Analysis
-
max time kernel
150s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 07:32
Static task
static1
Behavioral task
behavioral1
Sample
7185d3a43d3c8bdf79f5e2bef494edbe450244e1af247af36cf1d8992fdbb6c2.exe
Resource
win7-20230831-en
General
-
Target
7185d3a43d3c8bdf79f5e2bef494edbe450244e1af247af36cf1d8992fdbb6c2.exe
-
Size
912KB
-
MD5
b85a889fd4821baf56d94ffabacaa7b0
-
SHA1
685938698362ecefdb0fb4ef583babadc254914c
-
SHA256
7185d3a43d3c8bdf79f5e2bef494edbe450244e1af247af36cf1d8992fdbb6c2
-
SHA512
6118bea74222900a2ff2052c3ccde1e5d6d125bc980371c356b92dcec19b7f58a10a07babc5076d084b910f1bd45196c8a2ff5da44056bfa3900c1b34d99b772
-
SSDEEP
24576:SNA3R5drXPYhkXJJBRMUrjU+ydUMN0hIukeLPlZjKszG:r5QOZNMr+sdNEqepEszG
Malware Config
Extracted
asyncrat
0.5.7B
Default5
floptuytonroyem.sytes.net:7707
floptuytonroyem.sytes.net:8808
mloptuytonroyem.sytes.net:7707
mloptuytonroyem.sytes.net:8808
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
vssr.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/memory/1904-31-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation 7185d3a43d3c8bdf79f5e2bef494edbe450244e1af247af36cf1d8992fdbb6c2.exe Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation fchsg.sfx.exe Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation fchsg.exe -
Executes dropped EXE 5 IoCs
pid Process 5112 fchsg.sfx.exe 4812 fchsg.exe 1904 fchsg.exe 4172 vssr.exe 4748 vssr.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4812 set thread context of 1904 4812 fchsg.exe 96 PID 4172 set thread context of 4748 4172 vssr.exe 109 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1816 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4132 timeout.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 1904 fchsg.exe 1904 fchsg.exe 1904 fchsg.exe 1904 fchsg.exe 1904 fchsg.exe 1904 fchsg.exe 1904 fchsg.exe 1904 fchsg.exe 1904 fchsg.exe 1904 fchsg.exe 1904 fchsg.exe 1904 fchsg.exe 1904 fchsg.exe 1904 fchsg.exe 1904 fchsg.exe 1904 fchsg.exe 1904 fchsg.exe 1904 fchsg.exe 1904 fchsg.exe 1904 fchsg.exe 1904 fchsg.exe 1904 fchsg.exe 1904 fchsg.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4812 fchsg.exe Token: SeDebugPrivilege 1904 fchsg.exe Token: SeDebugPrivilege 4172 vssr.exe Token: SeDebugPrivilege 4748 vssr.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 4336 wrote to memory of 544 4336 7185d3a43d3c8bdf79f5e2bef494edbe450244e1af247af36cf1d8992fdbb6c2.exe 86 PID 4336 wrote to memory of 544 4336 7185d3a43d3c8bdf79f5e2bef494edbe450244e1af247af36cf1d8992fdbb6c2.exe 86 PID 4336 wrote to memory of 544 4336 7185d3a43d3c8bdf79f5e2bef494edbe450244e1af247af36cf1d8992fdbb6c2.exe 86 PID 544 wrote to memory of 5112 544 cmd.exe 90 PID 544 wrote to memory of 5112 544 cmd.exe 90 PID 544 wrote to memory of 5112 544 cmd.exe 90 PID 5112 wrote to memory of 4812 5112 fchsg.sfx.exe 91 PID 5112 wrote to memory of 4812 5112 fchsg.sfx.exe 91 PID 5112 wrote to memory of 4812 5112 fchsg.sfx.exe 91 PID 4812 wrote to memory of 1904 4812 fchsg.exe 96 PID 4812 wrote to memory of 1904 4812 fchsg.exe 96 PID 4812 wrote to memory of 1904 4812 fchsg.exe 96 PID 4812 wrote to memory of 1904 4812 fchsg.exe 96 PID 4812 wrote to memory of 1904 4812 fchsg.exe 96 PID 4812 wrote to memory of 1904 4812 fchsg.exe 96 PID 4812 wrote to memory of 1904 4812 fchsg.exe 96 PID 4812 wrote to memory of 