Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01-06-2023 22:34
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Variant.Barys.432395.1653.178.exe
Resource
win7-20230220-en
General
-
Target
SecuriteInfo.com.Variant.Barys.432395.1653.178.exe
-
Size
103KB
-
MD5
384cc4b1c3c5d9bce6eb9b1c70e2c54a
-
SHA1
5377096461d28b04866188b2c68d182e146f345d
-
SHA256
391a43e128f1ee34ce61bc1c787867f3c1d6f6af117db338d9186a94d2273c5b
-
SHA512
09a7bce1785f2ee7f8daf603e6eeba4643732311c9dc5225aece7c3e2b9270cf42cded5a0315312c363fc91f1d08f7122ecf8a3a03ed1889c4a2589b82352260
-
SSDEEP
1536:PHHE2mYzsMx9kU1JMZWEt24CUU4MdajsNOVat2RzbmK+OCuBqGRCCuvlMMgCcDc:PEKsMrkUQ4JUU4MCseat2RziKR7Obr
Malware Config
Extracted
asyncrat
0.5.7B
Default
141.98.102.235:16296
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1072-58-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1072-59-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1072-61-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1072-63-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1072-65-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SecuriteInfo.com.Variant.Barys.432395.1653.178.exedescription pid process target process PID 704 set thread context of 1072 704 SecuriteInfo.com.Variant.Barys.432395.1653.178.exe Caspol.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
SecuriteInfo.com.Variant.Barys.432395.1653.178.exedescription pid process target process PID 704 wrote to memory of 1072 704 SecuriteInfo.com.Variant.Barys.432395.1653.178.exe Caspol.exe PID 704 wrote to memory of 1072 704 SecuriteInfo.com.Variant.Barys.432395.1653.178.exe Caspol.exe PID 704 wrote to memory of 1072 704 SecuriteInfo.com.Variant.Barys.432395.1653.178.exe Caspol.exe PID 704 wrote to memory of 1072 704 SecuriteInfo.com.Variant.Barys.432395.1653.178.exe Caspol.exe PID 704 wrote to memory of 1072 704 SecuriteInfo.com.Variant.Barys.432395.1653.178.exe Caspol.exe PID 704 wrote to memory of 1072 704 SecuriteInfo.com.Variant.Barys.432395.1653.178.exe Caspol.exe PID 704 wrote to memory of 1072 704 SecuriteInfo.com.Variant.Barys.432395.1653.178.exe Caspol.exe PID 704 wrote to memory of 1072 704 SecuriteInfo.com.Variant.Barys.432395.1653.178.exe Caspol.exe PID 704 wrote to memory of 1072 704 SecuriteInfo.com.Variant.Barys.432395.1653.178.exe Caspol.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Barys.432395.1653.178.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Barys.432395.1653.178.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/704-54-0x0000000000D00000-0x0000000000D1E000-memory.dmpFilesize
120KB
-
memory/704-55-0x0000000000150000-0x000000000015C000-memory.dmpFilesize
48KB
-
memory/1072-56-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1072-57-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1072-58-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1072-59-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1072-60-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/1072-61-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1072-63-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1072-65-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1072-66-0x0000000004DF0000-0x0000000004E30000-memory.dmpFilesize
256KB
-
memory/1072-67-0x0000000004DF0000-0x0000000004E30000-memory.dmpFilesize
256KB