Analysis Overview
SHA256
0a85d4af371a4f35c280ae54abf97ea70fce6406bc5b2ed199d95700075e577c
Threat Level: Known bad
The file sheet rat v2.6 (extract.me).zip was found to be: Known bad.
Malicious Activity Summary
Asyncrat family
XMRig Miner payload
Xmrig family
Contains code to disable Windows Defender
Async RAT payload
Loads dropped DLL
Unsigned PE
Detects Pyinstaller
Suspicious use of FindShellTrayWindow
Suspicious behavior: EnumeratesProcesses
Suspicious use of SendNotifyMessage
Checks SCSI registry key(s)
Modifies registry class
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-06-04 18:41
Signatures
Async RAT payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Asyncrat family
Contains code to disable Windows Defender
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
XMRig Miner payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Xmrig family
Detects Pyinstaller
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-04 18:40
Reported
2024-06-04 18:49
Platform
win10v2004-20240426-en
Max time kernel
299s
Max time network
204s
Command Line
Signatures
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\sheet rat v2.6\Server.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\sheet rat v2.6\Server.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\sheet rat v2.6\Server.exe | N/A |
Checks SCSI registry key(s)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 | C:\Windows\system32\taskmgr.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A | C:\Windows\system32\taskmgr.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName | C:\Windows\system32\taskmgr.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000_Classes\Local Settings | C:\Windows\system32\taskmgr.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\sheet rat v2.6\Server.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\system32\taskmgr.exe | N/A |
| Token: SeSystemProfilePrivilege | N/A | C:\Windows\system32\taskmgr.exe | N/A |
| Token: SeCreateGlobalPrivilege | N/A | C:\Windows\system32\taskmgr.exe | N/A |
| Token: SeBackupPrivilege | N/A | C:\Windows\system32\svchost.exe | N/A |
| Token: SeRestorePrivilege | N/A | C:\Windows\system32\svchost.exe | N/A |
| Token: SeSecurityPrivilege | N/A | C:\Windows\system32\svchost.exe | N/A |
| Token: SeTakeOwnershipPrivilege | N/A | C:\Windows\system32\svchost.exe | N/A |
| Token: 35 | N/A | C:\Windows\system32\svchost.exe | N/A |
| Token: 33 | N/A | C:\Windows\system32\taskmgr.exe | N/A |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Windows\system32\taskmgr.exe | N/A |
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Processes
C:\Users\Admin\AppData\Local\Temp\sheet rat v2.6\Server.exe
"C:\Users\Admin\AppData\Local\Temp\sheet rat v2.6\Server.exe"
C:\Windows\system32\taskmgr.exe
"C:\Windows\system32\taskmgr.exe" /7
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
C:\Windows\system32\svchost.exe
C:\Windows\system32\svchost.exe -k SDRSVC
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 133.211.185.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 14.160.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | maps.googleapis.com | udp |
| GB | 172.217.169.74:443 | maps.googleapis.com | tcp |
| US | 8.8.8.8:53 | 74.169.217.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.165.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 29.243.111.52.in-addr.arpa | udp |
Files
memory/1524-0-0x00000000750FE000-0x00000000750FF000-memory.dmp
memory/1524-1-0x00000000004C0000-0x0000000000608000-memory.dmp
memory/1524-2-0x00000000055A0000-0x0000000005B44000-memory.dmp
memory/1524-3-0x0000000004FF0000-0x000000000504C000-memory.dmp
memory/1524-4-0x0000000005430000-0x00000000054C2000-memory.dmp
memory/1524-5-0x0000000005F80000-0x00000000061D2000-memory.dmp
memory/1524-6-0x0000000005410000-0x000000000541A000-memory.dmp
memory/1524-7-0x00000000750F0000-0x00000000758A0000-memory.dmp
