Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    04-06-2024 01:44

General

  • Target

    a47fb3147b531316317dd8150333f7417f6fe196f0ef8656babb070e37d9cc0d.js

  • Size

    8KB

  • MD5

    8bc951c9580b40a1b7c6222613b97da4

  • SHA1

    ffeed34cea7de42eb7b1262113ef3c753ae121c0

  • SHA256

    a47fb3147b531316317dd8150333f7417f6fe196f0ef8656babb070e37d9cc0d

  • SHA512

    5b07d8c2ed5c1a6ea604dfac05a598756e5fa2dfe3db5d3e4219e3752bad176a1b5b8f1f29c7b44513e0939e16ee4d8388c31e6fd232e262a28fbfbf04023bc8

  • SSDEEP

    48:1PueRvRbecveUMW9gdueHhUfJawYYueihb+EKpOFwSmvkuess9vGbFKpbbyh:Zz5FMYoBnmaLKpD+mZ

Score
10/10

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Async RAT payload 29 IoCs
  • Detects executables packed with ConfuserEx Mod 3 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\a47fb3147b531316317dd8150333f7417f6fe196f0ef8656babb070e37d9cc0d.js
    1⤵
    • Blocklisted process makes network request
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1656
    • C:\Users\Admin\AppData\Local\Temp\SGUDBQ.exe
      "C:\Users\Admin\AppData\Local\Temp\SGUDBQ.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2720
      • C:\Users\Admin\AppData\Local\Temp\SGUDBQ.exe
        "C:\Users\Admin\AppData\Local\Temp\SGUDBQ.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2500
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "audio" /tr '"C:\Users\Admin\AppData\Local\Temp\audio.exe"' & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1688
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /f /sc onlogon /rl highest /tn "audio" /tr '"C:\Users\Admin\AppData\Local\Temp\audio.exe"'
            5⤵
            • Creates scheduled task(s)
            PID:2644
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp37A4.tmp.bat""
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2584
          • C:\Windows\SysWOW64\timeout.exe
            timeout 3
            5⤵
            • Delays execution with timeout.exe
            PID:1444
          • C:\Users\Admin\AppData\Local\Temp\audio.exe
            "C:\Users\Admin\AppData\Local\Temp\audio.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1632
            • C:\Users\Admin\AppData\Local\Temp\audio.exe
              "C:\Users\Admin\AppData\Local\Temp\audio.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:1656

Network

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

JavaScript

1
T1059.007

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\SGUDBQ.exe
    Filesize

    696KB

    MD5

    f672108901b809c33d38bb6801c9b273

    SHA1

    b5d45949ba7d38b92c20d31cfcae6d437dea8c18

    SHA256

    90e5d1dba754723f6b34acbc974c65467495605f197857569a7ff211aeffca7f

    SHA512

    6f0cae9ca529b197fd5464c6d929437fadfc5c6c36aee5fc7fce1425d5e94cd8a90573c486c339df79ca75b532ef21d9105981eb7650c652db1abc6401c73c25

  • C:\Users\Admin\AppData\Local\Temp\tmp37A4.tmp.bat
    Filesize

    152B

    MD5

    c31b1379daea60de586a4286271712af

    SHA1

    4a6edb28fb49ae68ed2bc798c2e6d17cfbb99b4a

    SHA256

    3c2a49deb3e750c7c47633959ee419c38fc5487b2806d62a5739d204985bdb36

    SHA512

    047cdbdd03280239314af4a87e6d7f464e67124b980a808d6092e210adaad81585450779fd23cdfe5c1b7f2f2c279036a699bb4b4bdb70f333766c85a3d479a1

