Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
30-06-2022 23:26
Static task
static1
Behavioral task
behavioral1
Sample
977ff0149b3f10a314f5f559e9f176d92ed2f57e70e11832eefa168b9af77991.exe
Resource
win7-20220414-en
General
-
Target
977ff0149b3f10a314f5f559e9f176d92ed2f57e70e11832eefa168b9af77991.exe
-
Size
886KB
-
MD5
2cd51cad030466214cbb6a178988ed36
-
SHA1
dddda4e4138a647f9a5b9d4dd3325b7e73b4d80d
-
SHA256
977ff0149b3f10a314f5f559e9f176d92ed2f57e70e11832eefa168b9af77991
-
SHA512
7b9b550f7a59bbd67c71b2590f2a9ef45f0c606326c83b824e23b8002db1469e8e54ab82de9c1b615154735a3952a0bc7037f0644643504c68833bd08ea158e8
Malware Config
Extracted
asyncrat
0.5.7B
Adobe
20.36.21.13:2070
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4400-136-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
977ff0149b3f10a314f5f559e9f176d92ed2f57e70e11832eefa168b9af77991.exedescription pid process target process PID 3864 set thread context of 4400 3864 977ff0149b3f10a314f5f559e9f176d92ed2f57e70e11832eefa168b9af77991.exe 977ff0149b3f10a314f5f559e9f176d92ed2f57e70e11832eefa168b9af77991.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
977ff0149b3f10a314f5f559e9f176d92ed2f57e70e11832eefa168b9af77991.exepid process 3864 977ff0149b3f10a314f5f559e9f176d92ed2f57e70e11832eefa168b9af77991.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
977ff0149b3f10a314f5f559e9f176d92ed2f57e70e11832eefa168b9af77991.exedescription pid process Token: SeDebugPrivilege 3864 977ff0149b3f10a314f5f559e9f176d92ed2f57e70e11832eefa168b9af77991.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
977ff0149b3f10a314f5f559e9f176d92ed2f57e70e11832eefa168b9af77991.exedescription pid process target process PID 3864 wrote to memory of 4400 3864 977ff0149b3f10a314f5f559e9f176d92ed2f57e70e11832eefa168b9af77991.exe 977ff0149b3f10a314f5f559e9f176d92ed2f57e70e11832eefa168b9af77991.exe PID 3864 wrote to memory of 4400 3864 977ff0149b3f10a314f5f559e9f176d92ed2f57e70e11832eefa168b9af77991.exe 977ff0149b3f10a314f5f559e9f176d92ed2f57e70e11832eefa168b9af77991.exe PID 3864 wrote to memory of 4400 3864 977ff0149b3f10a314f5f559e9f176d92ed2f57e70e11832eefa168b9af77991.exe 977ff0149b3f10a314f5f559e9f176d92ed2f57e70e11832eefa168b9af77991.exe PID 3864 wrote to memory of 4400 3864 977ff0149b3f10a314f5f559e9f176d92ed2f57e70e11832eefa168b9af77991.exe 977ff0149b3f10a314f5f559e9f176d92ed2f57e70e11832eefa168b9af77991.exe PID 3864 wrote to memory of 4400 3864 977ff0149b3f10a314f5f559e9f176d92ed2f57e70e11832eefa168b9af77991.exe 977ff0149b3f10a314f5f559e9f176d92ed2f57e70e11832eefa168b9af77991.exe PID 3864 wrote to memory of 4400 3864 977ff0149b3f10a314f5f559e9f176d92ed2f57e70e11832eefa168b9af77991.exe 977ff0149b3f10a314f5f559e9f176d92ed2f57e70e11832eefa168b9af77991.exe PID 3864 wrote to memory of 4400 3864 977ff0149b3f10a314f5f559e9f176d92ed2f57e70e11832eefa168b9af77991.exe 977ff0149b3f10a314f5f559e9f176d92ed2f57e70e11832eefa168b9af77991.exe PID 3864 wrote to memory of 4400 3864 977ff0149b3f10a314f5f559e9f176d92ed2f57e70e11832eefa168b9af77991.exe 977ff0149b3f10a314f5f559e9f176d92ed2f57e70e11832eefa168b9af77991.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\977ff0149b3f10a314f5f559e9f176d92ed2f57e70e11832eefa168b9af77991.exe"C:\Users\Admin\AppData\Local\Temp\977ff0149b3f10a314f5f559e9f176d92ed2f57e70e11832eefa168b9af77991.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\977ff0149b3f10a314f5f559e9f176d92ed2f57e70e11832eefa168b9af77991.exe"{path}"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\977ff0149b3f10a314f5f559e9f176d92ed2f57e70e11832eefa168b9af77991.exe.logFilesize
1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3
-
memory/3864-130-0x0000000000BB0000-0x0000000000C94000-memory.dmpFilesize
912KB
-
memory/3864-131-0x0000000008080000-0x0000000008624000-memory.dmpFilesize
5.6MB
-
memory/3864-132-0x0000000007B70000-0x0000000007C02000-memory.dmpFilesize
584KB
-
memory/3864-133-0x0000000007B20000-0x0000000007B2A000-memory.dmpFilesize
40KB
-
memory/3864-134-0x000000000B3A0000-0x000000000B43C000-memory.dmpFilesize
624KB
-
memory/4400-135-0x0000000000000000-mapping.dmp
-
memory/4400-136-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB