Malware Analysis Report

2024-08-06 13:16

Sample ID 240615-whn93azard
Target temps.exe
SHA256 9fe019bc58d7696c3658ebe88f4a7d2cee682236872353ffe4bd92fd86c18be9
Tags
asyncrat default rat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

9fe019bc58d7696c3658ebe88f4a7d2cee682236872353ffe4bd92fd86c18be9

Threat Level: Known bad

The file temps.exe was found to be: Known bad.

Malicious Activity Summary

asyncrat default rat

Async RAT payload

Asyncrat family

AsyncRat

Async RAT payload

Executes dropped EXE

Checks computer location settings

Legitimate hosting services abused for malware hosting/C2

Unsigned PE

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Uses Task Scheduler COM API

Suspicious use of AdjustPrivilegeToken

Creates scheduled task(s)

Suspicious behavior: EnumeratesProcesses

Delays execution with timeout.exe

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-15 17:55

Signatures

Async RAT payload

rat
Description Indicator Process Target
N/A N/A N/A N/A

Asyncrat family

asyncrat

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-15 17:55

Reported

2024-06-15 17:58

Platform

win7-20240508-en

Max time kernel

143s

Max time network

148s

Command Line

"C:\Users\Admin\AppData\Local\Temp\temps.exe"

Signatures

AsyncRat

rat asyncrat

Async RAT payload

rat
Description Indicator Process Target
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\ALSO.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A 0.tcp.eu.ngrok.io N/A N/A
N/A 0.tcp.eu.ngrok.io N/A N/A
N/A 0.tcp.eu.ngrok.io N/A N/A
N/A 0.tcp.eu.ngrok.io N/A N/A
N/A 0.tcp.eu.ngrok.io N/A N/A
N/A 0.tcp.eu.ngrok.io N/A N/A
N/A 0.tcp.eu.ngrok.io N/A N/A
N/A 0.tcp.eu.ngrok.io N/A N/A
N/A 0.tcp.eu.ngrok.io N/A N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\system32\schtasks.exe N/A

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\timeout.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\temps.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\temps.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\temps.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\temps.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\ALSO.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\ALSO.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2128 wrote to memory of 2108 N/A C:\Users\Admin\AppData\Local\Temp\temps.exe C:\Windows\System32\cmd.exe
PID 2128 wrote to memory of 2108 N/A C:\Users\Admin\AppData\Local\Temp\temps.exe C:\Windows\System32\cmd.exe
PID 2128 wrote to memory of 2108 N/A C:\Users\Admin\AppData\Local\Temp\temps.exe C:\Windows\System32\cmd.exe
PID 2128 wrote to memory of 1460 N/A C:\Users\Admin\AppData\Local\Temp\temps.exe C:\Windows\system32\cmd.exe
PID 2128 wrote to memory of 1460 N/A C:\Users\Admin\AppData\Local\Temp\temps.exe C:\Windows\system32\cmd.exe
PID 2128 wrote to memory of 1460 N/A C:\Users\Admin\AppData\Local\Temp\temps.exe C:\Windows\system32\cmd.exe
PID 2108 wrote to memory of 2072 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\schtasks.exe
PID 2108 wrote to memory of 2072 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\schtasks.exe
PID 2108 wrote to memory of 2072 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\schtasks.exe
PID 1460 wrote to memory of 2252 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\timeout.exe
PID 1460 wrote to memory of 2252 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\timeout.exe
PID 1460 wrote to memory of 2252 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\timeout.exe
PID 1460 wrote to memory of 2624 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\ALSO.exe
PID 1460 wrote to memory of 2624 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\ALSO.exe
PID 1460 wrote to memory of 2624 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\ALSO.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\temps.exe

"C:\Users\Admin\AppData\Local\Temp\temps.exe"

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "ALSO" /tr '"C:\Users\Admin\AppData\Local\Temp\ALSO.exe"' & exit

C:\Windows\system32\cmd.exe

cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp2194.tmp.bat""

C:\Windows\system32\schtasks.exe

schtasks /create /f /sc onlogon /rl highest /tn "ALSO" /tr '"C:\Users\Admin\AppData\Local\Temp\ALSO.exe"'

C:\Windows\system32\timeout.exe

timeout 3

C:\Users\Admin\AppData\Local\Temp\ALSO.exe

"C:\Users\Admin\AppData\Local\Temp\ALSO.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 0.tcp.eu.ngrok.io udp
US 8.8.8.8:53 0.tcp.eu.ngrok.io udp
US 8.8.8.8:53 0.tcp.eu.ngrok.io udp
US 8.8.8.8:53 0.tcp.eu.ngrok.io udp
US 8.8.8.8:53 0.tcp.eu.ngrok.io udp
US 8.8.8.8:53 0.tcp.eu.ngrok.io udp
US 8.8.8.8:53 0.tcp.eu.ngrok.io udp
US 8.8.8.8:53 0.tcp.eu.ngrok.io udp
US 8.8.8.8:53 0.tcp.eu.ngrok.io udp

Files

memory/2128-0-0x000007FEF5F83000-0x000007FEF5F84000-memory.dmp

memory/2128-1-0x0000000000910000-0x0000000000926000-memory.dmp

memory/2128-2-0x000007FEF5F80000-0x000007FEF696C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp2194.tmp.bat