memory/1524-8-0x0000000008170000-0x000000000821A000-memory.dmp
memory/1524-9-0x00000000750F0000-0x00000000758A0000-memory.dmp
memory/1524-10-0x0000000008E70000-0x0000000008E9C000-memory.dmp
memory/1524-11-0x0000000009190000-0x0000000009472000-memory.dmp
memory/1524-12-0x0000000009760000-0x0000000009AB4000-memory.dmp
memory/1524-13-0x0000000008F00000-0x0000000008F22000-memory.dmp
C:\Users\Admin\AppData\Local\GMap.NET\DllCache\SQLite_v98_NET4_x86\System.Data.SQLite.DLL
| MD5 | 14393eb908e072fa3164597414bb0a75 |
| SHA1 | 5e04e084ec44a0b29196d0c21213201240f11ba0 |
| SHA256 | 59b9d95ae42e35525fc63f93168fe304409463ee070a3cf21a427a2833564b80 |
| SHA512 | f5fc3d9e98cca1fbbbe026707086a71f801016348d2355541d630879ad51a850f49eb4a5f7a94e12a844d7a7108d69fa6d762ee19f4805d6aafef16259b4330b |
memory/1524-18-0x0000000008F40000-0x000000000908B000-memory.dmp
memory/1524-30-0x00000000090A0000-0x00000000090EC000-memory.dmp
memory/1524-31-0x00000000750F0000-0x00000000758A0000-memory.dmp
C:\Users\Admin\AppData\Local\Server\Server.exe_Url_021lj33rcddyjphptsucz0cmlfgti4gg\1.0.0.0\user.config
| MD5 | a35bc67d130a4fb76c2c2831cbdddd55 |
| SHA1 | 66502423bba03870522e50608212b6ee27ebf4c5 |
| SHA256 | e94a97e512fbc8ed9f5691d921fdeddbff4cc16b024c5335adf66bff3a7a8192 |
| SHA512 | 4401b234d7914afa860e356be1667cc5f44402255f7cc6cc3d8df80883167f6b55463e62156df57be697ee501897fac61a71f97911c6fdb6630272341ac8a07e |
C:\Users\Admin\AppData\Local\Server\Server.exe_Url_021lj33rcddyjphptsucz0cmlfgti4gg\1.0.0.0\user.config
| MD5 | cfcf8e91857f364e002065c52ff8f91c |
| SHA1 | 8407ecb3c33a1f3fcf18a723e6884acf7e5a0f4a |
| SHA256 | 572dda8c7f211dc6a4efc7aecb4a54cb4e0ced1e4c9a4b9f96bb329c983c64e6 |
| SHA512 | 364fecac3a051441b4fefcebb2cc9e38632f99dd04593cd5d9b148986afb09b195e88cdbfa2e778b8934564b76d04fe053f919f0a60769b023f2f753ede06d1e |
C:\Users\Admin\AppData\Local\Server\Server.exe_Url_021lj33rcddyjphptsucz0cmlfgti4gg\1.0.0.0\lt0pgh22.newcfg
| MD5 | 2e8ab7cdc2081c09a98f6c5593909409 |
| SHA1 | 282769c943f8ab0429315869466d042a99de95f4 |
| SHA256 | 17eee8708a1bbc35422e6ad9b6eff3bec4f8a8b8a87cce8e6cc0da2d94c9b3ae |
| SHA512 | b815e0deaea5348d5ec68cdba3e4b5018e6224299f170859181f90961831b7d14deda144b32d64b11f8da7f4cbdb0b86a8d253b0ee179df68baac274a363ef2a |
C:\Users\Admin\AppData\Local\Server\Server.exe_Url_021lj33rcddyjphptsucz0cmlfgti4gg\1.0.0.0\user.config
| MD5 | b18785caae8834f89e34cde89b93cafc |
| SHA1 | cee194149b484295ddba88111a251986bdc0c7af |
| SHA256 | 105971bbe15f24f50dad97d466b55222e52dfdb4a71b1b3a6452cfba28a10811 |
| SHA512 | fb108e2997a0ea7bce21113118997f358d73a43a40e2b4b9962738cd88dc6d9dfc17e17e63c8ba8c5a5504e5775fbe9e8084ee8e6086cf0eab709335ed8b282c |
memory/1524-69-0x00000000096C0000-0x00000000096FC000-memory.dmp
memory/1524-70-0x0000000009680000-0x00000000096A1000-memory.dmp
memory/1524-80-0x000000000E9A0000-0x000000000EA52000-memory.dmp
memory/1524-81-0x00000000750FE000-0x00000000750FF000-memory.dmp
memory/1524-82-0x00000000750F0000-0x00000000758A0000-memory.dmp
memory/1524-83-0x00000000750F0000-0x00000000758A0000-memory.dmp
memory/1524-84-0x00000000750F0000-0x00000000758A0000-memory.dmp
memory/1524-85-0x00000000750F0000-0x00000000758A0000-memory.dmp
memory/1524-86-0x00000000750F0000-0x00000000758A0000-memory.dmp
memory/5104-89-0x00000180EAA90000-0x00000180EAA91000-memory.dmp
memory/5104-87-0x00000180EAA90000-0x00000180EAA91000-memory.dmp
memory/5104-88-0x00000180EAA90000-0x00000180EAA91000-memory.dmp
memory/5104-99-0x00000180EAA90000-0x00000180EAA91000-memory.dmp
memory/5104-98-0x00000180EAA90000-0x00000180EAA91000-memory.dmp
memory/5104-97-0x00000180EAA90000-0x00000180EAA91000-memory.dmp
memory/5104-96-0x00000180EAA90000-0x00000180EAA91000-memory.dmp
memory/5104-95-0x00000180EAA90000-0x00000180EAA91000-memory.dmp
memory/5104-94-0x00000180EAA90000-0x00000180EAA91000-memory.dmp
memory/5104-93-0x00000180EAA90000-0x00000180EAA91000-memory.dmp
memory/1524-101-0x000000000AF50000-0x000000000B072000-memory.dmp