Resubmissions

08/08/2023, 23:47

230808-3s617agc32 10

08/08/2023, 09:45

230808-lq9wmabg44 10

Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/08/2023, 09:45

General

  • Target

    8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe

  • Size

    186KB

  • MD5

    ab161491c05bb4e14c9956bd90dec42f

  • SHA1

    4f3fa749a5ab5aa69fb762c4f438f2759abf2c31

  • SHA256

    8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5

  • SHA512

    530bcb714475e55a8e6d7e23ec785140cc988eb4062a2e21cd8893afd33112c839c8cd2e003224ba8246a47afb17b99040780c738f5342e28ad61776e83f7816

  • SSDEEP

    3072:0v+8ni6dAi2D6r99PsY8qswZHM+JdBsfUKQn1b8oCikdOFqDdI:0v+uT289RZs+7mobkdOFEI

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

DefaultT

C2

greightcethebui.sytes.net:1414

greightcethebui.sytes.net:6767

wreightcethebui.sytes.net:1414

wreightcethebui.sytes.net:6767

Mutex

AsyncMutex_6SI8OkPnW

Attributes
  • delay

    3

  • install

    true

  • install_file

    oscr.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Async RAT payload 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe
    "C:\Users\Admin\AppData\Local\Temp\8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4452
    • C:\Users\Admin\AppData\Local\Temp\8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe
      C:\Users\Admin\AppData\Local\Temp\8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4556
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "oscr" /tr '"C:\Users\Admin\AppData\Roaming\oscr.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1708
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn "oscr" /tr '"C:\Users\Admin\AppData\Roaming\oscr.exe"'
          4⤵
          • Creates scheduled task(s)
          PID:4396
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpE465.tmp.bat""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4984
        • C:\Windows\SysWOW64\timeout.exe
          timeout 3
          4⤵
          • Delays execution with timeout.exe
          PID:700
        • C:\Users\Admin\AppData\Roaming\oscr.exe
          "C:\Users\Admin\AppData\Roaming\oscr.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2388
          • C:\Users\Admin\AppData\Roaming\oscr.exe
            C:\Users\Admin\AppData\Roaming\oscr.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:3596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe.log

    Filesize

    522B

    MD5

    0f39d6b9afc039d81ff31f65cbf76826

    SHA1

    8356d04fe7bba2695d59b6caf5c59f58f3e1a6d8

    SHA256

    ea16b63ffd431ebf658b903710b6b3a9b8a2eb6814eee3a53b707a342780315d

    SHA512

    5bad54adb2e32717ef6275f49e2f101dd7e2011c9be14a32e5c29051e8a3f608cbd0b44ac4855ab21e790cb7a5d84c5f69de087074fd01b35259d34d07f5aaf9

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\oscr.exe.log

    Filesize

    522B

    MD5

    0f39d6b9afc039d81ff31f65cbf76826

    SHA1

    8356d04fe7bba2695d59b6caf5c59f58f3e1a6d8

    SHA256

    ea16b63ffd431ebf658b903710b6b3a9b8a2eb6814eee3a53b707a342780315d

    SHA512

    5bad54adb2e32717ef6275f49e2f101dd7e2011c9be14a32e5c29051e8a3f608cbd0b44ac4855ab21e790cb7a5d84c5f69de087074fd01b35259d34d07f5aaf9

  • C:\Users\Admin\AppData\Local\Temp\tmpE465.tmp.bat

    Filesize

    148B

    MD5

    42d6317cb9cdd6d30594ad0602e2cb85

    SHA1

    146cb6f7a3d5f14c1205abc46a0b0f3687e492fc

    SHA256

    133a4d52e3333892ce7ccb76e176961d7c8f75d3e92ba950d93bbfab195e2bda

    SHA512

    c4f530cddeb7a2bb30fff015994e5f940ef1a3c1d5670c3741cf2118a530afae900fd98a9808f92f905c0fc3e13dcdaccfb089ec1fd9ce495e481803c9aa4939

  • C:\Users\Admin\AppData\Roaming\oscr.exe

    Filesize

    186KB

    MD5

    ab161491c05bb4e14c9956bd90dec42f

    SHA1

    4f3fa749a5ab5aa69fb762c4f438f2759abf2c31

    SHA256

    8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5

    SHA512

    530bcb714475e55a8e6d7e23ec785140cc988eb4062a2e21cd8893afd33112c839c8cd2e003224ba8246a47afb17b99040780c738f5342e28ad61776e83f7816

  • C:\Users\Admin\AppData\Roaming\oscr.exe

    Filesize

    186KB

    MD5

    ab161491c05bb4e14c9956bd90dec42f

    SHA1

    4f3fa749a5ab5aa69fb762c4f438f2759abf2c31

    SHA256

    8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5

    SHA512

    530bcb714475e55a8e6d7e23ec785140cc988eb4062a2e21cd8893afd33112c839c8cd2e003224ba8246a47afb17b99040780c738f5342e28ad61776e83f7816

  • C:\Users\Admin\AppData\Roaming\oscr.exe

    Filesize

    186KB

    MD5

    ab161491c05bb4e14c9956bd90dec42f

    SHA1

    4f3fa749a5ab5aa69fb762c4f438f2759abf2c31

    SHA256

    8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5

    SHA512

    530bcb714475e55a8e6d7e23ec785140cc988eb4062a2e21cd8893afd33112c839c8cd2e003224ba8246a47afb17b99040780c738f5342e28ad61776e83f7816

  • memory/2388-153-0x00000000057B0000-0x00000000057C0000-memory.dmp

    Filesize

    64KB

  • memory/2388-152-0x0000000074E70000-0x0000000075620000-memory.dmp

    Filesize

    7.7MB

  • memory/2388-159-0x0000000074E70000-0x0000000075620000-memory.dmp

    Filesize

    7.7MB

  • memory/3596-162-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

    Filesize

    64KB

  • memory/3596-161-0x0000000074E70000-0x0000000075620000-memory.dmp

    Filesize

    7.7MB

  • memory/3596-160-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

    Filesize

    64KB

  • memory/3596-158-0x0000000074E70000-0x0000000075620000-memory.dmp

    Filesize

    7.7MB

  • memory/4452-133-0x0000000000D30000-0x0000000000D66000-memory.dmp

    Filesize

    216KB

  • memory/4452-136-0x0000000005930000-0x00000000059CC000-memory.dmp

    Filesize

    624KB

  • memory/4452-140-0x0000000074E80000-0x0000000075630000-memory.dmp

    Filesize

    7.7MB

  • memory/4452-135-0x0000000005880000-0x0000000005890000-memory.dmp

    Filesize

    64KB

  • memory/4452-134-0x0000000074E80000-0x0000000075630000-memory.dmp

    Filesize

    7.7MB

  • memory/4556-137-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/4556-141-0x0000000074E80000-0x0000000075630000-memory.dmp

    Filesize

    7.7MB

  • memory/4556-147-0x0000000074E80000-0x0000000075630000-memory.dmp

    Filesize

    7.7MB

  • memory/4556-143-0x0000000002910000-0x0000000002976000-memory.dmp

    Filesize

    408KB

  • memory/4556-142-0x0000000004F40000-0x0000000004F50000-memory.dmp

    Filesize

    64KB