Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11-01-2024 22:40
Static task
static1
Behavioral task
behavioral1
Sample
54c5be1e2056c9d591b7e35853ca4a84.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
54c5be1e2056c9d591b7e35853ca4a84.exe
Resource
win10v2004-20231215-en
General
-
Target
54c5be1e2056c9d591b7e35853ca4a84.exe
-
Size
585KB
-
MD5
54c5be1e2056c9d591b7e35853ca4a84
-
SHA1
c00bd4d0c3b6060dde5095c4c6938badf1b29eda
-
SHA256
0430110381976669226247e7c5403ac61f4d419c7fa223231ce5c9af7cd3bbf1
-
SHA512
8d6e219729f8a981c94b7e8d7b5f2bf764367b096381abaa3033171c590587b00ced309e641a9955f60c3836fc366c91bfd90414216373cd91e66ab2f24a4c75
-
SSDEEP
6144:5jrbYSqQ/Gq/lqLrBOOfd0tV9D8DT/XELB:5nb/xq0V9ATfWB
Malware Config
Extracted
asyncrat
0.5.7B
WIRE$$$$$$$$
severdops.ddns.net:6204
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
iconfx.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/2728-8-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/2728-10-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/2728-14-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/2728-16-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/2728-18-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/2728-24-0x0000000000F00000-0x0000000000F40000-memory.dmp asyncrat -
Executes dropped EXE 2 IoCs
Processes:
iconfx.exeiconfx.exepid process 2392 iconfx.exe 3008 iconfx.exe -
Loads dropped DLL 7 IoCs
Processes:
cmd.exeWerFault.exepid process 2584 cmd.exe 2584 cmd.exe 668 WerFault.exe 668 WerFault.exe 668 WerFault.exe 668 WerFault.exe 668 WerFault.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
54c5be1e2056c9d591b7e35853ca4a84.exeiconfx.exedescription pid process target process PID 2348 set thread context of 2728 2348 54c5be1e2056c9d591b7e35853ca4a84.exe 54c5be1e2056c9d591b7e35853ca4a84.exe PID 2392 set thread context of 3008 2392 iconfx.exe iconfx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2316 2348 WerFault.exe 54c5be1e2056c9d591b7e35853ca4a84.exe 668 2392 WerFault.exe iconfx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1940 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
54c5be1e2056c9d591b7e35853ca4a84.exepid process 2728 54c5be1e2056c9d591b7e35853ca4a84.exe 2728 54c5be1e2056c9d591b7e35853ca4a84.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
54c5be1e2056c9d591b7e35853ca4a84.exe54c5be1e2056c9d591b7e35853ca4a84.exeiconfx.exeiconfx.exedescription pid process Token: SeDebugPrivilege 2348 54c5be1e2056c9d591b7e35853ca4a84.exe Token: SeDebugPrivilege 2728 54c5be1e2056c9d591b7e35853ca4a84.exe Token: SeDebugPrivilege 2392 iconfx.exe Token: SeDebugPrivilege 3008 iconfx.exe -
Suspicious use of WriteProcessMemory 46 IoCs
Processes:
54c5be1e2056c9d591b7e35853ca4a84.exe54c5be1e2056c9d591b7e35853ca4a84.execmd.execmd.exeiconfx.exedescription pid process target process PID 2348 wrote to memory of 2728 2348 54c5be1e2056c9d591b7e35853ca4a84.exe 54c5be1e2056c9d591b7e35853ca4a84.exe PID 2348 wrote to memory of 2728 2348 54c5be1e2056c9d591b7e35853ca4a84.exe 54c5be1e2056c9d591b7e35853ca4a84.exe PID 2348 wrote to memory of 2728 2348 54c5be1e2056c9d591b7e35853ca4a84.exe 54c5be1e2056c9d591b7e35853ca4a84.exe PID 2348 wrote to memory of 2728 2348 54c5be1e2056c9d591b7e35853ca4a84.exe 54c5be1e2056c9d591b7e35853ca4a84.exe PID 2348 wrote to memory of 2728 2348 54c5be1e2056c9d591b7e35853ca4a84.exe 54c5be1e2056c9d591b7e35853ca4a84.exe PID 2348 wrote to memory of 2728 2348 54c5be1e2056c9d591b7e35853ca4a84.exe 54c5be1e2056c9d591b7e35853ca4a84.exe PID 2348 wrote to memory of 2728 2348 54c5be1e2056c9d591b7e35853ca4a84.exe 54c5be1e2056c9d591b7e35853ca4a84.exe PID 2348 wrote to