Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08/08/2023, 09:45
Static task
static1
General
-
Target
8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe
-
Size
186KB
-
MD5
ab161491c05bb4e14c9956bd90dec42f
-
SHA1
4f3fa749a5ab5aa69fb762c4f438f2759abf2c31
-
SHA256
8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5
-
SHA512
530bcb714475e55a8e6d7e23ec785140cc988eb4062a2e21cd8893afd33112c839c8cd2e003224ba8246a47afb17b99040780c738f5342e28ad61776e83f7816
-
SSDEEP
3072:0v+8ni6dAi2D6r99PsY8qswZHM+JdBsfUKQn1b8oCikdOFqDdI:0v+uT289RZs+7mobkdOFEI
Malware Config
Extracted
asyncrat
0.5.7B
DefaultT
greightcethebui.sytes.net:1414
greightcethebui.sytes.net:6767
wreightcethebui.sytes.net:1414
wreightcethebui.sytes.net:6767
AsyncMutex_6SI8OkPnW
-
delay
3
-
install
true
-
install_file
oscr.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/memory/4556-137-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
Executes dropped EXE 2 IoCs
pid Process 2388 oscr.exe 3596 oscr.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4452 set thread context of 4556 4452 8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe 81 PID 2388 set thread context of 3596 2388 oscr.exe 97 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4396 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 700 timeout.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 4556 8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe 4556 8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe 4556 8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe 4556 8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe 4556 8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe 4556 8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe 4556 8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe 4556 8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe 4556 8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe 4556 8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe 4556 8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe 4556 8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe 4556 8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe 4556 8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe 4556 8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe 4556 8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe 4556 8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe 4556 8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe 4556 8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe 4556 8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe 4556 8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe 4556 8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe 4556 8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4452 8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe Token: SeDebugPrivilege 4556 8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe Token: SeDebugPrivilege 2388 oscr.exe Token: SeDebugPrivilege 3596 oscr.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 4452 wrote to memory of 4556 4452 8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe 81 PID 4452 wrote to memory of 4556 4452 8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe 81 PID 4452 wrote to memory of 4556 4452 8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe 81 PID 4452 wrote to memory of 4556 4452 8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe 81 PID 4452 wrote to memory of 4556 4452 8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe 81 PID 4452 wrote to memory of 4556 4452 8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe 81 PID 4452 wrote to memory of 4556 4452 8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe 81 PID 4452 wrote to memory of 4556 4452 8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe 81 PID 4556 wrote to memory of 1708 4556 8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe 88 PID 4556 wrote to memory of 1708 4556 8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe 88 PID 4556 wrote to memory of 1708 4556 8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe 88 PID 4556 wrote to memory of 4984 4556 8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe 90 PID 4556 wrote to memory of 4984 4556 8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe 90 PID 4556 wrote to memory of 4984 4556 8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe 90 PID 1708 wrote to memory of 4396 1708 cmd.exe 92 PID 1708 wrote to memory of 4396 1708 cmd.exe 92 PID 1708 wrote to memory of 4396 1708 cmd.exe 92 PID 4984 wrote to memory of 700 4984 cmd.exe 93 PID 4984 wrote to memory of 700 4984 cmd.exe 93 PID 4984 wrote to memory of 700 4984 cmd.exe 93 PID 4984 wrote to memory of 2388 4984 cmd.exe 96 PID 4984 wrote to memory of 2388 4984 cmd.exe 96 PID 4984 wrote to memory of 2388 4984 cmd.exe 96 PID 2388 wrote to memory of 3596 2388 oscr.exe 97 PID 2388 wrote to memory of 3596 2388 oscr.exe 97 PID 2388 wrote to memory of 3596 2388 oscr.exe 97 PID 2388 wrote to memory of 3596 2388 oscr.exe 97 PID 2388 wrote to memory of 3596 2388 oscr.exe 97 PID 2388 wrote to memory of 3596 2388 oscr.exe 97 PID 2388 wrote to memory of 3596 2388 oscr.exe 97 PID 2388 wrote to memory of 3596 2388 oscr.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe"C:\Users\Admin\AppData\Local\Temp\8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exeC:\Users\Admin\AppData\Local\Temp\8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "oscr" /tr '"C:\Users\Admin\AppData\Roaming\oscr.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "oscr" /tr '"C:\Users\Admin\AppData\Roaming\oscr.exe"'4⤵
- Creates scheduled task(s)
PID:4396
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpE465.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:700
-
-
C:\Users\Admin\AppData\Roaming\oscr.exe"C:\Users\Admin\AppData\Roaming\oscr.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Roaming\oscr.exeC:\Users\Admin\AppData\Roaming\oscr.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3596
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\8dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5.exe.log
Filesize522B
MD50f39d6b9afc039d81ff31f65cbf76826
SHA18356d04fe7bba2695d59b6caf5c59f58f3e1a6d8
SHA256ea16b63ffd431ebf658b903710b6b3a9b8a2eb6814eee3a53b707a342780315d
SHA5125bad54adb2e32717ef6275f49e2f101dd7e2011c9be14a32e5c29051e8a3f608cbd0b44ac4855ab21e790cb7a5d84c5f69de087074fd01b35259d34d07f5aaf9
-
Filesize
522B
MD50f39d6b9afc039d81ff31f65cbf76826
SHA18356d04fe7bba2695d59b6caf5c59f58f3e1a6d8
SHA256ea16b63ffd431ebf658b903710b6b3a9b8a2eb6814eee3a53b707a342780315d
SHA5125bad54adb2e32717ef6275f49e2f101dd7e2011c9be14a32e5c29051e8a3f608cbd0b44ac4855ab21e790cb7a5d84c5f69de087074fd01b35259d34d07f5aaf9
-
Filesize
148B
MD542d6317cb9cdd6d30594ad0602e2cb85
SHA1146cb6f7a3d5f14c1205abc46a0b0f3687e492fc
SHA256133a4d52e3333892ce7ccb76e176961d7c8f75d3e92ba950d93bbfab195e2bda
SHA512c4f530cddeb7a2bb30fff015994e5f940ef1a3c1d5670c3741cf2118a530afae900fd98a9808f92f905c0fc3e13dcdaccfb089ec1fd9ce495e481803c9aa4939
-
Filesize
186KB
MD5ab161491c05bb4e14c9956bd90dec42f
SHA14f3fa749a5ab5aa69fb762c4f438f2759abf2c31
SHA2568dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5
SHA512530bcb714475e55a8e6d7e23ec785140cc988eb4062a2e21cd8893afd33112c839c8cd2e003224ba8246a47afb17b99040780c738f5342e28ad61776e83f7816
-
Filesize
186KB
MD5ab161491c05bb4e14c9956bd90dec42f
SHA14f3fa749a5ab5aa69fb762c4f438f2759abf2c31
SHA2568dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5
SHA512530bcb714475e55a8e6d7e23ec785140cc988eb4062a2e21cd8893afd33112c839c8cd2e003224ba8246a47afb17b99040780c738f5342e28ad61776e83f7816
-
Filesize
186KB
MD5ab161491c05bb4e14c9956bd90dec42f
SHA14f3fa749a5ab5aa69fb762c4f438f2759abf2c31
SHA2568dd48cd023c9f13b6b41274c1b6d3be2907dbd929dda7701972b73a029df74b5
SHA512530bcb714475e55a8e6d7e23ec785140cc988eb4062a2e21cd8893afd33112c839c8cd2e003224ba8246a47afb17b99040780c738f5342e28ad61776e83f7816