Analysis
-
max time kernel
151s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
30-11-2022 15:04
Static task
static1
Behavioral task
behavioral1
Sample
f6811579d05e934ddc738eef47f1cce11329b4adb926247551ca37540f4ad99a.exe
Resource
win7-20221111-en
General
-
Target
f6811579d05e934ddc738eef47f1cce11329b4adb926247551ca37540f4ad99a.exe
-
Size
408KB
-
MD5
bc756741f3c49592e4ab0646b91dc398
-
SHA1
d47282b28c6dc3240978d4105e779f1d05b6a6e3
-
SHA256
f6811579d05e934ddc738eef47f1cce11329b4adb926247551ca37540f4ad99a
-
SHA512
d11e1998cfa9dd81b9940994411990f442835ce92d6177c180df027caa520753d01188e75794d885ca5a01b249129c8929a95c9082de161eee66ca5aedc9979e
-
SSDEEP
6144:Qtd3F/h3SXnmtWrnngnnnKnanlywwwBwwA5wwwwswww+wwwGwwwbwwwLwwwwwwwu:Q/F/hCWtWrnngnnnKnanx4Y
Malware Config
Extracted
asyncrat
0.5.6B
127.0.0.1:8808
googledrive.dynu.net:8808
googledrive.linkpc.net:8808
googledrive.myftp.org:8808
fhjghjdfgvcbndfgdfg
-
delay
5
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1620-60-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1620-61-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1620-62-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1620-63-0x000000000040C25E-mapping.dmp asyncrat behavioral1/memory/1620-65-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1620-67-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
f6811579d05e934ddc738eef47f1cce11329b4adb926247551ca37540f4ad99a.exedescription pid process target process PID 1868 set thread context of 1620 1868 f6811579d05e934ddc738eef47f1cce11329b4adb926247551ca37540f4ad99a.exe f6811579d05e934ddc738eef47f1cce11329b4adb926247551ca37540f4ad99a.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
f6811579d05e934ddc738eef47f1cce11329b4adb926247551ca37540f4ad99a.exedescription pid process target process PID 1868 wrote to memory of 1620 1868 f6811579d05e934ddc738eef47f1cce11329b4adb926247551ca37540f4ad99a.exe f6811579d05e934ddc738eef47f1cce11329b4adb926247551ca37540f4ad99a.exe PID 1868 wrote to memory of 1620 1868 f6811579d05e934ddc738eef47f1cce11329b4adb926247551ca37540f4ad99a.exe f6811579d05e934ddc738eef47f1cce11329b4adb926247551ca37540f4ad99a.exe PID 1868 wrote to memory of 1620 1868 f6811579d05e934ddc738eef47f1cce11329b4adb926247551ca37540f4ad99a.exe f6811579d05e934ddc738eef47f1cce11329b4adb926247551ca37540f4ad99a.exe PID 1868 wrote to memory of 1620 1868 f6811579d05e934ddc738eef47f1cce11329b4adb926247551ca37540f4ad99a.exe f6811579d05e934ddc738eef47f1cce11329b4adb926247551ca37540f4ad99a.exe PID 1868 wrote to memory of 1620 1868 f6811579d05e934ddc738eef47f1cce11329b4adb926247551ca37540f4ad99a.exe f6811579d05e934ddc738eef47f1cce11329b4adb926247551ca37540f4ad99a.exe PID 1868 wrote to memory of 1620 1868 f6811579d05e934ddc738eef47f1cce11329b4adb926247551ca37540f4ad99a.exe f6811579d05e934ddc738eef47f1cce11329b4adb926247551ca37540f4ad99a.exe PID 1868 wrote to memory of 1620 1868 f6811579d05e934ddc738eef47f1cce11329b4adb926247551ca37540f4ad99a.exe f6811579d05e934ddc738eef47f1cce11329b4adb926247551ca37540f4ad99a.exe PID 1868 wrote to memory of 1620 1868 f6811579d05e934ddc738eef47f1cce11329b4adb926247551ca37540f4ad99a.exe f6811579d05e934ddc738eef47f1cce11329b4adb926247551ca37540f4ad99a.exe PID 1868 wrote to memory of 1620 1868 f6811579d05e934ddc738eef47f1cce11329b4adb926247551ca37540f4ad99a.exe f6811579d05e934ddc738eef47f1cce11329b4adb926247551ca37540f4ad99a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6811579d05e934ddc738eef47f1cce11329b4adb926247551ca37540f4ad99a.exe"C:\Users\Admin\AppData\Local\Temp\f6811579d05e934ddc738eef47f1cce11329b4adb926247551ca37540f4ad99a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f6811579d05e934ddc738eef47f1cce11329b4adb926247551ca37540f4ad99a.exe"C:\Users\Admin\AppData\Local\Temp\f6811579d05e934ddc738eef47f1cce11329b4adb926247551ca37540f4ad99a.exe"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1620-58-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1620-57-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1620-60-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1620-61-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1620-62-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1620-63-0x000000000040C25E-mapping.dmp
-
memory/1620-65-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1620-67-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1868-54-0x0000000000E10000-0x0000000000E7C000-memory.dmpFilesize
432KB
-
memory/1868-55-0x00000000757E1000-0x00000000757E3000-memory.dmpFilesize
8KB
-
memory/1868-56-0x00000000005D0000-0x00000000005E4000-memory.dmpFilesize
80KB