Analysis
-
max time kernel
117s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 07:41
Static task
static1
Behavioral task
behavioral1
Sample
MartDrum.exe
Resource
win7-20240221-en
General
-
Target
MartDrum.exe
-
Size
904KB
-
MD5
1e4352c43b8c5a6b5a10dd0ace9a57a4
-
SHA1
6d4f220bdfee34df0b3b9d8a829dd423fab5abdf
-
SHA256
9410861cbe8204310017cdec72056d49f8effbe26961cc6cb73fee37c731e0a0
-
SHA512
ac96916f4c42acbf8be07d814dbc15e04c50e3874888ebdb3d762f74fcac58e4e100da68a34d78da12403ee09f3bf59c681bf3fa258de8e39e1038b5fc42e7a9
-
SSDEEP
12288:Fy3S2m4omcLCRdCPiofcsdS3c2qRWi2kx6RAaiPjMoxIlDhI4HPlRoQ9RT9tQ6DP:FyhM1LAdCKo0s6xrkxJxjDIldBHdRvfb
Malware Config
Extracted
asyncrat
| Edit 3LOSH RAT
Load_Man
leetman.dynuddns.com:1337
AsyncMutex_6SI8asdasd2casOkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
Processes:
Fighting.pifdescription pid process target process PID 2640 created 1392 2640 Fighting.pif Explorer.EXE PID 2640 created 1392 2640 Fighting.pif Explorer.EXE -
Drops startup file 2 IoCs
Processes:
cmd.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PoseidonSense.url cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PoseidonSense.url cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
Fighting.pifjsc.exepid process 2640 Fighting.pif 1912 jsc.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exeFighting.pifpid process 2880 cmd.exe 2640 Fighting.pif -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates processes with tasklist 1 TTPs 2 IoCs
Processes:
tasklist.exetasklist.exepid process 1036 tasklist.exe 2508 tasklist.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
Fighting.pifjsc.exepid process 2640 Fighting.pif 2640 Fighting.pif 2640 Fighting.pif 2640 Fighting.pif 2640 Fighting.pif 2640 Fighting.pif 2640 Fighting.pif 2640 Fighting.pif 2640 Fighting.pif 2640 Fighting.pif 2640 Fighting.pif 1912 jsc.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
tasklist.exetasklist.exejsc.exedescription pid process Token: SeDebugPrivilege 1036 tasklist.exe Token: SeDebugPrivilege 2508 tasklist.exe Token: SeDebugPrivilege 1912 jsc.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
Fighting.pifpid process 2640 Fighting.pif 2640 Fighting.pif 2640 Fighting.pif -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
Fighting.pifpid process 2640 Fighting.pif 2640 Fighting.pif 2640 Fighting.pif -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
jsc.exepid process 1912 jsc.exe -
Suspicious use of WriteProcessMemory 54 IoCs
Processes:
MartDrum.execmd.execmd.exeFighting.pifdescription pid process target process PID 612 wrote to memory of 2860 612 MartDrum.exe cmd.exe PID 612 wrote to memory of 2860 612 MartDrum.exe cmd.exe PID 612 wrote to memory of 2860 612 MartDrum.exe cmd.exe PID 612 wrote to memory of 2860 612 MartDrum.exe cmd.exe PID 2860 wrote to memory of 2880 2860 cmd.exe cmd.exe PID 2860 wrote to memory of 2880 2860 cmd.exe cmd.exe PID 2860 wrote to memory of 2880 2860 cmd.exe cmd.exe PID 2860 wrote to memory of 2880 2860 cmd.exe cmd.exe PID 2880 wrote to memory of 1036 2880 cmd.exe tasklist.exe PID 2880 wrote to memory of 1036 2880 cmd.exe tasklist.exe PID 2880 wrote to memory of 1036 2880 cmd.exe tasklist.exe PID 2880 wrote to memory of 1036 2880 cmd.exe tasklist.exe PID 2880 wrote to memory of 2516 2880 cmd.exe findstr.exe PID 2880 wrote to memory of 2516 2880 cmd.exe findstr.exe PID 2880 wrote to memory of 2516 2880 cmd.exe findstr.exe PID 2880 wrote to memory of 2516 