Analysis

  • max time kernel
    42s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2022 13:17

General

  • Target

    b47aaf7bae813238062904bf48a4377ba2a206bf33339a5eaf5d38e41b925da5.exe

  • Size

    499KB

  • MD5

    6e28624780d6aa37c37c74d7fc190b75

  • SHA1

    c82b621ee14d73f2a0b25ee42c8c7b7385d6d54c

  • SHA256

    b47aaf7bae813238062904bf48a4377ba2a206bf33339a5eaf5d38e41b925da5

  • SHA512

    b57ae51fa7a2412d4a4899dc4fc7cf9ca52c5bd4f1ec7afbf7320bfd8731d5048cf215ed716304c51d743f7d2786182b7ea2a8933c1d2e08c99d4faf59da5b98

  • SSDEEP

    3072:COMM8Jdo/g6TNSeTg0wAnxM430tea0sl2sg0NO4l9e8Y:wM8z6JTgcnx0Qhsli0xlA8

Score
10/10

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Async RAT payload 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b47aaf7bae813238062904bf48a4377ba2a206bf33339a5eaf5d38e41b925da5.exe
    "C:\Users\Admin\AppData\Local\Temp\b47aaf7bae813238062904bf48a4377ba2a206bf33339a5eaf5d38e41b925da5.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1468
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 1468 -s 524
      2⤵
      • Program crash
      PID:1600

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1468-54-0x0000000000920000-0x00000000009A2000-memory.dmp
    Filesize

    520KB

  • memory/1468-55-0x0000000000240000-0x000000000024A000-memory.dmp
    Filesize

    40KB

  • memory/1600-56-0x0000000000000000-mapping.dmp