Analysis

  • max time kernel
    146s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    17-04-2024 13:10

General

  • Target

    fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe

  • Size

    450KB

  • MD5

    ead981cd98146fabe078992943b0329d

  • SHA1

    a20ba9450187e13e3ed62e6beab4d2bec788df01

  • SHA256

    fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e

  • SHA512

    a20fc11777c75d1062c16407b0f77098e93cdfa28afae053fd8671b56afc234c4bce9243dcd516adb95183a8d4aa58dafb850bd54c996c7507b2bf51c0fcb03a

  • SSDEEP

    12288:FZcdIu1fgsDbqonwXKI9SrWLcsz8tEaay4MF3kR:FHumsct9SaLcPtaEFi

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

194.147.140.157:3361

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    msdtc.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe
    "C:\Users\Admin\AppData\Local\Temp\fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2960
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2992
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\FITGzizVFD.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2628
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FITGzizVFD" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA709.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2676
    • C:\Users\Admin\AppData\Local\Temp\fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe
      "C:\Users\Admin\AppData\Local\Temp\fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2436
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "msdtc" /tr '"C:\Users\Admin\AppData\Roaming\msdtc.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2464
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn "msdtc" /tr '"C:\Users\Admin\AppData\Roaming\msdtc.exe"'
          4⤵
          • Creates scheduled task(s)
          PID:2756
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpBE9E.tmp.bat""
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1800
        • C:\Windows\SysWOW64\timeout.exe
          timeout 3
          4⤵
          • Delays execution with timeout.exe
          PID:2820
        • C:\Users\Admin\AppData\Roaming\msdtc.exe
          "C:\Users\Admin\AppData\Roaming\msdtc.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:676
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\msdtc.exe"
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2452
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\FITGzizVFD.exe"
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1952
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FITGzizVFD" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1B00.tmp"
            5⤵
            • Creates scheduled task(s)
            PID:2180
          • C:\Users\Admin\AppData\Roaming\msdtc.exe
            "C:\Users\Admin\AppData\Roaming\msdtc.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:1752

Network

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpA709.tmp
    Filesize

    1KB

    MD5

    1932843c6cdcb3a7c01029c551e67201

    SHA1

    7b8aed4f6e9596568c06876db80ae7616303a6bd

    SHA256

    14a56d320fb17b4bd11f103e6fbe10b618491f11965e3cd3a0d8044fcc5612a3

    SHA512

    6802ea1a79b93faa7adb1d0f6e8fae1ac3859cc3cb43b938bb0c272003ff1356dbb98427b79ec665a7d1903b51d79f362886d4f74a1d2f86b4e41a7f46b89b5f

  • C:\Users\Admin\AppData\Local\Temp\tmpBE9E.tmp.bat
    Filesize

    149B

    MD5

    67ef356a2925832ec6ffa768d6ea2c78

    SHA1

    12361a2b230d80fca2b2d3332b1c5d9668922a14

    SHA256

    3ee2c307ef89808af255da0f796d516ee2fcd215cd3bc6c2f3b337b121b659c5

    SHA512

    977fc7649286292070b19bf852652a7f299c94c473a37d2fd4a5b97343cedde196a5cc44217a138fe495c025b31071b6ea4e376587ef22bff402e55ec600f8c3

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\F8NYMYDH0DTXO3GWG075.temp
    Filesize

    7KB

    MD5

    0e0d26cb62e8a545f48bd44a7d85eb81

    SHA1

    9ea42d82ece8f933c5233792873a29bfec8122a8

    SHA256

    16b0421108933ed478b761b7b2425a1cc2f708c11d774288573979b3cbdeac77

    SHA512

    fe359498e4e032d16931ee48e0b902513813e81afb7c15ea50c063452f9480130820eea2fb42b4ed6d3cbca16830c5c7e91cfda3e51c370fcdaadd45b86be319

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
    Filesize

    7KB

    MD5

    c3ef1031790b1b6ab3c88d8ea2e3a9ed

    SHA1

    f5dc679b8f33803e8afaf2a6d7d62fce1c11f117

    SHA256

    843bc60d3e304fa0aa13d29d8053ab04fe79d6448459df01a8250799733c3217

    SHA512

    c73ff2e30109c1a23b4d3334089f143b8d0b65be0110c783c913275b3f2a7f3d3720daacb56cc4df88aa71d6ef886142d81614c541cf0421697d162618c3ebc4

  • \Users\Admin\AppData\Roaming\msdtc.exe
    Filesize

    450KB

    MD5

    ead981cd98146fabe078992943b0329d

    SHA1

    a20ba9450187e13e3ed62e6beab4d2bec788df01

    SHA256

    fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e

    SHA512

    a20fc11777c75d1062c16407b0f77098e93cdfa28afae053fd8671b56afc234c4bce9243dcd516adb95183a8d4aa58dafb850bd54c996c7507b2bf51c0fcb03a

