Analysis
-
max time kernel
160s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2022 12:33
Static task
static1
Behavioral task
behavioral1
Sample
22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe
Resource
win7-20220812-en
General
-
Target
22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe
-
Size
987KB
-
MD5
2bad27a37d32b4235aac6fcdf74b4306
-
SHA1
8b2b15c01b1e54be6396af46ab3b59fee67f5148
-
SHA256
22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c
-
SHA512
eb6ffa7c229d6e687ed65f69a77d1a94166410d5e77be812c956a58396dbdf7b1b5817e7eee0ae67c62776cd6c1c83be11e44f577a1b780027ee3bfdc7cbc0b0
-
SSDEEP
12288:ruDnl6cMv0obsCnG1eQmXViI2gDnUyfSAgyZx:rklk1NQmX4SUPsX
Malware Config
Extracted
asyncrat
0.5.7B
Default
168.62.160.75:1604
168.62.160.75:222
tehliike.duckdns.org:1604
tehliike.duckdns.org:222
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_file
setup.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3952-137-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exedescription pid process target process PID 4360 set thread context of 3952 4360 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exedescription pid process target process PID 4360 wrote to memory of 3952 4360 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe PID 4360 wrote to memory of 3952 4360 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe PID 4360 wrote to memory of 3952 4360 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe PID 4360 wrote to memory of 3952 4360 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe PID 4360 wrote to memory of 3952 4360 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe PID 4360 wrote to memory of 3952 4360 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe PID 4360 wrote to memory of 3952 4360 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe PID 4360 wrote to memory of 3952 4360 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe 22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe"C:\Users\Admin\AppData\Local\Temp\22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe"C:\Users\Admin\AppData\Local\Temp\22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c.exe"2⤵PID:3952
-