memory of 2728 2348 54c5be1e2056c9d591b7e35853ca4a84.exe 54c5be1e2056c9d591b7e35853ca4a84.exe PID 2348 wrote to memory of 2728 2348 54c5be1e2056c9d591b7e35853ca4a84.exe 54c5be1e2056c9d591b7e35853ca4a84.exe PID 2348 wrote to memory of 2316 2348 54c5be1e2056c9d591b7e35853ca4a84.exe WerFault.exe PID 2348 wrote to memory of 2316 2348 54c5be1e2056c9d591b7e35853ca4a84.exe WerFault.exe PID 2348 wrote to memory of 2316 2348 54c5be1e2056c9d591b7e35853ca4a84.exe WerFault.exe PID 2348 wrote to memory of 2316 2348 54c5be1e2056c9d591b7e35853ca4a84.exe WerFault.exe PID 2728 wrote to memory of 2844 2728 54c5be1e2056c9d591b7e35853ca4a84.exe cmd.exe PID 2728 wrote to memory of 2844 2728 54c5be1e2056c9d591b7e35853ca4a84.exe cmd.exe PID 2728 wrote to memory of 2844 2728 54c5be1e2056c9d591b7e35853ca4a84.exe cmd.exe PID 2728 wrote to memory of 2844 2728 54c5be1e2056c9d591b7e35853ca4a84.exe cmd.exe PID 2728 wrote to memory of 2584 2728 54c5be1e2056c9d591b7e35853ca4a84.exe cmd.exe PID 2728 wrote to memory of 2584 2728 54c5be1e2056c9d591b7e35853ca4a84.exe cmd.exe PID 2728 wrote to memory of 2584 2728 54c5be1e2056c9d591b7e35853ca4a84.exe cmd.exe PID 2728 wrote to memory of 2584 2728 54c5be1e2056c9d591b7e35853ca4a84.exe cmd.exe PID 2844 wrote to memory of 2512 2844 cmd.exe schtasks.exe PID 2844 wrote to memory of 2512 2844 cmd.exe schtasks.exe PID 2844 wrote to memory of 2512 2844 cmd.exe schtasks.exe PID 2844 wrote to memory of 2512 2844 cmd.exe schtasks.exe PID 2584 wrote to memory of 1940 2584 cmd.exe timeout.exe PID 2584 wrote to memory of 1940 2584 cmd.exe timeout.exe PID 2584 wrote to memory of 1940 2584 cmd.exe timeout.exe PID 2584 wrote to memory of 1940 2584 cmd.exe timeout.exe PID 2584 wrote to memory of 2392 2584 cmd.exe iconfx.exe PID 2584 wrote to memory of 2392 2584 cmd.exe iconfx.exe PID 2584 wrote to memory of 2392 2584 cmd.exe iconfx.exe PID 2584 wrote to memory of 2392 2584 cmd.exe iconfx.exe PID 2392 wrote to memory of 3008 2392 iconfx.exe iconfx.exe PID 2392 wrote to memory of 3008 2392 iconfx.exe iconfx.exe PID 2392 wrote to memory of 3008 2392 iconfx.exe iconfx.exe PID 2392 wrote to memory of 3008 2392 iconfx.exe iconfx.exe PID 2392 wrote to memory of 3008 2392 iconfx.exe iconfx.exe PID 2392 wrote to memory of 3008 2392 iconfx.exe iconfx.exe PID 2392 wrote to memory of 3008 2392 iconfx.exe iconfx.exe PID 2392 wrote to memory of 3008 2392 iconfx.exe iconfx.exe PID 2392 wrote to memory of 3008 2392 iconfx.exe iconfx.exe PID 2392 wrote to memory of 668 2392 iconfx.exe WerFault.exe PID 2392 wrote to memory of 668 2392 iconfx.exe WerFault.exe PID 2392 wrote to memory of 668 2392 iconfx.exe WerFault.exe PID 2392 wrote to memory of 668 2392 iconfx.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\54c5be1e2056c9d591b7e35853ca4a84.exe"C:\Users\Admin\AppData\Local\Temp\54c5be1e2056c9d591b7e35853ca4a84.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\54c5be1e2056c9d591b7e35853ca4a84.exe"C:\Users\Admin\AppData\Local\Temp\54c5be1e2056c9d591b7e35853ca4a84.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "iconfx" /tr '"C:\Users\Admin\AppData\Roaming\iconfx.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "iconfx" /tr '"C:\Users\Admin\AppData\Roaming\iconfx.exe"'4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpA544.tmp.bat""3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\iconfx.exe"C:\Users\Admin\AppData\Roaming\iconfx.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\iconfx.exe"C:\Users\Admin\AppData\Roaming\iconfx.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 6525⤵
- Loads dropped DLL
