Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    19-04-2021 08:03

General

  • Target

    cYA0CfaS.exe

  • Size

    45KB

  • MD5

    e2fcb5500c8ead72ff54fd89b022bfc5

  • SHA1

    b8dab173dde62ca4634c4d196d7b04c0bd90d27a

  • SHA256

    ca433bcb65c83280e3634dd2fb32bf4c82ac636f85ff157c12c9593628b7fa18

  • SHA512

    4ae863e530bd6aa62b80707009cf7621f9da099417e0c5961da8dc2e6f09d80c956cf1a4a2a717b16e6c91d75b3451bd7e401d21193e24da3c6251afd6d0d8df

Score
10/10

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cYA0CfaS.exe
    "C:\Users\Admin\AppData\Local\Temp\cYA0CfaS.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4084

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4084-114-0x0000000000BA0000-0x0000000000BA1000-memory.dmp
    Filesize

    4KB

  • memory/4084-116-0x0000000005580000-0x0000000005581000-memory.dmp
    Filesize

    4KB

  • memory/4084-117-0x0000000005C20000-0x0000000005C21000-memory.dmp
    Filesize

    4KB

  • memory/4084-118-0x00000000061C0000-0x00000000061C1000-memory.dmp
    Filesize

    4KB

  • memory/4084-119-0x0000000005CC0000-0x0000000005CC1000-memory.dmp
    Filesize

    4KB