Malware Analysis Report

2024-08-06 17:50

Sample ID 240310-sztdkaff5w
Target Infected.exe
SHA256 29a0503e608a845fad2c2944d905d90b0aba722433976f926fee99b1f92703c7
Tags
rat test asyncrat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

29a0503e608a845fad2c2944d905d90b0aba722433976f926fee99b1f92703c7

Threat Level: Known bad

The file Infected.exe was found to be: Known bad.

Malicious Activity Summary

rat test asyncrat

AsyncRat

Async RAT payload

Asyncrat family

Async RAT payload

Executes dropped EXE

Enumerates physical storage devices

Unsigned PE

Creates scheduled task(s)

Delays execution with timeout.exe

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Uses Task Scheduler COM API

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-03-10 15:34

Signatures

Async RAT payload

rat
Description Indicator Process Target
N/A N/A N/A N/A

Asyncrat family

asyncrat

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-03-10 15:34

Reported

2024-03-10 15:39

Platform

win10-20240221-en

Max time kernel

297s

Max time network

307s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Infected.exe"

Signatures

AsyncRat

rat asyncrat

Async RAT payload

rat
Description Indicator Process Target
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\sigma.exe N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\system32\schtasks.exe N/A

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\timeout.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Infected.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\sigma.exe N/A

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\Infected.exe

"C:\Users\Admin\AppData\Local\Temp\Infected.exe"

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "sigma" /tr '"C:\Users\Admin\AppData\Roaming\sigma.exe"' & exit

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp80C9.tmp.bat""

C:\Windows\system32\timeout.exe

timeout 3

C:\Windows\system32\schtasks.exe

schtasks /create /f /sc onlogon /rl highest /tn "sigma" /tr '"C:\Users\Admin\AppData\Roaming\sigma.exe"'

C:\Users\Admin\AppData\Roaming\sigma.exe

"C:\Users\Admin\AppData\Roaming\sigma.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 fl-survivor.gl.at.ply.gg udp
US 147.185.221.17:23531 fl-survivor.gl.at.ply.gg tcp
US 8.8.8.8:53 17.221.185.147.in-addr.arpa udp
US 147.185.221.17:23531 fl-survivor.gl.at.ply.gg tcp
US 8.8.8.8:53 186.178.17.96.in-addr.arpa udp
US 147.185.221.17:23531 fl-survivor.gl.at.ply.gg tcp
US 147.185.221.17:23531 fl-survivor.gl.at.ply.gg tcp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 147.185.221.17:23531 fl-survivor.gl.at.ply.gg tcp
US 147.185.221.17:23531 fl-survivor.gl.at.ply.gg tcp
US 147.185.221.17:23531 fl-survivor.gl.at.ply.gg tcp
US 147.185.221.17:23531 fl-survivor.gl.at.ply.gg tcp
US 147.185.221.17:23531 fl-survivor.gl.at.ply.gg tcp
US 147.185.221.17:23531 fl-survivor.gl.at.ply.gg tcp
US 147.185.221.17:23531 fl-survivor.gl.at.ply.gg tcp
US 147.185.221.17:23531 fl-survivor.gl.at.ply.gg tcp
US 147.185.221.17:23531 fl-survivor.gl.at.ply.gg tcp
US 147.185.221.17:23531 fl-survivor.gl.at.ply.gg tcp
US 147.185.221.17:23531 fl-survivor.gl.at.ply.gg tcp
US 147.185.221.17:23531 fl-survivor.gl.at.ply.gg tcp
US 147.185.221.17:23531 fl-survivor.gl.at.ply.gg tcp
US 147.185.221.17:23531 fl-survivor.gl.at.ply.gg tcp
US 147.185.221.17:23531 fl-survivor.gl.at.ply.gg tcp
US 147.185.221.17:23531 fl-survivor.gl.at.ply.gg tcp
US 147.185.221.17:23531 fl-survivor.gl.at.ply.gg tcp
US 147.185.221.17:23531 fl-survivor.gl.at.ply.gg tcp
US 147.185.221.17:23531 fl-survivor.gl.at.ply.gg tcp
US 147.185.221.17:23531 fl-survivor.gl.at.ply.gg tcp

Files

memory/4124-0-0x0000000000CF0000-0x0000000000D06000-memory.dmp

memory/4124-1-0x00007FFF2D1E0000-0x00007FFF2DBCC000-memory.dmp

memory/4124-2-0x00000000013A0000-0x00000000013B0000-memory.dmp

memory/4124-3-0x00007FFF3AE90000-0x00007FFF3B06B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp80C9.tmp.bat

MD5 74d50aa1b16bf3060a26ebb9a840025c
SHA1 680178151974c36689647186e531f5a2ba765f67
SHA256 6191c63a352bbcc9af32d0b18f7d5f45b5c0fca6ef7162375bc7493e18868327
SHA512 16f279a11eea66a4c0ec50c75c20415e4e798ba6934f45b91005c1ed9b1844a5f3c43099f27803feb2bd9f11de89b8c4f6a65d5498802d3e96b222c237d2d3f9

memory/4124-9-0x00007FFF2D1E0000-0x00007FFF2DBCC000-memory.dmp

memory/4124-10-0x00007FFF3AE90000-0x00007FFF3B06B000-memory.dmp

C:\Users\Admin\AppData\Roaming\sigma.exe

MD5 443b908a688cd9711ab170c7e1bdcd2d
SHA1 96e01bad85aa895efed414816c7c4dc8245f6b6a
SHA256 29a0503e608a845fad2c2944d905d90b0aba722433976f926fee99b1f92703c7
SHA512 4b9a47a1fbeda77f7d3b53f7cc6e88ab02789ae52e5b07dd5eb10657c1509a02ceae2ee587422b7c36a03bd8a90f7e4067fba4a21604b40b38994c1ded48e12a

memory/1204-14-0x00007FFF2D1E0000-0x00007FFF2DBCC000-memory.dmp

memory/1204-15-0x0000000002680000-0x0000000002690000-memory.dmp

memory/1204-16-0x00007FFF3AE90000-0x00007FFF3B06B000-memory.dmp

memory/1204-17-0x00007FFF2D1E0000-0x00007FFF2DBCC000-memory.dmp

memory/1204-18-0x0000000002680000-0x0000000002690000-memory.dmp

memory/1204-19-0x00007FFF3AE90000-0x00007FFF3B06B000-memory.dmp

memory/1204-22-0x000000001C4E0000-0x000000001C556000-memory.dmp

memory/1204-23-0x000000001BD60000-0x000000001BD94000-memory.dmp

memory/1204-24-0x000000001BD90000-0x000000001BDAE000-memory.dmp

memory/1204-25-0x000000001B0B0000-0x000000001B0E2000-memory.dmp

memory/1204-26-0x0000000002680000-0x0000000002690000-memory.dmp

memory/1204-27-0x0000000002680000-0x0000000002690000-memory.dmp

memory/1204-28-0x0000000002680000-0x0000000002690000-memory.dmp

memory/1204-29-0x0000000002680000-0x0000000002690000-memory.dmp