-0x0000000000E90000-memory.dmp asyncrat -
Drops startup file 1 IoCs
Processes:
svchost.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\%startupname%.lnk svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
svchost.exepid process 340 svchost.exe -
Loads dropped DLL 1 IoCs
Processes:
RegAsm.exepid process 952 RegAsm.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
svchost.exedescription pid process target process PID 1624 set thread context of 952 1624 svchost.exe RegAsm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
svchost.exeRegAsm.exedescription pid process target process PID 1624 wrote to memory of 952 1624 svchost.exe RegAsm.exe PID 1624 wrote to memory of 952 1624 svchost.exe RegAsm.exe PID 1624 wrote to memory of 952 1624 svchost.exe RegAsm.exe PID 1624 wrote to memory of 952 1624 svchost.exe RegAsm.exe PID 1624 wrote to memory of 952 1624 svchost.exe RegAsm.exe PID 1624 wrote to memory of 952 1624 svchost.exe RegAsm.exe PID 1624 wrote to memory of 952 1624 svchost.exe RegAsm.exe PID 1624 wrote to memory of 952 1624 svchost.exe RegAsm.exe PID 1624 wrote to memory of 952 1624 svchost.exe RegAsm.exe PID 1624 wrote to memory of 952 1624 svchost.exe RegAsm.exe PID 1624 wrote to memory of 952 1624 svchost.exe RegAsm.exe PID 1624 wrote to memory of 952 1624 svchost.exe RegAsm.exe PID 952 wrote to memory of 340 952 RegAsm.exe svchost.exe PID 952 wrote to memory of 340 952 RegAsm.exe svchost.exe PID 952 wrote to memory of 340 952 RegAsm.exe svchost.exe PID 952 wrote to memory of 340 952 RegAsm.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\svchost.exe"C:\Users\Admin\AppData\Local\svchost.exe"3⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\svchost.exeFilesize
45KB
MD5b1c69c02c0b584f5d922dfd04710df58
SHA15e0e4c71bff4b5c26c12ecec83ba39949ad52762
SHA256e2faaccc18ac5e160462229aee43c32abef2040a44433e41b1c30fb86d18dbfc
SHA512dd338684bfad64ed127b13533e45c2a20833b2f503b636452821055017283fb52fa93c232e57821ea2833c063bd12a631a1d96a1fc3b0d0eeb8245b35f05cf93
-
C:\Users\Admin\AppData\Local\svchost.exeFilesize
45KB
MD5b1c69c02c0b584f5d922dfd04710df58
SHA15e0e4c71bff4b5c26c12ecec83ba39949ad52762
SHA256e2faaccc18ac5e160462229aee43c32abef2040a44433e41b1c30fb86d18dbfc
SHA512dd338684bfad64ed127b13533e45c2a20833b2f503b636452821055017283fb52fa93c232e57821ea2833c063bd12a631a1d96a1fc3b0d0eeb8245b35f05cf93
-
\Users\Admin\AppData\Local\svchost.exeFilesize
45KB
MD5b1c69c02c0b584f5d922dfd04710df58
SHA15e0e4c71bff4b5c26c12ecec83ba39949ad52762
SHA256e2faaccc18ac5e160462229aee43c32abef2040a44433e41b1c30fb86d18dbfc
SHA512dd338684bfad64ed127b13533e45c2a20833b2f503b636452821055017283fb52fa93c232e57821ea2833c063bd12a631a1d96a1fc3b0d0eeb8245b35f05cf93
-
memory/340-79-0x0000000000E50000-0x0000000000E90000-memory.dmpFilesize
256KB
-
memory/340-78-0x0000000000E50000-0x0000000000E90000-memory.dmpFilesize
256KB
-
memory/340-77-0x0000000000F20000-0x0000000000F32000-memory.dmpFilesize
72KB
-
memory/952-59-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/952-62-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/952-64-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/952-66-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/952-67-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/952-61-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/952-60-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/952-58-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/952-57-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/1624-54-0x0000000000D80000-0x0000000001276000-memory.dmpFilesize
5.0MB
-
memory/1624-56-0x00000000009D0000-0x0000000000A0A000-memory.dmpFilesize
232KB