Analysis

  • max time kernel
    31s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    01-06-2023 15:11

General

  • Target

    file.exe

  • Size

    307KB

  • MD5

    884714bd845895cbd4377d1ba6df376e

  • SHA1

    5a219cb01a10516eab59b2703d7bc4760fb5b5c0

  • SHA256

    5c85b25b5b4f277770b21a77796e7e1672eb046eabb76077c703a993e237a3a7

  • SHA512

    174a7585784d24e4424661a03fbcd4f4195ec9b0b36cf4e01ea7fe5f5c5d7cbed2a74cb3a030531045e57af0c7e07d53e44e7e9f3d888883ee37ea21f4da0674

  • SSDEEP

    6144:Y1s6ZKvncbumIED8Qyl/RUpfPMm9Fy5RiLwFdhLoZxybN:pcbuLQyDebTLIdhLexG

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

192.3.101.190:2015

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Async RAT payload 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:624
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:916
      • C:\Windows\system32\schtasks.exe
        schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'
        3⤵
        • Creates scheduled task(s)
        PID:540
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp243.tmp.bat""
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:468
      • C:\Windows\system32\timeout.exe
        timeout 3
        3⤵
        • Delays execution with timeout.exe
        PID:1168
      • C:\Users\Admin\AppData\Roaming\svchost.exe
        "C:\Users\Admin\AppData\Roaming\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:880
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"
          4⤵
            PID:796
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe"
            4⤵
              PID:1184
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"
              4⤵
                PID:1628
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"
                4⤵
                  PID:1400
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe
                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe"
                  4⤵
                    PID:1084
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe
                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"
                    4⤵
                      PID:1552
                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe
                      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"
                      4⤵
                        PID:612
                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
                        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"
                        4⤵
                          PID:604
                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\SetupUtility.exe
                          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\SetupUtility.exe"
                          4⤵
                          • Suspicious use of WriteProcessMemory
                          PID:700
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 700 -s 168
                            5⤵
                            • Program crash
                            PID:1684

                  Network

                  MITRE ATT&CK Matrix ATT&CK v6

                  Execution

                  Scheduled Task

                  1
                  T1053

                  Persistence

                  Registry Run Keys / Startup Folder

                  1
                  T1060

                  Scheduled Task

                  1
                  T1053

                  Privilege Escalation

                  Scheduled Task

                  1
                  T1053

                  Defense Evasion

                  Modify Registry

                  1
                  T1112

                  Discovery

                  System Information Discovery

                  1
                  T1082

                  Query Registry

                  1
                  T1012

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\tmp243.tmp.bat
                    Filesize

                    150B

                    MD5

                    557bd695efe8977b592bfa87ed4e51ab

                    SHA1

                    1b384a4964ee557076f1448a24d005e7847be25a

                    SHA256

                    fe5ddc10e3e2e3d6222a3e5794f10134a76b4ce682cfaa3f2b9fac000014f798

                    SHA512

                    1522581325b7e64bde3f2c162d7c2cdfb397408237a5c264f38b636af4cedfdcff89a2c04cd8b4d24e137c197bf88a64de94063d49fa35c4192533ff6ba3cc38

                  • C:\Users\Admin\AppData\Local\Temp\tmp243.tmp.bat
                    Filesize

                    150B

                    MD5

                    557bd695efe8977b592bfa87ed4e51ab

                    SHA1

                    1b384a4964ee557076f1448a24d005e7847be25a

                    SHA256

                    fe5ddc10e3e2e3d6222a3e5794f10134a76b4ce682cfaa3f2b9fac000014f798

                    SHA512

                    1522581325b7e64bde3f2c162d7c2cdfb397408237a5c264f38b636af4cedfdcff89a2c04cd8b4d24e137c197bf88a64de94063d49fa35c4192533ff6ba3cc38

                  • C:\Users\Admin\AppData\Roaming\svchost.exe
                    Filesize

                    307KB

                    MD5

                    884714bd845895cbd4377d1ba6df376e

                    SHA1

                    5a219cb01a10516eab59b2703d7bc4760fb5b5c0

                    SHA256

                    5c85b25b5b4f277770b21a77796e7e1672eb046eabb76077c703a993e237a3a7

                    SHA512

                    174a7585784d24e4424661a03fbcd4f4195ec9b0b36cf4e01ea7fe5f5c5d7cbed2a74cb3a030531045e57af0c7e07d53e44e7e9f3d888883ee37ea21f4da0674

                  • C:\Users\Admin\AppData\Roaming\svchost.exe
                    Filesize

                    307KB

                    MD5

                    884714bd845895cbd4377d1ba6df376e

                    SHA1

                    5a219cb01a10516eab59b2703d7bc4760fb5b5c0

                    SHA256

                    5c85b25b5b4f277770b21a77796e7e1672eb046eabb76077c703a993e237a3a7

                    SHA512

                    174a7585784d24e4424661a03fbcd4f4195ec9b0b36cf4e01ea7fe5f5c5d7cbed2a74cb3a030531045e57af0c7e07d53e44e7e9f3d888883ee37ea21f4da0674

                  • \Users\Admin\AppData\Roaming\svchost.exe
                    Filesize

                    307KB

                    MD5

                    884714bd845895cbd4377d1ba6df376e

                    SHA1

                    5a219cb01a10516eab59b2703d7bc4760fb5b5c0

                    SHA256

                    5c85b25b5b4f277770b21a77796e7e1672eb046eabb76077c703a993e237a3a7

                    SHA512

                    174a7585784d24e4424661a03fbcd4f4195ec9b0b36cf4e01ea7fe5f5c5d7cbed2a74cb3a030531045e57af0c7e07d53e44e7e9f3d888883ee37ea21f4da0674

                  • memory/624-54-0x0000000000FC0000-0x0000000001012000-memory.dmp
                    Filesize

                    328KB

                  • memory/624-55-0x000000001BF10000-0x000000001BF90000-memory.dmp
                    Filesize

                    512KB

                  • memory/700-71-0x0000000000400000-0x0000000000412000-memory.dmp
                    Filesize

                    72KB

                  • memory/880-69-0x00000000011E0000-0x0000000001232000-memory.dmp
                    Filesize

                    328KB

                  • memory/880-70-0x0000000002730000-0x00000000027B0000-memory.dmp
                    Filesize

                    512KB