Malware Analysis Report

2024-08-06 13:14

Sample ID 240616-saqlda1grn
Target cum.exe
SHA256 97ef8ed044f3e29f2d56193a52aa607e33eb990210cea4cdac6fbf7285fc733d
Tags
asyncrat default rat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

97ef8ed044f3e29f2d56193a52aa607e33eb990210cea4cdac6fbf7285fc733d

Threat Level: Known bad

The file cum.exe was found to be: Known bad.

Malicious Activity Summary

asyncrat default rat

Async RAT payload

AsyncRat

Asyncrat family

Async RAT payload

Checks computer location settings

Executes dropped EXE

Loads dropped DLL

Unsigned PE

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Creates scheduled task(s)

Delays execution with timeout.exe

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-16 14:55

Signatures

Async RAT payload

rat
Description Indicator Process Target
N/A N/A N/A N/A

Asyncrat family

asyncrat

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-16 14:55

Reported

2024-06-16 14:58

Platform

win7-20240611-en

Max time kernel

124s

Max time network

134s

Command Line

"C:\Users\Admin\AppData\Local\Temp\cum.exe"

Signatures

AsyncRat

rat asyncrat

Async RAT payload

rat
Description Indicator Process Target
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\RAR.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\timeout.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\cum.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cum.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\cum.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\RAR.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2200 wrote to memory of 1724 N/A C:\Users\Admin\AppData\Local\Temp\cum.exe C:\Windows\SysWOW64\cmd.exe
PID 2200 wrote to memory of 1724 N/A C:\Users\Admin\AppData\Local\Temp\cum.exe C:\Windows\SysWOW64\cmd.exe
PID 2200 wrote to memory of 1724 N/A C:\Users\Admin\AppData\Local\Temp\cum.exe C:\Windows\SysWOW64\cmd.exe
PID 2200 wrote to memory of 1724 N/A C:\Users\Admin\AppData\Local\Temp\cum.exe C:\Windows\SysWOW64\cmd.exe
PID 2200 wrote to memory of 2292 N/A C:\Users\Admin\AppData\Local\Temp\cum.exe C:\Windows\SysWOW64\cmd.exe
PID 2200 wrote to memory of 2292 N/A C:\Users\Admin\AppData\Local\Temp\cum.exe C:\Windows\SysWOW64\cmd.exe
PID 2200 wrote to memory of 2292 N/A C:\Users\Admin\AppData\Local\Temp\cum.exe C:\Windows\SysWOW64\cmd.exe
PID 2200 wrote to memory of 2292 N/A C:\Users\Admin\AppData\Local\Temp\cum.exe C:\Windows\SysWOW64\cmd.exe
PID 1724 wrote to memory of 3032 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\schtasks.exe
PID 1724 wrote to memory of 3032 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\schtasks.exe
PID 1724 wrote to memory of 3032 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\schtasks.exe
PID 1724 wrote to memory of 3032 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\schtasks.exe
PID 2292 wrote to memory of 2312 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 2292 wrote to memory of 2312 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 2292 wrote to memory of 2312 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 2292 wrote to memory of 2312 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 2292 wrote to memory of 2692 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Roaming\RAR.exe
PID 2292 wrote to memory of 2692 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Roaming\RAR.exe
PID 2292 wrote to memory of 2692 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Roaming\RAR.exe
PID 2292 wrote to memory of 2692 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Roaming\RAR.exe

Processes

C:\Users\Admin\AppData\Local\Temp\cum.exe

"C:\Users\Admin\AppData\Local\Temp\cum.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "RAR" /tr '"C:\Users\Admin\AppData\Roaming\RAR.exe"' & exit

C:\Windows\SysWOW64\cmd.exe

cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp29CE.tmp.bat""

C:\Windows\SysWOW64\schtasks.exe

schtasks /create /f /sc onlogon /rl highest /tn "RAR" /tr '"C:\Users\Admin\AppData\Roaming\RAR.exe"'

C:\Windows\SysWOW64\timeout.exe

timeout 3

C:\Users\Admin\AppData\Roaming\RAR.exe

"C:\Users\Admin\AppData\Roaming\RAR.exe"

Network

Country Destination Domain Proto
N/A 172.16.0.64:6606 tcp
N/A 172.16.0.64:6606 tcp
N/A 172.16.0.64:6606 tcp
N/A 10.6.0.86:7707 tcp
N/A 192.168.0.118:7707 tcp

Files

memory/2200-0-0x000000007475E000-0x000000007475F000-memory.dmp

memory/2200-1-0x0000000000D60000-0x0000000000D72000-memory.dmp

memory/2200-2-0x0000000074750000-0x0000000074E3E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp29CE.tmp.bat

MD5 2d2ecbf72949b82527e48aab261d3218
SHA1 5ef99f23c4ccccf27c9a1556f41736171c4f5228
SHA256 d3c97c7acd91a321883f1a83e29ae0c95a129b9e035138498558a9d901c5ab48
SHA512 5e873485c8615a0d76433a9ba46770a76f1f1c6520f34f3747b743f410feb45d2c0ea50293bfae0a57de190a43fa5f3415278f4647868411e1290a8efed0ca61

memory/2200-12-0x0000000074750000-0x0000000074E3E000-memory.dmp

\Users\Admin\AppData\Roaming\RAR.exe

MD5 910e4d86c5f28a323866c143789749db
SHA1 f8403807b7eb02a4a4021675c7a3d4aefc975527
SHA256 97ef8ed044f3e29f2d56193a52aa607e33eb990210cea4cdac6fbf7285fc733d
SHA512 8c577c27c82f7c75ca8abf8879463e86917a077e39d45a720bbd84d670f82c41b61041c99b22d3bc6738c42260a9ca0e8e6c65c1f93eafd5a529ce26dd31ebe9

memory/2692-16-0x0000000000EF0000-0x0000000000F02000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-16 14:55

