Overview
overview
10Static
static
81.rar
windows7-x64
31.rar
windows10-2004-x64
3Ehhbsuuemv.exe
windows7-x64
10Ehhbsuuemv.exe
windows10-2004-x64
10GjIEmKW.exe
windows7-x64
10GjIEmKW.exe
windows10-2004-x64
10Jtvcsfni.exe
windows7-x64
10Jtvcsfni.exe
windows10-2004-x64
10OriginalBuild.exe
windows7-x64
1OriginalBuild.exe
windows10-2004-x64
8PUMPED_docc.exe
windows7-x64
10PUMPED_docc.exe
windows10-2004-x64
10Servicing-...te.pdf
windows7-x64
1Servicing-...te.pdf
windows10-2004-x64
1cgu3.rar
windows7-x64
3cgu3.rar
windows10-2004-x64
3debt.rtf.rar
windows7-x64
3debt.rtf.rar
windows10-2004-x64
3eeee.dotm
windows7-x64
1eeee.dotm
windows10-2004-x64
1egor.dotm
windows7-x64
10egor.dotm
windows10-2004-x64
10errr.dotm
windows7-x64
1errr.dotm
windows10-2004-x64
1example.dotm
windows7-x64
10example.dotm
windows10-2004-x64
10fasfs.dotm
windows7-x64
10fasfs.dotm
windows10-2004-x64
10ferrr.dotm
windows7-x64
1ferrr.dotm
windows10-2004-x64
1fffffffnew.dotm
windows7-x64
10fffffffnew.dotm
windows10-2004-x64
10Analysis
-
max time kernel
139s -
max time network
180s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
16/06/2023, 18:36
Behavioral task
behavioral1
Sample
1.rar
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1.rar
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Ehhbsuuemv.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
Ehhbsuuemv.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
GjIEmKW.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
GjIEmKW.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
Jtvcsfni.exe
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
Jtvcsfni.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
OriginalBuild.exe
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
OriginalBuild.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
PUMPED_docc.exe
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
PUMPED_docc.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
Servicing-invoice-template.pdf
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
Servicing-invoice-template.pdf
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
cgu3.rar
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
cgu3.rar
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
debt.rtf.rar
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
debt.rtf.rar
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
eeee.dotm
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
eeee.dotm
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
egor.dotm
Resource
win7-20230220-en
Behavioral task
behavioral22
Sample
egor.dotm
Resource
win10v2004-20230220-en
Behavioral task
behavioral23
Sample
errr.dotm
Resource
win7-20230220-en
Behavioral task
behavioral24
Sample
errr.dotm
Resource
win10v2004-20230220-en
Behavioral task
behavioral25
Sample
example.dotm
Resource
win7-20230220-en
Behavioral task
behavioral26
Sample
example.dotm
Resource
win10v2004-20230220-en
Behavioral task
behavioral27
Sample
fasfs.dotm
Resource
win7-20230220-en
Behavioral task
behavioral28
Sample
fasfs.dotm
Resource
win10v2004-20230220-en
Behavioral task
behavioral29
Sample
ferrr.dotm
Resource
win7-20230220-en
Behavioral task
behavioral30
Sample
ferrr.dotm
Resource
win10v2004-20230220-en
Behavioral task
behavioral31
Sample
fffffffnew.dotm
Resource
win7-20230220-en
Behavioral task
behavioral32
Sample
fffffffnew.dotm
Resource
win10v2004-20230220-en
General
-
Target
Ehhbsuuemv.exe
-
Size
68.4MB
-
MD5
368dc6c24db6c1550ce757c0ffbdd9a0
-
SHA1
89bf95d951ac065bdfd8a323b1ecb70355bbab20
-
SHA256
9f3d5e17974ea77849869573fcca4be15d641ea937fc23fceb2808c59612b641
