Analysis
-
max time kernel
85s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
12-10-2022 20:48
Static task
static1
Behavioral task
behavioral1
Sample
49a739cbc8a28adc28736e145c3f245a2bdf6617663f1c33d513377fae72bbb4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
49a739cbc8a28adc28736e145c3f245a2bdf6617663f1c33d513377fae72bbb4.exe
Resource
win10v2004-20220812-en
General
-
Target
49a739cbc8a28adc28736e145c3f245a2bdf6617663f1c33d513377fae72bbb4.exe
-
Size
36KB
-
MD5
801bddf6f14dd89827c5885a6a540de5
-
SHA1
6fbf71bd0d73c446133c6824be09c2b46f2db756
-
SHA256
49a739cbc8a28adc28736e145c3f245a2bdf6617663f1c33d513377fae72bbb4
-
SHA512
e46fb75a40ff00c1bade6e7a19a0f74fe0e0912e5d3828788c19c6ec9f60811945668cdf9769de3a8b8fdebf56898ed52dd093315ea4e256c293611663fe1d4c
-
SSDEEP
384:GIntgkiTl/PJCQCzirQCz03RAtmoYhpRd42tqHwd5ASc:GIetJCQIirQIKRGlYn42oHI2
Malware Config
Extracted
asyncrat
1.0.7
Default
172.93.181.21:8848
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1428-69-0x0000000002450000-0x0000000002460000-memory.dmp asyncrat -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
dwm.exepid process 1428 dwm.exe -
Loads dropped DLL 2 IoCs
Processes:
49a739cbc8a28adc28736e145c3f245a2bdf6617663f1c33d513377fae72bbb4.exepid process 896 49a739cbc8a28adc28736e145c3f245a2bdf6617663f1c33d513377fae72bbb4.exe 896 49a739cbc8a28adc28736e145c3f245a2bdf6617663f1c33d513377fae72bbb4.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
49a739cbc8a28adc28736e145c3f245a2bdf6617663f1c33d513377fae72bbb4.exepid process 896 49a739cbc8a28adc28736e145c3f245a2bdf6617663f1c33d513377fae72bbb4.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
49a739cbc8a28adc28736e145c3f245a2bdf6617663f1c33d513377fae72bbb4.exepid process 896 49a739cbc8a28adc28736e145c3f245a2bdf6617663f1c33d513377fae72bbb4.exe 896 49a739cbc8a28adc28736e145c3f245a2bdf6617663f1c33d513377fae72bbb4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
dwm.exedescription pid process Token: SeDebugPrivilege 1428 dwm.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
49a739cbc8a28adc28736e145c3f245a2bdf6617663f1c33d513377fae72bbb4.exepid process 896 49a739cbc8a28adc28736e145c3f245a2bdf6617663f1c33d513377fae72bbb4.exe 896 49a739cbc8a28adc28736e145c3f245a2bdf6617663f1c33d513377fae72bbb4.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
49a739cbc8a28adc28736e145c3f245a2bdf6617663f1c33d513377fae72bbb4.exedescription pid process target process PID 896 wrote to memory of 1428 896 49a739cbc8a28adc28736e145c3f245a2bdf6617663f1c33d513377fae72bbb4.exe dwm.exe PID 896 wrote to memory of 1428 896 49a739cbc8a28adc28736e145c3f245a2bdf6617663f1c33d513377fae72bbb4.exe dwm.exe PID 896 wrote to memory of 1428 896 49a739cbc8a28adc28736e145c3f245a2bdf6617663f1c33d513377fae72bbb4.exe dwm.exe PID 896 wrote to memory of 1428 896 49a739cbc8a28adc28736e145c3f245a2bdf6617663f1c33d513377fae72bbb4.exe dwm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\49a739cbc8a28adc28736e145c3f245a2bdf6617663f1c33d513377fae72bbb4.exe"C:\Users\Admin\AppData\Local\Temp\49a739cbc8a28adc28736e145c3f245a2bdf6617663f1c33d513377fae72bbb4.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\users\Public\documents\dwm.exeC://users/Public/documents/dwm.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Public\Documents\Text.txtFilesize
