Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-11-2022 12:33
Static task
static1
Behavioral task
behavioral1
Sample
22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe
Resource
win7-20220812-en
General
-
Target
22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe
-
Size
987KB
-
MD5
2bad27a37d32b4235aac6fcdf74b4306
-
SHA1
8b2b15c01b1e54be6396af46ab3b59fee67f5148
-
SHA256
22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c
-
SHA512
eb6ffa7c229d6e687ed65f69a77d1a94166410d5e77be812c956a58396dbdf7b1b5817e7eee0ae67c62776cd6c1c83be11e44f577a1b780027ee3bfdc7cbc0b0
-
SSDEEP
12288:ruDnl6cMv0obsCnG1eQmXViI2gDnUyfSAgyZx:rklk1NQmX4SUPsX
Malware Config
Extracted
asyncrat
0.5.7B
Default
168.62.160.75:1604
168.62.160.75:222
tehliike.duckdns.org:1604
tehliike.duckdns.org:222
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_file
setup.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1648-61-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1648-60-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1648-62-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1648-63-0x000000000040C76E-mapping.dmp asyncrat behavioral1/memory/1648-65-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1648-67-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exedescription pid process target process PID 1184 set thread context of 1648 1184 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exepid process 1184 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe 1184 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exedescription pid process Token: SeDebugPrivilege 1184 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exedescription pid process target process PID 1184 wrote to memory of 1748 1184 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe PID 1184 wrote to memory of 1748 1184 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe PID 1184 wrote to memory of 1748 1184 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe PID 1184 wrote to memory of 1748 1184 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe PID 1184 wrote to memory of 1868 1184 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe PID 1184 wrote to memory of 1868 1184 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe PID 1184 wrote to memory of 1868 1184 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe PID 1184 wrote to memory of 1868 1184 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe PID 1184 wrote to memory of 1648 1184 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe PID 1184 wrote to memory of 1648 1184 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe PID 1184 wrote to memory of 1648 1184 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe PID 1184 wrote to memory of 1648 1184 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe PID 1184 wrote to memory of 1648 1184 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe PID 1184 wrote to memory of 1648 1184 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe PID 1184 wrote to memory of 1648 1184 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe PID 1184 wrote to memory of 1648 1184 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe PID 1184 wrote to memory of 1648 1184 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe"C:\Users\Admin\AppData\Local\Temp\22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe"C:\Users\Admin\AppData\Local\Temp\22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe"2⤵PID:1748
-
-
C:\Users\Admin\AppData\Local\Temp\22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe"C:\Users\Admin\AppData\Local\Temp\22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe"2⤵PID:1868
-
-
C:\Users\Admin\AppData\Local\Temp\22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe"C:\Users\Admin\AppData\Local\Temp\22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe"2⤵PID:1648
-