  • memory/676-60-0x0000000074DE0000-0x00000000754CE000-memory.dmp
    Filesize

    6.9MB

  • memory/676-94-0x0000000074DE0000-0x00000000754CE000-memory.dmp
    Filesize

    6.9MB

  • memory/676-59-0x0000000000CD0000-0x0000000000D24000-memory.dmp
    Filesize

    336KB

  • memory/676-58-0x0000000000440000-0x0000000000480000-memory.dmp
    Filesize

    256KB

  • memory/676-57-0x0000000074DE0000-0x00000000754CE000-memory.dmp
    Filesize

    6.9MB

  • memory/676-56-0x00000000013B0000-0x0000000001424000-memory.dmp
    Filesize

    464KB

  • memory/1752-90-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/1752-83-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
    Filesize

    4KB

  • memory/1752-93-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/1952-89-0x000000006EFD0000-0x000000006F57B000-memory.dmp
    Filesize

    5.7MB

  • memory/1952-85-0x00000000027F0000-0x0000000002830000-memory.dmp
    Filesize

    256KB

  • memory/1952-91-0x00000000027F0000-0x0000000002830000-memory.dmp
    Filesize

    256KB

  • memory/1952-95-0x000000006EFD0000-0x000000006F57B000-memory.dmp
    Filesize

    5.7MB

  • memory/2436-40-0x0000000000AA0000-0x0000000000AE0000-memory.dmp
    Filesize

    256KB

  • memory/2436-52-0x0000000074E30000-0x000000007551E000-memory.dmp
    Filesize

    6.9MB

  • memory/2436-20-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/2436-29-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/2436-22-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/2436-23-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/2436-24-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/2436-25-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
    Filesize

    4KB

  • memory/2436-37-0x0000000074E30000-0x000000007551E000-memory.dmp
    Filesize

    6.9MB

  • memory/2436-27-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/2436-32-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/2452-82-0x00000000026C0000-0x0000000002700000-memory.dmp
    Filesize

    256KB

  • memory/2452-69-0x000000006EFD0000-0x000000006F57B000-memory.dmp
    Filesize

    5.7MB

  • memory/2452-96-0x000000006EFD0000-0x000000006F57B000-memory.dmp
    Filesize

    5.7MB

  • memory/2452-80-0x00000000026C0000-0x0000000002700000-memory.dmp
    Filesize

    256KB

  • memory/2452-76-0x000000006EFD0000-0x000000006F57B000-memory.dmp
    Filesize

    5.7MB

  • memory/2452-74-0x00000000026C0000-0x0000000002700000-memory.dmp
    Filesize

    256KB

  • memory/2628-41-0x000000006FCB0000-0x000000007025B000-memory.dmp
    Filesize

    5.7MB

  • memory/2628-39-0x00000000023B0000-0x00000000023F0000-memory.dmp
    Filesize

    256KB

  • memory/2628-34-0x000000006FCB0000-0x000000007025B000-memory.dmp
    Filesize

    5.7MB

  • memory/2960-7-0x0000000074E30000-0x000000007551E000-memory.dmp
    Filesize

    6.9MB

  • memory/2960-31-0x0000000074E30000-0x000000007551E000-memory.dmp
    Filesize

    6.9MB

  • memory/2960-0-0x0000000000D00000-0x0000000000D74000-memory.dmp
    Filesize

    464KB

  • memory/2960-2-0x0000000004D10000-0x0000000004D50000-memory.dmp
    Filesize

    256KB

  • memory/2960-1-0x0000000074E30000-0x000000007551E000-memory.dmp
    Filesize

    6.9MB

  • memory/2960-3-0x0000000000320000-0x0000000000334000-memory.dmp
    Filesize

    80KB

  • memory/2960-4-0x0000000000350000-0x000000000035A000-memory.dmp
    Filesize

    40KB

  • memory/2960-21-0x0000000004D10000-0x0000000004D50000-memory.dmp
    Filesize

    256KB

  • memory/2960-6-0x0000000000CB0000-0x0000000000D04000-memory.dmp
    Filesize

    336KB

  • memory/2960-5-0x0000000000360000-0x000000000036C000-memory.dmp
    Filesize

    48KB

  • memory/2992-33-0x000000006FCB0000-0x000000007025B000-memory.dmp
    Filesize

    5.7MB

  • memory/2992-35-0x00000000023C0000-0x0000000002400000-memory.dmp
    Filesize

    256KB

  • memory/2992-38-0x00000000023C0000-0x0000000002400000-memory.dmp
    Filesize

    256KB

  • memory/2992-36-0x000000006FCB0000-0x000000007025B000-memory.dmp
    Filesize

    5.7MB

  • memory/2992-42-0x000000006FCB0000-0x000000007025B000-memory.dmp
    Filesize

    5.7MB