2880 cmd.exe findstr.exe PID 2880 wrote to memory of 2508 2880 cmd.exe tasklist.exe PID 2880 wrote to memory of 2508 2880 cmd.exe tasklist.exe PID 2880 wrote to memory of 2508 2880 cmd.exe tasklist.exe PID 2880 wrote to memory of 2508 2880 cmd.exe tasklist.exe PID 2880 wrote to memory of 1892 2880 cmd.exe findstr.exe PID 2880 wrote to memory of 1892 2880 cmd.exe findstr.exe PID 2880 wrote to memory of 1892 2880 cmd.exe findstr.exe PID 2880 wrote to memory of 1892 2880 cmd.exe findstr.exe PID 2880 wrote to memory of 2412 2880 cmd.exe cmd.exe PID 2880 wrote to memory of 2412 2880 cmd.exe cmd.exe PID 2880 wrote to memory of 2412 2880 cmd.exe cmd.exe PID 2880 wrote to memory of 2412 2880 cmd.exe cmd.exe PID 2880 wrote to memory of 2624 2880 cmd.exe cmd.exe PID 2880 wrote to memory of 2624 2880 cmd.exe cmd.exe PID 2880 wrote to memory of 2624 2880 cmd.exe cmd.exe PID 2880 wrote to memory of 2624 2880 cmd.exe cmd.exe PID 2880 wrote to memory of 2400 2880 cmd.exe cmd.exe PID 2880 wrote to memory of 2400 2880 cmd.exe cmd.exe PID 2880 wrote to memory of 2400 2880 cmd.exe cmd.exe PID 2880 wrote to memory of 2400 2880 cmd.exe cmd.exe PID 2880 wrote to memory of 2640 2880 cmd.exe Fighting.pif PID 2880 wrote to memory of 2640 2880 cmd.exe Fighting.pif PID 2880 wrote to memory of 2640 2880 cmd.exe Fighting.pif PID 2880 wrote to memory of 2640 2880 cmd.exe Fighting.pif PID 2880 wrote to memory of 1736 2880 cmd.exe PING.EXE PID 2880 wrote to memory of 1736 2880 cmd.exe PING.EXE PID 2880 wrote to memory of 1736 2880 cmd.exe PING.EXE PID 2880 wrote to memory of 1736 2880 cmd.exe PING.EXE PID 2640 wrote to memory of 2388 2640 Fighting.pif cmd.exe PID 2640 wrote to memory of 2388 2640 Fighting.pif cmd.exe PID 2640 wrote to memory of 2388 2640 Fighting.pif cmd.exe PID 2640 wrote to memory of 2388 2640 Fighting.pif cmd.exe PID 2640 wrote to memory of 1912 2640 Fighting.pif jsc.exe PID 2640 wrote to memory of 1912 2640 Fighting.pif jsc.exe PID 2640 wrote to memory of 1912 2640 Fighting.pif jsc.exe PID 2640 wrote to memory of 1912 2640 Fighting.pif jsc.exe PID 2640 wrote to memory of 1912 2640 Fighting.pif jsc.exe PID 2640 wrote to memory of 1912 2640 Fighting.pif jsc.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\MartDrum.exe"C:\Users\Admin\AppData\Local\Temp\MartDrum.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k cmd < Tunisia & exit3⤵
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\cmd.execmd4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1036
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"5⤵PID:2516
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe"5⤵PID:1892
-
-
C:\Windows\SysWOW64\cmd.execmd /c mkdir 207155⤵PID:2412
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Cock + Enhance + Forest + Grocery + Mall 20715\Fighting.pif5⤵PID:2624
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Amd + Backed 20715\Q5⤵PID:2400
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\20715\Fighting.pif20715\Fighting.pif 20715\Q5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2640
-
-
C:\Windows\SysWOW64\PING.EXEping -n 5 localhost5⤵
- Runs ping.exe
PID:1736
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PoseidonSense.url" & echo URL="C:\Users\Admin\AppData\Local\GreenTech Innovations\PoseidonSense.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PoseidonSense.url" & exit2⤵
- Drops startup file
PID:2388
