Analysis
-
max time kernel
88s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
31/05/2023, 10:11
Static task
static1
Behavioral task
behavioral1
Sample
SCRSHOT02.scr.exe
Resource
win7-20230220-en
General
-
Target
SCRSHOT02.scr.exe
-
Size
255KB
-
MD5
cc54630cfed370da5d83b5c3d0ee9ec4
-
SHA1
d18ba6e2d8e877bc0bec89536087f49a4bf32921
-
SHA256
1270491bd3068a4159eee0ad8c8d6871cf0ba80cac9fd749a7e9d1c02f6f3653
-
SHA512
1b7a78bb5303e97cb74896d68d6094a050e8859a2b944840619ad3b589a4654d292363e3afce33a7fd2d1805ead532ba706951149a9742f5040f2252d17b695a
-
SSDEEP
3072:FRsjupfBVcoFDzbtu/c762soY8zyCy0A:MKxBVjF3bc/cpsoYSHA
Malware Config
Extracted
asyncrat
0.5.7B
Default
iphy1.duckdns.org:8808
AsyncMutex_6SI8OkPnkg
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 5 IoCs
resource yara_rule behavioral1/memory/2040-59-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/2040-60-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/2040-62-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/2040-64-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/2040-66-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1192 set thread context of 2040 1192 SCRSHOT02.scr.exe 28 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1176 schtasks.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1192 SCRSHOT02.scr.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2040 vbc.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1192 wrote to memory of 2040 1192 SCRSHOT02.scr.exe 28 PID 1192 wrote to memory of 2040 1192 SCRSHOT02.scr.exe 28 PID 1192 wrote to memory of 2040 1192 SCRSHOT02.scr.exe 28 PID 1192 wrote to memory of 2040 1192 SCRSHOT02.scr.exe 28 PID 1192 wrote to memory of 2040 1192 SCRSHOT02.scr.exe 28 PID 1192 wrote to memory of 2040 1192 SCRSHOT02.scr.exe 28 PID 1192 wrote to memory of 2040 1192 SCRSHOT02.scr.exe 28 PID 1192 wrote to memory of 2040 1192 SCRSHOT02.scr.exe 28 PID 1192 wrote to memory of 2040 1192 SCRSHOT02.scr.exe 28 PID 1192 wrote to memory of 1348 1192 SCRSHOT02.scr.exe 29 PID 1192 wrote to memory of 1348 1192 SCRSHOT02.scr.exe 29 PID 1192 wrote to memory of 1348 1192 SCRSHOT02.scr.exe 29 PID 1192 wrote to memory of 1348 1192 SCRSHOT02.scr.exe 29 PID 1192 wrote to memory of 768 1192 SCRSHOT02.scr.exe 31 PID 1192 wrote to memory of 768 1192 SCRSHOT02.scr.exe 31 PID 1192 wrote to memory of 768 1192 SCRSHOT02.scr.exe 31 PID 1192 wrote to memory of 768 1192 SCRSHOT02.scr.exe 31 PID 768 wrote to memory of 1176 768 cmd.exe 33 PID 768 wrote to memory of 1176 768 cmd.exe 33 PID 768 wrote to memory of 1176 768 cmd.exe 33 PID 768 wrote to memory of 1176 768 cmd.exe 33 PID 1192 wrote to memory of 1516 1192 SCRSHOT02.scr.exe 34 PID 1192 wrote to memory of 1516 1192 SCRSHOT02.scr.exe 34 PID 1192 wrote to memory of 1516 1192 SCRSHOT02.scr.exe 34 PID 1192 wrote to memory of 1516 1192 SCRSHOT02.scr.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\SCRSHOT02.scr.exe"C:\Users\Admin\AppData\Local\Temp\SCRSHOT02.scr.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2040
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mkdir "C:\Users\Admin\AppData\Roaming\winpr01"2⤵PID:1348
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\winpr01\winpr01.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\winpr01\winpr01.exe'" /f3⤵
- Creates scheduled task(s)
PID:1176
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Local\Temp\SCRSHOT02.scr.exe" "C:\Users\Admin\AppData\Roaming\winpr01\winpr01.exe"2⤵PID:1516
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {98321F1D-E0FD-4BCE-8C46-38807C3B217D} S-1-5-21-3499517378-2376672570-1134980332-1000:MLXLFKOI\Admin:Interactive:[1]1⤵PID:1084
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27