Analysis
-
max time kernel
95s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 17:44
Behavioral task
behavioral1
Sample
f559c085934e6e7d98e6d520684196eb.exe
Resource
win7-20220901-en
General
-
Target
f559c085934e6e7d98e6d520684196eb.exe
-
Size
45KB
-
MD5
f559c085934e6e7d98e6d520684196eb
-
SHA1
3a829e2faeaa5a48556770cc159a4e291a91a9c3
-
SHA256
198886528a13c0f7f03536bac4a5c449d3b21131887efa7595c9e9a56a2cfc0e
-
SHA512
7451ae89f1df93613069ea4056d9f23b1d8c71636487ee888b39e7887181b03c2f7183673468ead5fec2d0c50396b6545a623e6627a88f0268a68bab47d67f79
-
SSDEEP
768:SubrdT5UohzWUfpdBmo2qV6KjGKG6PIyzjbFgX3iUqaPkMapBDZHx:SubrdT5Pf2FKYDy3bCXSUqQE3dHx
Malware Config
Extracted
asyncrat
0.5.7B
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:51115
127.0.0.1:26993
127.0.0.1:19624
185.246.220.26:6606
185.246.220.26:7707
185.246.220.26:8808
185.246.220.26:51115
185.246.220.26:26993
185.246.220.26:19624
5.tcp.ngrok.io:6606
5.tcp.ngrok.io:7707
5.tcp.ngrok.io:8808
5.tcp.ngrok.io:51115
5.tcp.ngrok.io:26993
5.tcp.ngrok.io:19624
disownnet.duckdns.org:6606
disownnet.duckdns.org:7707
disownnet.duckdns.org:8808
disownnet.duckdns.org:51115
disownnet.duckdns.org:26993
disownnet.duckdns.org:19624
7.tcp.eu.ngrok.io:6606
7.tcp.eu.ngrok.io:7707
7.tcp.eu.ngrok.io:8808
7.tcp.eu.ngrok.io:51115
7.tcp.eu.ngrok.io:26993
7.tcp.eu.ngrok.io:19624
-
delay
3
-
install
false
-
install_file
services.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload ⋅ 1 IoCs
Processes:
resource yara_rule behavioral2/memory/764-132-0x0000000000380000-0x0000000000392000-memory.dmp asyncrat -
Suspicious use of AdjustPrivilegeToken ⋅ 1 IoCs
Processes:
f559c085934e6e7d98e6d520684196eb.exedescription pid process Token: SeDebugPrivilege 764 f559c085934e6e7d98e6d520684196eb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f559c085934e6e7d98e6d520684196eb.exe"C:\Users\Admin\AppData\Local\Temp\f559c085934e6e7d98e6d520684196eb.exe"Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Replay Monitor
Downloads
-
memory/764-132-0x0000000000380000-0x0000000000392000-memory.dmpFilesize
72KB
-
memory/764-133-0x0000000005370000-0x000000000540C000-memory.dmpFilesize
624KB
-
memory/764-134-0x00000000059C0000-0x0000000005F64000-memory.dmpFilesize
5MB
-
memory/764-135-0x0000000000DE0000-0x0000000000E46000-memory.dmpFilesize
408KB