1904 4812 fchsg.exe 96 PID 1904 wrote to memory of 3488 1904 fchsg.exe 102 PID 1904 wrote to memory of 3488 1904 fchsg.exe 102 PID 1904 wrote to memory of 3488 1904 fchsg.exe 102 PID 1904 wrote to memory of 1192 1904 fchsg.exe 104 PID 1904 wrote to memory of 1192 1904 fchsg.exe 104 PID 1904 wrote to memory of 1192 1904 fchsg.exe 104 PID 3488 wrote to memory of 1816 3488 cmd.exe 106 PID 3488 wrote to memory of 1816 3488 cmd.exe 106 PID 3488 wrote to memory of 1816 3488 cmd.exe 106 PID 1192 wrote to memory of 4132 1192 cmd.exe 107 PID 1192 wrote to memory of 4132 1192 cmd.exe 107 PID 1192 wrote to memory of 4132 1192 cmd.exe 107 PID 1192 wrote to memory of 4172 1192 cmd.exe 108 PID 1192 wrote to memory of 4172 1192 cmd.exe 108 PID 1192 wrote to memory of 4172 1192 cmd.exe 108 PID 4172 wrote to memory of 4748 4172 vssr.exe 109 PID 4172 wrote to memory of 4748 4172 vssr.exe 109 PID 4172 wrote to memory of 4748 4172 vssr.exe 109 PID 4172 wrote to memory of 4748 4172 vssr.exe 109 PID 4172 wrote to memory of 4748 4172 vssr.exe 109 PID 4172 wrote to memory of 4748 4172 vssr.exe 109 PID 4172 wrote to memory of 4748 4172 vssr.exe 109 PID 4172 wrote to memory of 4748 4172 vssr.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\7185d3a43d3c8bdf79f5e2bef494edbe450244e1af247af36cf1d8992fdbb6c2.exe"C:\Users\Admin\AppData\Local\Temp\7185d3a43d3c8bdf79f5e2bef494edbe450244e1af247af36cf1d8992fdbb6c2.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hgkfin.cmd" "2⤵
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Local\Temp\fchsg.sfx.exefchsg.sfx.exe -ptujhmyiwsafigsohdfuishgrygfysrsoihfihgsoifghsithngmkaswodtyuiofxvflfadfdyehngfszafugyRhhguhrsugsudbfrgsfskfshbrkgysgrhgnmeUvqxsYb -dC:\Users\Admin\AppData\Local\Temp3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\fchsg.exe"C:\Users\Admin\AppData\Local\Temp\fchsg.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\fchsg.exeC:\Users\Admin\AppData\Local\Temp\fchsg.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "vssr" /tr '"C:\Users\Admin\AppData\Roaming\vssr.exe"' & exit6⤵
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "vssr" /tr '"C:\Users\Admin\AppData\Roaming\vssr.exe"'7⤵
- Creates scheduled task(s)
PID:1816
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpEAEC.tmp.bat""6⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\timeout.exetimeout 37⤵
- Delays execution with timeout.exe
PID:4132
-
-
C:\Users\Admin\AppData\Roaming\vssr.exe"C:\Users\Admin\AppData\Roaming\vssr.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Users\Admin\AppData\Roaming\vssr.exeC:\Users\Admin\AppData\Roaming\vssr.exe8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4748
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
706B
MD5d95c58e609838928f0f49837cab7dfd2
SHA155e7139a1e3899195b92ed8771d1ca2c7d53c916
SHA2560407c814aef0d62aec7fd39b7c2f614746f0d8ff41f8ef957736f520f14b0339
SHA512405310b29a833604c6627063bfdcf055a197e01f633ef21da238f1a6415a02e21315d689b4a6669db23e82152bed6f3492afb60963e6b2a0e9bb2ac09a480b5d
-
Filesize
706B
MD5d95c58e609838928f0f49837cab7dfd2
SHA155e7139a1e3899195b92ed8771d1ca2c7d53c916
SHA2560407c814aef0d62aec7fd39b7c2f614746f0d8ff41f8ef957736f520f14b0339
SHA512405310b29a833604c6627063bfdcf055a197e01f633ef21da238f1a6415a02e21315d689b4a6669db23e82152bed6f3492afb60963e6b2a0e9bb2ac09a480b5d
-
Filesize
