Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-12-2024 05:28
Static task
static1
Behavioral task
behavioral1
Sample
AUNova.exe
Resource
win7-20240903-en
General
-
Target
AUNova.exe
-
Size
2.1MB
-
MD5
3d37da85a895fc9dc6abb3885041d9ef
-
SHA1
a80e01133d9a0fe9f4675bd127d46c9a283cdab3
-
SHA256
fc5945aa217c7a8eca8d501693d491f5efdf88c629ab5758369db1ee6967517a
-
SHA512
27e9f0c5da0f3fa05219d607de1816b3e4193f7a742e8ec41b9633653de4f020000ea1e97d000458694c82e9c58bd4583c495c4ec513b1a483b2c64b623ca413
-
SSDEEP
24576:9GzSVNqaWt+eTVXydlYmVSdh0Tzt0ReIumwxmV59C6qBJETV/rkDJSTIDS4Fuvrm:czoNK9M7Y8GUzg9IY9C2VTQwvrYZzBJ
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
193.161.193.99:53757
hsaurcrgqwhjimnkbht
-
delay
1
-
install
true
-
install_file
Load.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Xmrig family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0009000000016c53-14.dat family_asyncrat -
XMRig Miner payload 9 IoCs
resource yara_rule behavioral1/memory/2452-65-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/2452-64-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/2452-67-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/2452-70-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/2452-68-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/2452-69-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/2452-71-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/2452-72-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/2452-73-0x0000000140000000-0x0000000140835000-memory.dmp xmrig -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3068 powershell.exe 1592 powershell.exe -
Creates new service(s) 2 TTPs
-
Executes dropped EXE 5 IoCs
pid Process 2316 AU.exe 2396 Load.exe 2652 Load.exe 480 Process not Found 2116 iyjrynjkzgum.exe -
Loads dropped DLL 3 IoCs
pid Process 632 AUNova.exe 632 AUNova.exe 480 Process not Found -
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 1780 powercfg.exe 1380 powercfg.exe 1364 powercfg.exe 1440 powercfg.exe 1688 powercfg.exe 768 powercfg.exe 492 powercfg.exe 2040 powercfg.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\system32\MRT.exe AU.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\system32\MRT.exe iyjrynjkzgum.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2116 set thread context of 2020 2116 iyjrynjkzgum.exe 92 PID 2116 set thread context of 2452 2116 iyjrynjkzgum.exe 96 -
resource yara_rule behavioral1/memory/2452-59-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2452-60-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2452-62-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2452-65-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2452-64-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2452-61-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2452-67-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2452-70-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2452-68-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2452-69-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2452-63-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2452-71-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2452-72-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2452-73-0x0000000140000000-0x0000000140835000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\wusa.lock wusa.exe File created C:\Windows\wusa.lock wusa.exe -
Launches sc.exe 14 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2704 sc.exe 2972 sc.exe 1928 sc.exe 2216 sc.exe 2536 sc.exe 568 sc.exe 692 sc.exe 1960 sc.exe 1320 sc.exe 1172 sc.exe 992 sc.exe 1092 sc.exe 2148 sc.exe 996 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2860 timeout.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = 701a707f0d46db01 powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2748 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2396 Load.exe 2396 Load.exe 2396 Load.exe 2652 Load.exe 2652 Load.exe 2652 Load.exe 2652 Load.exe 2316 AU.exe 3068 powershell.exe 2316 AU.exe 2316 AU.exe 2316 AU.exe 2316 AU.exe 2316 AU.exe 2316 AU.exe 2316 AU.exe 2316 AU.exe 2316 AU.exe 2316 AU.exe 2316 AU.exe 2316 AU.exe 2316 AU.exe 2316 AU.exe 2116 iyjrynjkzgum.exe 1592 powershell.exe 2116 iyjrynjkzgum.exe 2116 iyjrynjkzgum.exe 2116 iyjrynjkzgum.exe 2116 iyjrynjkzgum.exe 2116 iyjrynjkzgum.exe 2116 iyjrynjkzgum.exe 2116 iyjrynjkzgum.exe 2116 iyjrynjkzgum.exe 2116 iyjrynjkzgum.exe 2116 iyjrynjkzgum.exe 2116 iyjrynjkzgum.exe 2116 iyjrynjkzgum.exe 2652 Load.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2652 Load.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2652 Load.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2652 Load.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2652 Load.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2652 Load.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 2396 Load.exe Token: SeDebugPrivilege 2652 Load.exe Token: SeDebugPrivilege 3068 powershell.exe Token: SeShutdownPrivilege 492 powercfg.exe Token: SeShutdownPrivilege 1440 powercfg.exe Token: SeShutdownPrivilege 1688 powercfg.exe Token: SeShutdownPrivilege 768 powercfg.exe Token: SeDebugPrivilege 1592 powershell.exe Token: SeShutdownPrivilege 1380 powercfg.exe Token: SeShutdownPrivilege 1364 powercfg.exe Token: SeShutdownPrivilege 2040 powercfg.exe Token: SeShutdownPrivilege 1780 powercfg.exe Token: SeLockMemoryPrivilege 2452 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2652 Load.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 632 wrote to memory of 2316 632 AUNova.exe 30 PID 632 wrote to memory of 2316 632 AUNova.exe 30 PID 632 wrote to memory of 2316 632 AUNova.exe 30 PID 632 wrote to memory of 2396 632 AUNova.exe 31 PID 632 wrote to memory of 2396 632 AUNova.exe 31 PID 632 wrote to memory of 2396 632 AUNova.exe 31 PID 2396 wrote to memory of 2756 2396 Load.exe 32 PID 2396 wrote to memory of 2756 2396 Load.exe 32 PID 2396 wrote to memory of 2756 2396 Load.exe 32 PID 2396 wrote to memory of 3004 2396 Load.exe 34 PID 2396 wrote to memory of 3004 2396 Load.exe 34 PID 2396 wrote to memory of 3004 2396 Load.exe 34 PID 3004 wrote to memory of 2860 3004 cmd.exe 37 PID 3004 wrote to memory of 2860 3004 cmd.exe 37 PID 3004 wrote to memory of 2860 3004 cmd.exe 37 PID 2756 wrote to memory of 2748 2756 cmd.exe 36 PID 2756 wrote to memory of 2748 2756 cmd.exe 36 PID 2756 wrote to memory of 2748 2756 cmd.exe 36 PID 3004 wrote to memory of 2652 3004 cmd.exe 38 PID 3004 wrote to memory of 2652 3004 cmd.exe 38 PID 3004 wrote to memory of 2652 3004 cmd.exe 38 PID 596 wrote to memory of 380 596 cmd.exe 46 PID 596 wrote to memory of 380 596 cmd.exe 46 PID 596 wrote to memory of 380 596 cmd.exe 46 PID 2296 wrote to memory of 1160 2296 cmd.exe 79 PID 2296 wrote to memory of 1160 2296 cmd.exe 79 PID 2296 wrote to memory of 1160 2296 cmd.exe 79 PID 2116 wrote to memory of 2020 2116 iyjrynjkzgum.exe 92 PID 2116 wrote to memory of 2020 2116 iyjrynjkzgum.exe 92 PID 2116 wrote to memory of 2020 2116 iyjrynjkzgum.exe 92 PID 2116 wrote to memory of 2020 2116 iyjrynjkzgum.exe 92 PID 2116 wrote to memory of 2020 2116 iyjrynjkzgum.exe 92 PID 2116 wrote to memory of 2020 2116 iyjrynjkzgum.exe 92 PID 2116 wrote to memory of 2020 2116 iyjrynjkzgum.exe 92 PID 2116 wrote to memory of 2020 2116 iyjrynjkzgum.exe 92 PID 2116 wrote to memory of 2020 2116 iyjrynjkzgum.exe 92 PID 2116 wrote to memory of 2452 2116 iyjrynjkzgum.exe 96 PID 2116 wrote to memory of 2452 2116 iyjrynjkzgum.exe 96 PID 2116 wrote to memory of 2452 2116 iyjrynjkzgum.exe 96 PID 2116 wrote to memory of 2452 2116 iyjrynjkzgum.exe 96 PID 2116 wrote to memory of 2452 2116 iyjrynjkzgum.exe 96 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\AUNova.exe"C:\Users\Admin\AppData\Local\Temp\AUNova.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\AppData\Local\Temp\AU.exe"C:\Users\Admin\AppData\Local\Temp\AU.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2316 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3068