109KB
MD591d99f9b230d5e3e382dd58185ccdc9f
SHA192d6dad2f7ebff48989cc0d3a9f192cb64b22684
SHA256acffd5fdcd02939099fe13c497d1945c108ee3cd6bdc80f5f3317445717890e1
SHA5124abf6daef0e83b171e75ab7aa59b107f8276ffd4f95a1e75adc94619e6fb6ec37bc2575285f2c94292645d9cfc772f6ffde84461a89fe21d5b23db1c9d3f07a8
-
C:\Users\Public\Documents\dwm.exeFilesize
6KB
MD568288c9c86bcd4dbad9f93294926b29b
SHA19b177ba5a3d22eaf89cb94b3cacf47b6dcdb4496
SHA256720f10d44aa351453f0cc1fbe463de79e4a6f148bbad369dd1295b1b416b07bc
SHA51248fa5027527d9f139440cb9ef355bca906d654d7b20ad0a98eb89924f12e7fcae0f041afba8c300e62cc79ce6aaf32f4116b88ebd37397c79a873a8ff6942ee6
-
C:\users\Public\documents\ClassLibrary2.dllFilesize
5KB
MD5ea309f547d484a9506978a64b46e1759
SHA15487372323411688d34d5137627c1c5d32d42974
SHA256ea02454269f1059e6d9157a1914e60c2f739d5e185801aeb713dc9eafc4ba9d7
SHA51296328f93e81a8a930bb65f9266f0fd700db5e01a9dcc28c37be49df76733d01d74ee2437d3b1fa4d7aa70baf75a7dffc7d598cc8f2ce581aa030dcb23983988f
-
C:\users\Public\documents\dwm.exeFilesize
6KB
MD568288c9c86bcd4dbad9f93294926b29b
SHA19b177ba5a3d22eaf89cb94b3cacf47b6dcdb4496
SHA256720f10d44aa351453f0cc1fbe463de79e4a6f148bbad369dd1295b1b416b07bc
SHA51248fa5027527d9f139440cb9ef355bca906d654d7b20ad0a98eb89924f12e7fcae0f041afba8c300e62cc79ce6aaf32f4116b88ebd37397c79a873a8ff6942ee6
-
\Users\Public\Documents\calc.dllFilesize
5.4MB
MD526c044da6732d9534e594a521e841c1c
SHA19d2f162bf16affab1b3845df38d42faa073c1a07
SHA256c6f59fdf0b85f3b75da208197e0c755fddc51c44967820ac64ccab25b4004ccd
SHA51272f9449ac1e649e87832639c9b76982d4494a8b45d204b5eccba0d6391d9548bb2f898f511d1144d85f120947967749ab0397c9d44531a20f175b5fd6ddbf436
-
\Users\Public\Documents\dwm.exeFilesize
6KB
MD568288c9c86bcd4dbad9f93294926b29b
SHA19b177ba5a3d22eaf89cb94b3cacf47b6dcdb4496
SHA256720f10d44aa351453f0cc1fbe463de79e4a6f148bbad369dd1295b1b416b07bc
SHA51248fa5027527d9f139440cb9ef355bca906d654d7b20ad0a98eb89924f12e7fcae0f041afba8c300e62cc79ce6aaf32f4116b88ebd37397c79a873a8ff6942ee6
-
memory/896-62-0x00000000741F0000-0x0000000074A92000-memory.dmpFilesize
8.6MB
-
memory/896-54-0x0000000075E31000-0x0000000075E33000-memory.dmpFilesize
8KB
-
memory/1428-60-0x000007FEFC101000-0x000007FEFC103000-memory.dmpFilesize
8KB
-
memory/1428-59-0x000000013F2A0000-0x000000013F2A6000-memory.dmpFilesize
24KB
-
memory/1428-66-0x00000000005A0000-0x00000000005A8000-memory.dmpFilesize
32KB
-
memory/1428-56-0x0000000000000000-mapping.dmp
-
memory/1428-68-0x00000000005C0000-0x00000000005D5000-memory.dmpFilesize
84KB
-
memory/1428-69-0x0000000002450000-0x0000000002460000-memory.dmpFilesize
64KB
-
memory/1428-70-0x000000001BF2C000-0x000000001BF4B000-memory.dmpFilesize
124KB
-
memory/1428-71-0x000000001BF2C000-0x000000001BF4B000-memory.dmpFilesize
124KB