Malware Analysis Report

2024-08-06 12:58

Sample ID 240605-x451dagc77
Target Procesp_Fiscal_Interpuesto_N#45678909876.tar
SHA256 762025b999c0d790df34899084a561d34346b0cfe898c6ddf55a32c9bb483473
Tags
asyncrat 05junio persistence rat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

762025b999c0d790df34899084a561d34346b0cfe898c6ddf55a32c9bb483473

Threat Level: Known bad

The file Procesp_Fiscal_Interpuesto_N#45678909876.tar was found to be: Known bad.

Malicious Activity Summary

asyncrat 05junio persistence rat

AsyncRat

Adds Run key to start application

Suspicious use of SetThreadContext

Unsigned PE

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-05 19:25

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-05 19:25

Reported

2024-06-05 19:43

Platform

win7-20240221-es

Max time kernel

117s

Max time network

126s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Procesp_Fiscal_Interpuesto_N#45678909876..exe"

Signatures

AsyncRat

rat asyncrat

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\Musara = "C:\\Users\\Admin\\Documents\\Uooitu\\googins.exe" C:\Users\Admin\AppData\Local\Temp\Procesp_Fiscal_Interpuesto_N#45678909876..exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2424 set thread context of 2676 N/A C:\Users\Admin\AppData\Local\Temp\Procesp_Fiscal_Interpuesto_N#45678909876..exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe

Processes

C:\Users\Admin\AppData\Local\Temp\Procesp_Fiscal_Interpuesto_N#45678909876..exe

"C:\Users\Admin\AppData\Local\Temp\Procesp_Fiscal_Interpuesto_N#45678909876..exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"

Network

N/A

Files

memory/2424-1-0x0000000000419000-0x0000000000432000-memory.dmp

memory/2424-0-0x0000000000400000-0x0000000000ABF000-memory.dmp

memory/2424-2-0x0000000000400000-0x0000000000ABF000-memory.dmp

memory/2424-3-0x0000000000400000-0x0000000000ABF000-memory.dmp

memory/2424-5-0x0000000000130000-0x000000000013A000-memory.dmp

memory/2424-4-0x0000000000130000-0x000000000013A000-memory.dmp

memory/2424-7-0x0000000000400000-0x0000000000ABF000-memory.dmp

memory/2424-12-0x0000000000400000-0x0000000000ABF000-memory.dmp

memory/2676-11-0x0000000000080000-0x0000000000092000-memory.dmp

memory/2676-8-0x0000000000080000-0x0000000000092000-memory.dmp

memory/2676-9-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-05 19:25

Reported

2024-06-05 19:44

Platform

win10v2004-20240508-es

Max time kernel

145s

Max time network

124s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Procesp_Fiscal_Interpuesto_N#45678909876..exe"

Signatures

AsyncRat

rat asyncrat

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Musara = "C:\\Users\\Admin\\Documents\\Uooitu\\googins.exe" C:\Users\Admin\AppData\Local\Temp\Procesp_Fiscal_Interpuesto_N#45678909876..exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1260 set thread context of 2672 N/A C:\Users\Admin\AppData\Local\Temp\Procesp_Fiscal_Interpuesto_N#45678909876..exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe

Processes

C:\Users\Admin\AppData\Local\Temp\Procesp_Fiscal_Interpuesto_N#45678909876..exe

"C:\Users\Admin\AppData\Local\Temp\Procesp_Fiscal_Interpuesto_N#45678909876..exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 2.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 0.205.248.87.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp

Files

memory/1260-1-0x0000000000419000-0x0000000000432000-memory.dmp

memory/1260-0-0x0000000000400000-0x0000000000ABF000-memory.dmp

memory/1260-2-0x0000000000400000-0x0000000000ABF000-memory.dmp

memory/1260-4-0x0000000000400000-0x0000000000ABF000-memory.dmp

memory/1260-6-0x0000000000400000-0x0000000000ABF000-memory.dmp

memory/2672-5-0x0000000000FE0000-0x0000000000FF2000-memory.dmp