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart3⤵
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart4⤵
- Drops file in Windows directory
PID:380
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc3⤵
- Launches sc.exe
PID:692
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:1172
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv3⤵
- Launches sc.exe
PID:992
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits3⤵
- Launches sc.exe
PID:2704
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc3⤵
- Launches sc.exe
PID:2972
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1440
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1688
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:492
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:768
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "svchost.exe"3⤵
- Launches sc.exe
PID:1960
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "svchost.exe" binpath= "C:\ProgramData\qfunhtryjkwt\iyjrynjkzgum.exe" start= "auto"3⤵
- Launches sc.exe
PID:2216
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
PID:1928
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "svchost.exe"3⤵
- Launches sc.exe
PID:2536
-
-
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Load" /tr '"C:\Users\Admin\AppData\Roaming\Load.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Load" /tr '"C:\Users\Admin\AppData\Roaming\Load.exe"'4⤵
- Scheduled Task/Job: Scheduled Task
PID:2748
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpABF8.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:2860
-
-
C:\Users\Admin\AppData\Roaming\Load.exe"C:\Users\Admin\AppData\Roaming\Load.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2652
-
-
-
-
C:\ProgramData\qfunhtryjkwt\iyjrynjkzgum.exeC:\ProgramData\qfunhtryjkwt\iyjrynjkzgum.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1592
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵
- Drops file in Windows directory
PID:1160
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:568
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:1092
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:2148
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:1320
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:996
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1364
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1380
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1780
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2040
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:2020
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2452
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Create or Modify System Process
2Windows Service
2Power Settings
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD54fc5086bcb8939429aea99f7322e619b
SHA18d3bd7d005710a8ae0bd0143d18b437be20018d7
SHA256e31d6dc4d6f89573321f389c5b3f12838545ff8d2f1380cfba1782d39853e9fd
SHA51204e230f5b39356aecf4732ac9a2f4fea96e51018907e2f22c7e3f22e51188b64cdb3e202fe324f5e3500761fae43f898bf9489aa8faa34eff3566e1119a786d2
-
Filesize
148B
MD5e3455413c2fbac5a2fc4b8acd6484163
SHA1e22fc2e1c62203904d654516bfac57e9b5cdf2ea
SHA2567bf358679da5d81565a72543d69216ef9b548f58253a43625dbf97f4a9153966
SHA5121469cc6e8d606aff498e51a81d4d755a50f0d660f11222a7bec9ce76f7914abe44aefb54fca9c6d593b855835277839bbe6416b16c0083655e159007ebfb7011
-
Filesize
8B
MD5cf759e4c5f14fe3eec41b87ed756cea8
SHA1c27c796bb3c2fac929359563676f4ba1ffada1f5
SHA256c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761
SHA512c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b
-
Filesize
2.5MB
MD5f81ff7313709cb4a94d7063aebe28410
SHA1e85f7f1c21ad801d04dadaa3a52c3dae0120838a
SHA25655b9842f81f3d83e47e72cff32f4ec903c9a06bd60ea631be3d6c463fcb457f8
SHA512dc65acc20940e57799546a5e55ebec6ca8f57a1dc0033a4ef892a13991516e5cebe307bc73e3c98d7060eb352d043764fe5c2a6b94ea71b2d0c55d4e97930474