Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    26-09-2021 19:04

General

  • Target

    1636405ad0ceac2cc2f216c8c6981d3c.exe

  • Size

    45KB

  • MD5

    1636405ad0ceac2cc2f216c8c6981d3c

  • SHA1

    a1801a73b0e657b1527c5bdfe3f079cb0f202212

  • SHA256

    76529bae9e673736b384c748cd25c6b55327c083cdffa62477bb8542f4d3e7bd

  • SHA512

    8cf9db8a72e808ee89af8b0c6a02c3aee7f47fc15ff7a3103643b3a83723f951fc1298bb939746dfccf19d85a5b3bb88999df3fbf63c0fe6c6b338bfd74ba28a

Score
10/10

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

    suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1636405ad0ceac2cc2f216c8c6981d3c.exe
    "C:\Users\Admin\AppData\Local\Temp\1636405ad0ceac2cc2f216c8c6981d3c.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1116

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1116-53-0x0000000001250000-0x0000000001251000-memory.dmp
    Filesize

    4KB

  • memory/1116-55-0x0000000075BF1000-0x0000000075BF3000-memory.dmp
    Filesize

    8KB

  • memory/1116-56-0x0000000000AC0000-0x0000000000AC1000-memory.dmp
    Filesize

    4KB