MD5 c455779b3635a08b4b951c0699684e9a
SHA1 2fc585e1ff5c45307556d32da96d938bbe0dbde5
SHA256 660995d0f53e835a3c5a2b85521cb5745a11344d6f4056422eae740b1552eb05
SHA512 d69a04edb0dbe0fad7bd57738eaa904a515753e0eabdf736aa76d629e3e83cc68651d3c9393d49d45202f436602f4399b8b8768a98e64e7dc35c5c19b46182bd

memory/2128-3-0x000007FEF5F80000-0x000007FEF696C000-memory.dmp

memory/2128-13-0x000007FEF5F80000-0x000007FEF696C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\ALSO.exe

MD5 bf056ef6ab656719cc5b1a0efaac990b
SHA1 14e0ed9edeb65a47aa1a14bd94a6c72293b1c787
SHA256 9fe019bc58d7696c3658ebe88f4a7d2cee682236872353ffe4bd92fd86c18be9
SHA512 a23d0e24e287a232ebfc0bd35b4922693743dc8b6885a159bdf71d972cc3e3a104ba2dcf5487acba5175902946a332940c48e37b31bb76f245b090a7444e0929

memory/2624-17-0x0000000000A50000-0x0000000000A66000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-15 17:55

Reported

2024-06-15 17:58

Platform

win10v2004-20240508-en

Max time kernel

147s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\temps.exe"

Signatures

AsyncRat

rat asyncrat

Async RAT payload

rat
Description Indicator Process Target
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\temps.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\ALSO.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A 0.tcp.eu.ngrok.io N/A N/A
N/A 0.tcp.eu.ngrok.io N/A N/A
N/A 0.tcp.eu.ngrok.io N/A N/A
N/A 0.tcp.eu.ngrok.io N/A N/A
N/A 0.tcp.eu.ngrok.io N/A N/A
N/A 0.tcp.eu.ngrok.io N/A N/A
N/A 0.tcp.eu.ngrok.io N/A N/A
N/A 0.tcp.eu.ngrok.io N/A N/A
N/A 0.tcp.eu.ngrok.io N/A N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\system32\schtasks.exe N/A

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\timeout.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\temps.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\temps.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\ALSO.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\ALSO.exe N/A

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\temps.exe

"C:\Users\Admin\AppData\Local\Temp\temps.exe"

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "ALSO" /tr '"C:\Users\Admin\AppData\Local\Temp\ALSO.exe"' & exit

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp4FA6.tmp.bat""

C:\Windows\system32\schtasks.exe

schtasks /create /f /sc onlogon /rl highest /tn "ALSO" /tr '"C:\Users\Admin\AppData\Local\Temp\ALSO.exe"'

C:\Windows\system32\timeout.exe

timeout 3

C:\Users\Admin\AppData\Local\Temp\ALSO.exe

"C:\Users\Admin\AppData\Local\Temp\ALSO.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 0.tcp.eu.ngrok.io udp
US 8.8.8.8:53 0.tcp.eu.ngrok.io udp
US 8.8.8.8:53 0.tcp.eu.ngrok.io udp
US 8.8.8.8:53 0.tcp.eu.ngrok.io udp
US 8.8.8.8:53 0.tcp.eu.ngrok.io udp
US 8.8.8.8:53 0.tcp.eu.ngrok.io udp
US 8.8.8.8:53 0.tcp.eu.ngrok.io udp
US 8.8.8.8:53 0.tcp.eu.ngrok.io udp
US 8.8.8.8:53 0.tcp.eu.ngrok.io udp

Files

memory/1152-0-0x00007FFFEFE53000-0x00007FFFEFE55000-memory.dmp

memory/1152-1-0x0000000000290000-0x00000000002A6000-memory.dmp

memory/1152-2-0x00007FFFEFE50000-0x00007FFFF0911000-memory.dmp

memory/1152-7-0x00007FFFEFE50000-0x00007FFFF0911000-memory.dmp

memory/1152-8-0x00007FFFEFE50000-0x00007FFFF0911000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp4FA6.tmp.bat

MD5 dec2ad564b0f16c302784e70ae7822b2
SHA1 09e3098a3e1945260c9d3fecce8547e300417ab7
SHA256 4ebdb1b845a6dfef9100f6a6ebab0bb2bb6afb9e88cccc5ced8ea3434cd2278b
SHA512 b14af36d6427f41361ee096f16b129664834b04cd8cc6f1c091fa09377c88a5bab7a930006deb238e75d854d02c5d11a07720b059563349d8496ac77961fee21

C:\Users\Admin\AppData\Local\Temp\ALSO.exe

MD5 bf056ef6ab656719cc5b1a0efaac990b
SHA1 14e0ed9edeb65a47aa1a14bd94a6c72293b1c787
SHA256 9fe019bc58d7696c3658ebe88f4a7d2cee682236872353ffe4bd92fd86c18be9
SHA512 a23d0e24e287a232ebfc0bd35b4922693743dc8b6885a159bdf71d972cc3e3a104ba2dcf5487acba5175902946a332940c48e37b31bb76f245b090a7444e0929