234KB
MD54f73df356c838206679bba47f79d7f45
SHA16e622fd798bb5e4c016e5c3a3d70f15acc61e6ca
SHA25687142e0539111c74213e5d87d1d0c4039b21f55054c4cc2189e69f1e0bd9268b
SHA5125c13a30f0089ee2323f203d44f49df54e30d1401bab09af3d00345c9aec75f48506566d4e0d0167ca81ca0939cf572bf57794ab551b032cd0ae694d5b672e4d2
-
Filesize
234KB
MD54f73df356c838206679bba47f79d7f45
SHA16e622fd798bb5e4c016e5c3a3d70f15acc61e6ca
SHA25687142e0539111c74213e5d87d1d0c4039b21f55054c4cc2189e69f1e0bd9268b
SHA5125c13a30f0089ee2323f203d44f49df54e30d1401bab09af3d00345c9aec75f48506566d4e0d0167ca81ca0939cf572bf57794ab551b032cd0ae694d5b672e4d2
-
Filesize
234KB
MD54f73df356c838206679bba47f79d7f45
SHA16e622fd798bb5e4c016e5c3a3d70f15acc61e6ca
SHA25687142e0539111c74213e5d87d1d0c4039b21f55054c4cc2189e69f1e0bd9268b
SHA5125c13a30f0089ee2323f203d44f49df54e30d1401bab09af3d00345c9aec75f48506566d4e0d0167ca81ca0939cf572bf57794ab551b032cd0ae694d5b672e4d2
-
Filesize
234KB
MD54f73df356c838206679bba47f79d7f45
SHA16e622fd798bb5e4c016e5c3a3d70f15acc61e6ca
SHA25687142e0539111c74213e5d87d1d0c4039b21f55054c4cc2189e69f1e0bd9268b
SHA5125c13a30f0089ee2323f203d44f49df54e30d1401bab09af3d00345c9aec75f48506566d4e0d0167ca81ca0939cf572bf57794ab551b032cd0ae694d5b672e4d2
-
Filesize
726KB
MD5e98ca37bf501a94cc1014db34defbeb1
SHA13fb8821eb77364bd567614df43f7e823ba105867
SHA2568e3b07dad016d04f0678d96b42db5107b6d616c301b2826f90caa475b4842876
SHA51209d741d3d172c322f7000c53479ac1ab5c6b1f4c05ec74def5d4bf0d1795f05cfb688a588b1f1de8471a518e3d802d57e5769a3c92ab0d1918c822cf2488e263
-
Filesize
726KB
MD5e98ca37bf501a94cc1014db34defbeb1
SHA13fb8821eb77364bd567614df43f7e823ba105867
SHA2568e3b07dad016d04f0678d96b42db5107b6d616c301b2826f90caa475b4842876
SHA51209d741d3d172c322f7000c53479ac1ab5c6b1f4c05ec74def5d4bf0d1795f05cfb688a588b1f1de8471a518e3d802d57e5769a3c92ab0d1918c822cf2488e263
-
Filesize
19KB
MD5026747f1d249e51a9bba06d032e0a31d
SHA16adf6ab2c66b5129ccbf85fe2e28dc3e0ade2375
SHA256bec1a21e0c77af544ddaaa82614eae744aab6935c0c9783230dc81b53619ac94
SHA51237eacdb8cb03942356e6426acd1d050854b7123ec5a299eac55a5de64635c3dd2eccf6c85018184f48ca46a0336d9619e6256bf706155abb511f7016a5f24466
-
Filesize
148B
MD567f533a059c9cadef7bec548f0d2d5f5
SHA1cb04610f6f337122c2756f1fb1d9014e063da958
SHA256602abb3a0dfc6be697f97e0c73686de4c47bbeeefb125704a93ece3d84e97efa
SHA5124909f40fe92fff1bcc368aba6a9fe1a4efeeff5b186642656786c722cd8b7d70a0f060b4e7729654be585c7a2d6b579871e43df4e3ddef02b92138fa94a36759
-
Filesize
234KB
MD54f73df356c838206679bba47f79d7f45
SHA16e622fd798bb5e4c016e5c3a3d70f15acc61e6ca
SHA25687142e0539111c74213e5d87d1d0c4039b21f55054c4cc2189e69f1e0bd9268b
SHA5125c13a30f0089ee2323f203d44f49df54e30d1401bab09af3d00345c9aec75f48506566d4e0d0167ca81ca0939cf572bf57794ab551b032cd0ae694d5b672e4d2
-
Filesize
234KB
MD54f73df356c838206679bba47f79d7f45
SHA16e622fd798bb5e4c016e5c3a3d70f15acc61e6ca
SHA25687142e0539111c74213e5d87d1d0c4039b21f55054c4cc2189e69f1e0bd9268b
SHA5125c13a30f0089ee2323f203d44f49df54e30d1401bab09af3d00345c9aec75f48506566d4e0d0167ca81ca0939cf572bf57794ab551b032cd0ae694d5b672e4d2
-
Filesize
234KB
MD54f73df356c838206679bba47f79d7f45
SHA16e622fd798bb5e4c016e5c3a3d70f15acc61e6ca
SHA25687142e0539111c74213e5d87d1d0c4039b21f55054c4cc2189e69f1e0bd9268b
SHA5125c13a30f0089ee2323f203d44f49df54e30d1401bab09af3d00345c9aec75f48506566d4e0d0167ca81ca0939cf572bf57794ab551b032cd0ae694d5b672e4d2