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 6402⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpA544.tmp.batFilesize
150B
MD5704efbd1e924d49aba5005896e0355e4
SHA15efe2a835b03b711c0419b983187991946982b73
SHA2568987793863909ac1dd7593808bd685d5f2f1e1597d0547435740c8c4c949a070
SHA512771ec090dd8ff185f44e31ada6a132c3f2f8c9481ae2aa6a90437c732ed17456bbd9a91628d58055a24cf4fb962fdc1a1237d7aebdb1280279ef28bb889b44dd
-
\Users\Admin\AppData\Roaming\iconfx.exeFilesize
585KB
MD554c5be1e2056c9d591b7e35853ca4a84
SHA1c00bd4d0c3b6060dde5095c4c6938badf1b29eda
SHA2560430110381976669226247e7c5403ac61f4d419c7fa223231ce5c9af7cd3bbf1
SHA5128d6e219729f8a981c94b7e8d7b5f2bf764367b096381abaa3033171c590587b00ced309e641a9955f60c3836fc366c91bfd90414216373cd91e66ab2f24a4c75
-
\Users\Admin\AppData\Roaming\iconfx.exeFilesize
486KB
MD5ac6ba1f7d876186da2c87c4b1ba1b71c
SHA1ea42c220c711d4537c4ed9b6a32575d9e89a5ba7
SHA2564b0b1e5a55995c84d0f47b3daf012dca646dbde9b58c4f80c3dc13cf6e250eb1
SHA5124f316a5d05a7570e2db983d559d544bcba39ef8a42b4691df2238488bb24a847b87d3ce303009f8c34c9f93e8807d81fe488f828481b0afadb0833d9b4564308
-
\Users\Admin\AppData\Roaming\iconfx.exeFilesize
177KB
MD5f6b1cb65830df4f1b1c9982fe1c397b6
SHA11a31e188b309c487bffeed90a7bb5dc1ec475a86
SHA256251c97e13377712ba3660d243ef662839763ed21371d8f5c18770990fd4c6d02
SHA5128eeab8c9bcd003a5200a4f81a711ea97a1fe843c4e71631cc097109460d2474e995d54d89b3e905cb184a9292264eaea5c5622db7e3ef48313926ec31078147d
-
\Users\Admin\AppData\Roaming\iconfx.exeFilesize
563KB
MD552d1f059e14c9f163c8100098c0dfb23
SHA10014ef019f3d9a4aeab25a5a211ec56409b46c60
SHA256acd5f171772eb931682265c4e54c00a0fad2c756594fdfad231acfb2b6fa1434
SHA51231a7a82af68655f628aa771b677c40b3b11be25cf1e59c1fc9cc189c08b6726844784c385566e6568fafda0fac50e06687c455f9abb62253c2b1e9866c4d1793
-
memory/2348-19-0x00000000003B0000-0x00000000003B8000-memory.dmpFilesize
32KB
-
memory/2348-0-0x0000000001010000-0x00000000010A6000-memory.dmpFilesize
600KB
-
memory/2348-3-0x0000000000400000-0x0000000000418000-memory.dmpFilesize
96KB
-
memory/2348-2-0x0000000000C70000-0x0000000000CB0000-memory.dmpFilesize
256KB
-
memory/2348-1-0x0000000074B50000-0x000000007523E000-memory.dmpFilesize
6.9MB
-
memory/2348-35-0x0000000000C70000-0x0000000000CB0000-memory.dmpFilesize
256KB
-
memory/2348-23-0x0000000074B50000-0x000000007523E000-memory.dmpFilesize
6.9MB
-
memory/2392-61-0x0000000074B50000-0x000000007523E000-memory.dmpFilesize
6.9MB
-
memory/2392-42-0x0000000004920000-0x0000000004960000-memory.dmpFilesize
256KB
-
memory/2392-41-0x0000000074B50000-0x000000007523E000-memory.dmpFilesize
6.9MB
-
memory/2392-40-0x0000000000FC0000-0x0000000001056000-memory.dmpFilesize
600KB
-
memory/2728-10-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2728-8-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2728-24-0x0000000000F00000-0x0000000000F40000-memory.dmpFilesize
256KB
-
memory/2728-22-0x0000000074B50000-0x000000007523E000-memory.dmpFilesize
6.9MB
-
memory/2728-18-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2728-16-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2728-14-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2728-4-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2728-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2728-6-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2728-34-0x0000000074B50000-0x000000007523E000-memory.dmpFilesize
6.9MB
-
memory/3008-59-0x0000000074B50000-0x000000007523E000-memory.dmpFilesize
6.9MB
-
memory/3008-47-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/3008-62-0x0000000074B50000-0x000000007523E000-memory.dmpFilesize
6.9MB
-
memory/3008-63-0x0000000004D00000-0x0000000004D40000-memory.dmpFilesize
256KB