Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 00:43
General
-
Target
miau.rar
-
Size
27KB
-
MD5
881e4d149f4500779acea0b645f3a200
-
SHA1
7a47420ef9f81dda7004324a15e5a985ee3efda3
-
SHA256
5a1b7ee6eb8b76152c54fa3b0d5fe69589bccaf7adab2250778f79fa45291a9e
-
SHA512
62a56d50beb478e437e927feb57b551afc039ac15c7e15dc4d8ab21ebe585eea2e2c2fb644dd3d59c61cb23d58b4c693e551f77fc4b053afa963676e6e529533
-
SSDEEP
768:Sj8WMw9UUf39F0oGSo+b5ReKyE5MQFK2nRHm:Sjaw9Um3/0N1eD+2RG
Malware Config
Extracted
asyncrat
Default
127.0.0.1:3232
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000600000001da60-2.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 956 Inf1ected.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2296 ipconfig.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2404 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeRestorePrivilege 3508 7zG.exe Token: 35 3508 7zG.exe Token: SeSecurityPrivilege 3508 7zG.exe Token: SeSecurityPrivilege 3508 7zG.exe Token: SeDebugPrivilege 956 Inf1ected.exe Token: SeDebugPrivilege 2404 taskmgr.exe Token: SeSystemProfilePrivilege 2404 taskmgr.exe Token: SeCreateGlobalPrivilege 2404 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3508 7zG.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe 2404 taskmgr.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 724 OpenWith.exe 724 OpenWith.exe 724 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1808 wrote to memory of 2296 1808 cmd.exe 121 PID 1808 wrote to memory of 2296 1808 cmd.exe 121
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\miau.rar1⤵
- Modifies registry class
PID:2424
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:724
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4084
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\miau\" -spe -an -ai#7zMap26899:66:7zEvent245941⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3508
-
C:\Users\Admin\Desktop\miau\Inf1ected.exe"C:\Users\Admin\Desktop\miau\Inf1ected.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:956
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2404
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\system32\ipconfig.exeipconfig /all2⤵
- Gathers network information
PID:2296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD5ed98e8e85bf10a9187daf387154fae46
SHA11710a744adb7d7a936fc5b603d6fcb2a45ce371b
SHA256fab8e536eda62c5935c9056066de98db86a6caafc97ee9d150e124030db3a016
SHA5121dcba37e4d87ded88a036e3b1b83a289db04e7ebfac2a16b52b23c7ffb2525d2c055bf4d5c85afdf37615d167ae1cbfdcf8a0cf19798628af3cf93324156fdc1