Analysis
-
max time kernel
145s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29-01-2023 21:29
Static task
static1
Behavioral task
behavioral1
Sample
230269d61ab9fffc9c52a6caeb51378b76c9b50e869600cf14335fc2c3c40409.exe
Resource
win7-20220901-en
windows7-x64
4 signatures
150 seconds
General
-
Target
230269d61ab9fffc9c52a6caeb51378b76c9b50e869600cf14335fc2c3c40409.exe
-
Size
394KB
-
MD5
c0ef7514b9f1b87043cd017f7cd53b88
-
SHA1
9b79fb61579a53fcc138503035cc2a61f6c6ccce
-
SHA256
230269d61ab9fffc9c52a6caeb51378b76c9b50e869600cf14335fc2c3c40409
-
SHA512
fe44cfe65362ec643541d89e188ee654ad2b998829680c7be517bdae7e0004ad87c34396fde18b0ff8a36bbb4d760735749786aa4efbed59efa5cb04ade60b39
-
SSDEEP
6144:Ife579JffBCAsxiYG/6UqsuMYn4w6Lz3qobmLGesDhHa/R3:tpJNsxpGiUqYYKLz6obm
Malware Config
Extracted
Family
asyncrat
Version
0.5.7B
Botnet
Default
C2
127.0.0.1:81
Mutex
AsyncMutex_6SI8OkPnk
Attributes
-
delay
3
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1460-56-0x0000000000AE0000-0x0000000000AF2000-memory.dmp asyncrat -
Modifies registry class 5 IoCs
Processes:
230269d61ab9fffc9c52a6caeb51378b76c9b50e869600cf14335fc2c3c40409.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\CID\{56004B00-6300-7000-5300-440037002F00} 230269d61ab9fffc9c52a6caeb51378b76c9b50e869600cf14335fc2c3c40409.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\CID\{56004B00-6300-7000-5300-440037002F00}\1 = "8Q0th+9i/0GsFKhwfJPynPTvRKtlyM/Kk2NOlCzjWnqNyJdxuvySnpR30VZb3q0VNILRy4rjGcPJuCb+JuObhgyOrfWiogRFSfjTAQLiy+q7bHwVhgCQIGh93x5LFYLKl3ahURFOL1ivDQEH/soDVzHFSMqYv5TwG/TzN171XjXcoRrdf0dNQYH89XjWM6tc" 230269d61ab9fffc9c52a6caeb51378b76c9b50e869600cf14335fc2c3c40409.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\CID\{2B005300-3900-6100-6700-7A0036006900} 230269d61ab9fffc9c52a6caeb51378b76c9b50e869600cf14335fc2c3c40409.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\CID 230269d61ab9fffc9c52a6caeb51378b76c9b50e869600cf14335fc2c3c40409.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\CID\{2B005300-3900-6100-6700-7A0036006900}\1 = "E5O8RMxnOqZ7p04XBm2vawxLi1zmg9XizCB6moiWD9GeLB2OURMS0NBiQQhvCpGDuj4wFrp23nl4mELgtDmvZk7tBRFbGBzmj6HsBg8BlTIEG76kmp96dHfUt3KYg/IOxX1YuP5ItW99dlW1pkPy6TFwpqYblk6yadw7evjh5abHPh0ZSkddFwkJ+r1frkPxfPxu9W1ggUfZYJX0fiQbs6GriN6irfoX1yYFxIOSM+fOXMzls/i6F8mbn69nTGDKVqJIX0RnMMWo3TUul40KbWUuHmxbVlPtgxxektqOO9Yaciouvt6kwdT0NN/ZxA/F7bsntp+sSFZuqRlLlmgCrz8jFayjc3lkkSZgd4dRrGXruk1S6DNN62/ZX+F6U57zoB4H62uTOEPsS9IV8NdDtySyj+Fp8hrZQhBaGjk9ZPW/v4TCMA1p04//MbuDjdVixQKIbyJUsKVekHpKL/n7Ng==" 230269d61ab9fffc9c52a6caeb51378b76c9b50e869600cf14335fc2c3c40409.exe -
NTFS ADS 6 IoCs
Processes:
230269d61ab9fffc9c52a6caeb51378b76c9b50e869600cf14335fc2c3c40409.exedescription ioc process File created C:\Users\Admin\Documents\My Music:{2B005300-3900-6100-6700-7A0036006900} 230269d61ab9fffc9c52a6caeb51378b76c9b50e869600cf14335fc2c3c40409.exe File created C:\MSOCache:{2B005300-3900-6100-6700-7A0036006900} 230269d61ab9fffc9c52a6caeb51378b76c9b50e869600cf14335fc2c3c40409.exe File created C:\Users\Admin\AppData\Local\Temp:{56004B00-6300-7000-5300-440037002F00} 230269d61ab9fffc9c52a6caeb51378b76c9b50e869600cf14335fc2c3c40409.exe File created C:\Users\Admin\Documents\My Music:{56004B00-6300-7000-5300-440037002F00} 230269d61ab9fffc9c52a6caeb51378b76c9b50e869600cf14335fc2c3c40409.exe File created C:\MSOCache:{56004B00-6300-7000-5300-440037002F00} 230269d61ab9fffc9c52a6caeb51378b76c9b50e869600cf14335fc2c3c40409.exe File created C:\Users\Admin\AppData\Local\Temp:{2B005300-3900-6100-6700-7A0036006900} 230269d61ab9fffc9c52a6caeb51378b76c9b50e869600cf14335fc2c3c40409.exe