  • memory/1632-368-0x0000000000C40000-0x0000000000CF6000-memory.dmp
    Filesize

    728KB

  • memory/2500-77-0x0000000000930000-0x0000000000950000-memory.dmp
    Filesize

    128KB

  • memory/2500-35-0x0000000000660000-0x0000000000688000-memory.dmp
    Filesize

    160KB

  • memory/2500-27-0x0000000000400000-0x0000000000438000-memory.dmp
    Filesize

    224KB

  • memory/2500-26-0x0000000000400000-0x0000000000438000-memory.dmp
    Filesize

    224KB

  • memory/2500-25-0x0000000000400000-0x0000000000438000-memory.dmp
    Filesize

    224KB

  • memory/2500-24-0x0000000000400000-0x0000000000438000-memory.dmp
    Filesize

    224KB

  • memory/2500-73-0x0000000000930000-0x0000000000950000-memory.dmp
    Filesize

    128KB

  • memory/2500-36-0x0000000000930000-0x0000000000956000-memory.dmp
    Filesize

    152KB

  • memory/2500-34-0x0000000000400000-0x0000000000438000-memory.dmp
    Filesize

    224KB

  • memory/2500-364-0x0000000074620000-0x0000000074D0E000-memory.dmp
    Filesize

    6.9MB

  • memory/2500-31-0x0000000000400000-0x0000000000438000-memory.dmp
    Filesize

    224KB

  • memory/2500-71-0x0000000000930000-0x0000000000950000-memory.dmp
    Filesize

    128KB

  • memory/2500-38-0x0000000074620000-0x0000000074D0E000-memory.dmp
    Filesize

    6.9MB

  • memory/2500-39-0x0000000074620000-0x0000000074D0E000-memory.dmp
    Filesize

    6.9MB

  • memory/2500-40-0x0000000000930000-0x0000000000950000-memory.dmp
    Filesize

    128KB

  • memory/2500-93-0x0000000000930000-0x0000000000950000-memory.dmp
    Filesize

    128KB

  • memory/2500-91-0x0000000000930000-0x0000000000950000-memory.dmp
    Filesize

    128KB

  • memory/2500-89-0x0000000000930000-0x0000000000950000-memory.dmp
    Filesize

    128KB

  • memory/2500-87-0x0000000000930000-0x0000000000950000-memory.dmp
    Filesize

    128KB

  • memory/2500-85-0x0000000000930000-0x0000000000950000-memory.dmp
    Filesize

    128KB

  • memory/2500-75-0x0000000000930000-0x0000000000950000-memory.dmp
    Filesize

    128KB

  • memory/2500-81-0x0000000000930000-0x0000000000950000-memory.dmp
    Filesize

    128KB

  • memory/2500-79-0x0000000000930000-0x0000000000950000-memory.dmp
    Filesize

    128KB

  • memory/2500-29-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
    Filesize

    4KB

  • memory/2500-83-0x0000000000930000-0x0000000000950000-memory.dmp
    Filesize

    128KB

  • memory/2500-28-0x0000000000400000-0x0000000000438000-memory.dmp
    Filesize

    224KB

  • memory/2500-354-0x0000000074620000-0x0000000074D0E000-memory.dmp
    Filesize

    6.9MB

  • memory/2500-69-0x0000000000930000-0x0000000000950000-memory.dmp
    Filesize

    128KB

  • memory/2500-67-0x0000000000930000-0x0000000000950000-memory.dmp
    Filesize

    128KB

  • memory/2500-65-0x0000000000930000-0x0000000000950000-memory.dmp
    Filesize

    128KB

  • memory/2500-63-0x0000000000930000-0x0000000000950000-memory.dmp
    Filesize

    128KB

  • memory/2500-61-0x0000000000930000-0x0000000000950000-memory.dmp
    Filesize

    128KB

  • memory/2500-59-0x0000000000930000-0x0000000000950000-memory.dmp
    Filesize

    128KB

  • memory/2500-57-0x0000000000930000-0x0000000000950000-memory.dmp
    Filesize

    128KB

  • memory/2500-55-0x0000000000930000-0x0000000000950000-memory.dmp
    Filesize

    128KB

  • memory/2500-53-0x0000000000930000-0x0000000000950000-memory.dmp
    Filesize

    128KB

  • memory/2500-51-0x0000000000930000-0x0000000000950000-memory.dmp
    Filesize

    128KB

  • memory/2500-49-0x0000000000930000-0x0000000000950000-memory.dmp
    Filesize

    128KB

  • memory/2500-47-0x0000000000930000-0x0000000000950000-memory.dmp
    Filesize

    128KB

  • memory/2500-45-0x0000000000930000-0x0000000000950000-memory.dmp
    Filesize

    128KB

  • memory/2500-43-0x0000000000930000-0x0000000000950000-memory.dmp
    Filesize

    128KB

  • memory/2500-41-0x0000000000930000-0x0000000000950000-memory.dmp
    Filesize

    128KB

  • memory/2720-22-0x0000000000300000-0x0000000000308000-memory.dmp
    Filesize

    32KB

  • memory/2720-21-0x00000000002E0000-0x00000000002F4000-memory.dmp
    Filesize

    80KB

  • memory/2720-20-0x00000000012B0000-0x0000000001366000-memory.dmp
    Filesize

    728KB

  • memory/2720-19-0x000000007462E000-0x000000007462F000-memory.dmp
    Filesize

    4KB

  • memory/2720-37-0x0000000074620000-0x0000000074D0E000-memory.dmp
    Filesize

    6.9MB

  • memory/2720-698-0x000000007462E000-0x000000007462F000-memory.dmp
    Filesize

    4KB

  • memory/2720-699-0x0000000074620000-0x0000000074D0E000-memory.dmp
    Filesize

    6.9MB