Reported

2024-06-16 14:58

Platform

win10v2004-20240611-en

Max time kernel

150s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\cum.exe"

Signatures

AsyncRat

rat asyncrat

Async RAT payload

rat
Description Indicator Process Target
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\cum.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\RAR.exe N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\timeout.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\cum.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\RAR.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2008 wrote to memory of 1756 N/A C:\Users\Admin\AppData\Local\Temp\cum.exe C:\Windows\SysWOW64\cmd.exe
PID 2008 wrote to memory of 1756 N/A C:\Users\Admin\AppData\Local\Temp\cum.exe C:\Windows\SysWOW64\cmd.exe
PID 2008 wrote to memory of 1756 N/A C:\Users\Admin\AppData\Local\Temp\cum.exe C:\Windows\SysWOW64\cmd.exe
PID 2008 wrote to memory of 4264 N/A C:\Users\Admin\AppData\Local\Temp\cum.exe C:\Windows\SysWOW64\cmd.exe
PID 2008 wrote to memory of 4264 N/A C:\Users\Admin\AppData\Local\Temp\cum.exe C:\Windows\SysWOW64\cmd.exe
PID 2008 wrote to memory of 4264 N/A C:\Users\Admin\AppData\Local\Temp\cum.exe C:\Windows\SysWOW64\cmd.exe
PID 1756 wrote to memory of 3896 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\schtasks.exe
PID 1756 wrote to memory of 3896 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\schtasks.exe
PID 1756 wrote to memory of 3896 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\schtasks.exe
PID 4264 wrote to memory of 1400 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 4264 wrote to memory of 1400 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 4264 wrote to memory of 1400 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 4264 wrote to memory of 1952 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Roaming\RAR.exe
PID 4264 wrote to memory of 1952 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Roaming\RAR.exe
PID 4264 wrote to memory of 1952 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Roaming\RAR.exe

Processes

C:\Users\Admin\AppData\Local\Temp\cum.exe

"C:\Users\Admin\AppData\Local\Temp\cum.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "RAR" /tr '"C:\Users\Admin\AppData\Roaming\RAR.exe"' & exit

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp4759.tmp.bat""

C:\Windows\SysWOW64\schtasks.exe

schtasks /create /f /sc onlogon /rl highest /tn "RAR" /tr '"C:\Users\Admin\AppData\Roaming\RAR.exe"'

C:\Windows\SysWOW64\timeout.exe

timeout 3

C:\Users\Admin\AppData\Roaming\RAR.exe

"C:\Users\Admin\AppData\Roaming\RAR.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 13.107.21.237:443 g.bing.com tcp
US 8.8.8.8:53 64.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 237.21.107.13.in-addr.arpa udp
US 8.8.8.8:53 144.107.17.2.in-addr.arpa udp
NL 23.62.61.97:443 www.bing.com tcp
US 8.8.8.8:53 97.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
N/A 172.16.0.64:6606 tcp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
N/A 10.6.0.86:6606 tcp
US 8.8.8.8:53 98.58.20.217.in-addr.arpa udp
US 8.8.8.8:53 203.107.17.2.in-addr.arpa udp
N/A 10.6.0.86:7707 tcp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 23.236.111.52.in-addr.arpa udp
N/A 10.6.0.86:6606 tcp
N/A 192.168.0.118:7707 tcp
US 8.8.8.8:53 235.17.178.52.in-addr.arpa udp

Files

memory/2008-0-0x0000000074A8E000-0x0000000074A8F000-memory.dmp

memory/2008-1-0x0000000000F60000-0x0000000000F72000-memory.dmp

memory/2008-2-0x0000000074A80000-0x0000000075230000-memory.dmp

memory/2008-3-0x0000000005920000-0x00000000059BC000-memory.dmp

memory/2008-8-0x0000000074A80000-0x0000000075230000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp4759.tmp.bat

MD5 a8a39b704970b0bdf0996c011ee1284e
SHA1 e6bdaddaca4ee8355cc2e4e9a669ffabc6cc86d0
SHA256 666f648151444a1e658e5fb8f51851ad67076538e40a2ba371f40d7d952de18d
SHA512 25cc07373155080c0675bca3dbb21670099b5568057eefb082ac75361f9190e84d72c36426916fb52ed9338fcdd913eab4d02a3ecdd78783ebc6e7fecede0039

C:\Users\Admin\AppData\Roaming\RAR.exe

MD5 910e4d86c5f28a323866c143789749db
SHA1 f8403807b7eb02a4a4021675c7a3d4aefc975527
SHA256 97ef8ed044f3e29f2d56193a52aa607e33eb990210cea4cdac6fbf7285fc733d
SHA512 8c577c27c82f7c75ca8abf8879463e86917a077e39d45a720bbd84d670f82c41b61041c99b22d3bc6738c42260a9ca0e8e6c65c1f93eafd5a529ce26dd31ebe9

memory/1952-13-0x00000000749D0000-0x0000000075180000-memory.dmp

memory/1952-14-0x00000000749D0000-0x0000000075180000-memory.dmp