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\20715\jsc.exeC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\20715\jsc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
523KB
MD5c6d3af61f6a8b9e9cc3c0997243cbc8d
SHA1e99aa1b98ab1baeeb82365fd6f76e99d0417f67b
SHA2564e6c63fe5b8faa26ddc90f7183bac516ff42d7148d7ba8cdcfd816b37ea340e2
SHA51208f9b3b6925c7da20bdd870d6c3de1ac4df680f43b8bf19e4a03d5a240b435d396918ea206a54668952a41fc25466606f18ab2972f4c4ca17083b13680933138
-
Filesize
461KB
MD53bfbfcf6dde8162276981a6c818526fc
SHA12359fc484c7ff2e40d2b0e5a58abafc39a2f534f
SHA25648a39ed8fcac7eea85635bff545ea72b9bb741a33affc3cfdc1d9513ad466d9b
SHA51268962d58896c6971a1c6411121a1c9723b511096828576c7b3333d4eec7d248bb11585964811219f436e599c52d4c13fa992e2fc369c82f1eb7c8f628a0e0adf
-
Filesize
62KB
MD5bc332c8625f154764139eebc5543d265
SHA12114287c7d17b25b6cb18250dca0ad1d3be1badf
SHA2564052bb73dc0b19224a815c89ba44728868ff3d7ccd4ba888c5a3deeeea1ba75c
SHA512367f4ad92cd1aee6d76aed2d1cb670c3a059bc826eae30632f8db5754ce32677248d705bb3cd61dfb1db56c781b73bf0f7728c345d808c9a839a7360fabc64d6
-
Filesize
245KB
MD53250d6f3cef2fa42d8144d7300c94a9a
SHA1fb41f4b16da0c326d4f994fd69a95148740db16c
SHA2564b4fa7e6aa4e413577040eed27ab1b8295e0f019ca4007dedf5d131bacb8c86a
SHA512b19361ae089fe0fff1e0f6ef995ed9fdb76c08df329ee95cf6845a61362027e18378bf4951a67e55c7da13a3f184d3b613a91ac0d7f613163523a4ea1da63c21
-
Filesize
129KB
MD52eaf3dde860d1fa5cb576a067d88e0c9
SHA1f731f073975e880445e63ab7130b9d6b35e030e4
SHA2569d0a82b1d0302bd357ada65073f63b79bcffacfd687941fb66b879e51dbc7e6f
SHA512cc230393bc0b8256b5132882eaa53c8e749b74b5bcf4aec2f3cb6c6f417433da24ac54744d825dff14993cd0ccc17c4d76e128b3e76597809e11aaebfb795df0
-
Filesize
215KB
MD5cbd44c7f5d1ffca6b785ac5610c584a2
SHA10d3c42631251b1256c61f2b499ff2dcee141955a
SHA256b691b133ac132727cc615e39d09e7db00e179ffcfe4b7939de169042ce3b8a5c
SHA512246d9d66564d10e80958d1a6796e4d8ee28549f9d8b0a161ee929d7b9d3a740a0befcd81efc8d20092ff2fb802c50e9581a7e290988550931a5341c1a1545c67
-
Filesize
154KB
MD57a10d8c21d509285032ccc39be8ca70a
SHA1c94f9e1239f669a720f05712a536d443dcfb87d6
SHA2567a4f7c61b90f5e0c6467eef51446cbccaf8e410117f4ec2dad6b400cdc3be9ee
SHA512eda1f6a3b085801c3f55a622612bb1a9260477c435fa68ab8c9e6b77316dabac2a17d574422990282ac699eac9275b92d5051fee902fefe243ff22e8a0e42c55
-
Filesize
181KB
MD5cc937c80427292e3f084280877637c6c
SHA1e5e958447df0e571f194848d9c570ea9568f9665
SHA25664402cf5b891e266e8736340b70202796110ff53a0bc63034434b8feef1c3eb4
SHA5128b70a42aaa091f0ce1694052504e53f8db4d02a7290c251b33373dfab4a8fa334e05226755ec7bd96594f9ace60e3625e8481a2dc34c9e410b11b55958691a93
-
Filesize
12KB
MD589d7b6fab91c718d1eb98295746b0e0e
SHA112933edc9d0d0812f7eb6240468a5ba03d92ceb4
SHA256f593d273036a2db89a963774319942d27d7de6718033988297b5220e4566037b
SHA51241d036fa81ebf2680c24bc240e40b62a5008b1a5daaac714e3bd86bc4784e54719c4cbd0377aa984e08db0fbab8e1db84b86b7f257df3b50d505645f42b70046
-
Filesize
924KB
MD5848164d084384c49937f99d5b894253e
SHA13055ef803eeec4f175ebf120f94125717ee12444
SHA256f58d3a4b2f3f7f10815c24586fae91964eeed830369e7e0701b43895b0cefbd3
SHA512aabe1cf076f48f32542f49a92e4ca9f054b31d5a9949119991b897b9489fe775d8009896408ba49ac43ec431c87c0d385daead9dbbde7ef6309b0c97bbaf852a
-
Filesize
45KB
MD5f1feead2143c07ca411d82a29fa964af
SHA12198e7bf402773757bb2a25311ffd2644e5a1645
SHA2568f2800ac8af72e8038e146b3988a30651952f20ed6cdf7be3ae4709fbb026af1
SHA512e7e2266ec862a793da7cea01c926b7a874453cf2efb0b4b77776c26042dc2ded74f17c390fad97bd2d8c0c4971a1b9d9e6c705a13edbc9e48570922e5e6cc9df