-
SHA512
78c94132c3f426930bcc80fc8dab760f3ecedcb6747150ba72319a23adedfda7c7cdc494122899cca914b7a1daa859f2a9c54c9bacf5b2e9c2f5519275fb2211
-
SSDEEP
1572864:iEmgHZAuBtRvd59Tdd6ok1vPtBQmjbPV4dDO4oJV36euF3SGzcqj0:zFHZAytD5xdd6FNPtBQeCdDO4oW/P4
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
45.137.65.94:4449
saiarsvkhzxxjyqd
-
delay
1
-
install
true
-
install_file
Google Update.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 9 IoCs
resource yara_rule behavioral3/files/0x000a0000000122e4-61.dat asyncrat behavioral3/files/0x000a0000000122e4-63.dat asyncrat behavioral3/files/0x000a0000000122e4-64.dat asyncrat behavioral3/memory/700-65-0x0000000000360000-0x0000000000378000-memory.dmp asyncrat behavioral3/files/0x0007000000013a41-89.dat asyncrat behavioral3/files/0x0007000000013a41-90.dat asyncrat behavioral3/files/0x0007000000013a41-91.dat asyncrat behavioral3/memory/1656-92-0x0000000001100000-0x0000000001118000-memory.dmp asyncrat behavioral3/memory/1656-93-0x000000001A910000-0x000000001A990000-memory.dmp asyncrat -
Executes dropped EXE 2 IoCs
pid Process 700 Mtuyzzclient6.exe 1656 Google Update.exe -
Loads dropped DLL 1 IoCs
pid Process 1980 Ehhbsuuemv.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1980 set thread context of 1092 1980 Ehhbsuuemv.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 432 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1988 timeout.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1980 Ehhbsuuemv.exe 700 Mtuyzzclient6.exe 1656 Google Update.exe 1656 Google Update.exe 1656 Google Update.exe 1656 Google Update.exe 1656 Google Update.exe 1656 Google Update.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1980 Ehhbsuuemv.exe Token: SeDebugPrivilege 1092 InstallUtil.exe Token: SeDebugPrivilege 700 Mtuyzzclient6.exe Token: SeDebugPrivilege 1656 Google Update.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1656 Google Update.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 1980 wrote to memory of 700 1980 Ehhbsuuemv.exe 28 PID 1980 wrote to memory of 700 1980 Ehhbsuuemv.exe 28 PID 1980 wrote to memory of 700 1980 Ehhbsuuemv.exe 28 PID 1980 wrote to memory of 700 1980 Ehhbsuuemv.exe 28 PID 1980 wrote to memory of 1092 1980 Ehhbsuuemv.exe 29 PID 1980 wrote to memory of 1092 1980 Ehhbsuuemv.exe 29 PID 1980 wrote to memory of 1092 1980 Ehhbsuuemv.exe 29 PID 1980 wrote to memory of 1092 1980 Ehhbsuuemv.exe 29 PID 1980 wrote to memory of 1092 1980 Ehhbsuuemv.exe 29 PID 1980 wrote to memory of 1092 1980 Ehhbsuuemv.exe 29 PID 1980 wrote to memory of 1092 1980 Ehhbsuuemv.exe 29 PID 1980 wrote to memory of 1092 1980 Ehhbsuuemv.exe 29 PID 1980 wrote to memory of 1092 1980 Ehhbsuuemv.exe 29 PID 1980 wrote to memory of 1092 1980 Ehhbsuuemv.exe 29 PID 1980 wrote to memory of 1092 1980 Ehhbsuuemv.exe 29 PID 1980 wrote to memory of 1092 1980 Ehhbsuuemv.exe 29 PID 700 wrote to memory of 1224 700 Mtuyzzclient6.exe 30 PID 700 wrote to memory of 1224 700 Mtuyzzclient6.exe 30 PID 700 wrote to memory of 1224 700 Mtuyzzclient6.exe 30 PID 700 wrote to memory of 604 700 Mtuyzzclient6.exe 31 PID 700 wrote to memory of 604 700 Mtuyzzclient6.exe 31 PID 700 wrote to memory of 604 700 Mtuyzzclient6.exe 31 PID 1224 wrote to memory of 432 1224 cmd.exe 34 PID 1224 wrote to memory of 432 1224 cmd.exe 34 PID 1224 wrote to memory of 432 1224 cmd.exe 34 PID 604 wrote to memory of 1988 604 cmd.exe 35 PID 604 wrote to memory of 1988 604 cmd.exe 35 PID 604 wrote to memory of 1988 604 cmd.exe 35 PID 604 wrote to memory of 1656 604 cmd.exe 36 PID 604 wrote to memory of 1656 604 cmd.exe 36 PID 604 wrote to memory of 1656 604 cmd.exe 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ehhbsuuemv.exe"C:\Users\Admin\AppData\Local\Temp\Ehhbsuuemv.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\Mtuyzzclient6.exe"C:\Users\Admin\AppData\Local\Temp\Mtuyzzclient6.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Google Update" /tr '"C:\Users\Admin\AppData\Roaming\Google Update.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Google Update" /tr '"C:\Users\Admin\AppData\Roaming\Google Update.exe"'4⤵
