Analysis

  • max time kernel
    142s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230621-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-07-2023 01:26

General

  • Target

    45a8cdb6f9624db32b278982d2964a8cbdaefb78786c01d5e701b7f9a7faffe5.exe

  • Size

    204KB

  • MD5

    7f34748d9786ac7985443d3eb6593a44

  • SHA1

    9bfecba5843e49407541a6427e94f9010565cb52

  • SHA256

    45a8cdb6f9624db32b278982d2964a8cbdaefb78786c01d5e701b7f9a7faffe5

  • SHA512

    c39565437db0e5cf612319c179187ade1429e0144dfefc42f1b7e9761de728566d681ebeae1f6d0da943b6d0d99d0c2d4a9db6fa219b534a81502222cdf505a3

  • SSDEEP

    3072:KYS+DY7uoRdJ1+r79880ejQi9+DijH5KDDvJpVolHSyjqJLyC3ETz9V3:O+DY7uoRcQiKDvuqZl3Et

Score
10/10

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Async RAT payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\45a8cdb6f9624db32b278982d2964a8cbdaefb78786c01d5e701b7f9a7faffe5.exe
    "C:\Users\Admin\AppData\Local\Temp\45a8cdb6f9624db32b278982d2964a8cbdaefb78786c01d5e701b7f9a7faffe5.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1952
    • C:\Windows\SysWOW64\schtasks.exe
      "schtasks.exe" /create /tn "TempMonitor" /tr "C:\Users\Admin\AppData\Local\TempMonitor\Monitor\Monitor.exe" /st 01:31 /sc minute /f
      2⤵
      • Creates scheduled task(s)
      PID:1344
    • C:\Users\Admin\AppData\Local\TempMonitor\Monitor\Monitor.exe
      "C:\Users\Admin\AppData\Local\TempMonitor\Monitor\Monitor.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:456

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/456-135-0x0000000004EE0000-0x0000000004F46000-memory.dmp

    Filesize

    408KB

  • memory/456-136-0x0000000004C20000-0x0000000004C30000-memory.dmp

    Filesize

    64KB

  • memory/456-137-0x0000000004C20000-0x0000000004C30000-memory.dmp

    Filesize

    64KB

  • memory/1952-133-0x0000000000060000-0x0000000000096000-memory.dmp

    Filesize

    216KB