- Creates scheduled task(s)
PID:432
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpD1B2.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:1988
-
-
C:\Users\Admin\AppData\Roaming\Google Update.exe"C:\Users\Admin\AppData\Roaming\Google Update.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1656
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1092
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD51f304261de14934db9384720c638744a
SHA1b98f60e6feea77a31363d5a686e7be40f6cfc049
SHA256ab23ec09d1ea7a359bd834f2fef7aa5272e8f643e9c27cb2bfe8869a6e447e87
SHA51201f29cf8553d72070c56b953c23771fef9e4aba31b733b001f7b8a1e49e2cf02d120b21baf76ccfa9040548ed603c0308c95a4fedce7b4749fc01baf3c4fc826
-
Filesize
74KB
MD51f304261de14934db9384720c638744a
SHA1b98f60e6feea77a31363d5a686e7be40f6cfc049
SHA256ab23ec09d1ea7a359bd834f2fef7aa5272e8f643e9c27cb2bfe8869a6e447e87
SHA51201f29cf8553d72070c56b953c23771fef9e4aba31b733b001f7b8a1e49e2cf02d120b21baf76ccfa9040548ed603c0308c95a4fedce7b4749fc01baf3c4fc826
-
Filesize
157B
MD5b743266ae43bd7325653f6a4322df9e8
SHA142a4724032d0c4602ad5cb80adab1f8cb2f7d050
SHA256bc8341e85038f547c3e49baff68a8eac31e1226780d43d61e82596df6d24801b
SHA51255699b0394969a1e33e86ff7796d8fd3bcbb7b0b1209a0b5777caf7ed0dc52720613ddbe5be023d7150a13d3e848b91b14a75b4ee933ee37e071414b859f7af8
-
Filesize
157B
MD5b743266ae43bd7325653f6a4322df9e8
SHA142a4724032d0c4602ad5cb80adab1f8cb2f7d050
SHA256bc8341e85038f547c3e49baff68a8eac31e1226780d43d61e82596df6d24801b
SHA51255699b0394969a1e33e86ff7796d8fd3bcbb7b0b1209a0b5777caf7ed0dc52720613ddbe5be023d7150a13d3e848b91b14a75b4ee933ee37e071414b859f7af8
-
Filesize
74KB
MD51f304261de14934db9384720c638744a
SHA1b98f60e6feea77a31363d5a686e7be40f6cfc049
SHA256ab23ec09d1ea7a359bd834f2fef7aa5272e8f643e9c27cb2bfe8869a6e447e87
SHA51201f29cf8553d72070c56b953c23771fef9e4aba31b733b001f7b8a1e49e2cf02d120b21baf76ccfa9040548ed603c0308c95a4fedce7b4749fc01baf3c4fc826
-
Filesize
74KB
MD51f304261de14934db9384720c638744a
SHA1b98f60e6feea77a31363d5a686e7be40f6cfc049
SHA256ab23ec09d1ea7a359bd834f2fef7aa5272e8f643e9c27cb2bfe8869a6e447e87
SHA51201f29cf8553d72070c56b953c23771fef9e4aba31b733b001f7b8a1e49e2cf02d120b21baf76ccfa9040548ed603c0308c95a4fedce7b4749fc01baf3c4fc826
-
Filesize
74KB
MD51f304261de14934db9384720c638744a
SHA1b98f60e6feea77a31363d5a686e7be40f6cfc049
SHA256ab23ec09d1ea7a359bd834f2fef7aa5272e8f643e9c27cb2bfe8869a6e447e87
SHA51201f29cf8553d72070c56b953c23771fef9e4aba31b733b001f7b8a1e49e2cf02d120b21baf76ccfa9040548ed603c0308c95a4fedce7b4749fc01baf3c4fc826
-
Filesize
8B
MD5cf759e4c5f14fe3eec41b87ed756cea8
SHA1c27c796bb3c2fac929359563676f4ba1ffada1f5
SHA256c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761
SHA512c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b
-
Filesize
74KB
MD51f304261de14934db9384720c638744a
SHA1b98f60e6feea77a31363d5a686e7be40f6cfc049
SHA256ab23ec09d1ea7a359bd834f2fef7aa5272e8f643e9c27cb2bfe8869a6e447e87
SHA51201f29cf8553d72070c56b953c23771fef9e4aba31b733b001f7b8a1e49e2cf02d120b21baf76ccfa9040548ed603c0308c95a4fedce7b4749fc01baf3c4fc826