Analysis
-
max time kernel
146s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-01-2023 21:28
Static task
static1
Behavioral task
behavioral1
Sample
8d4aa22f4953a04858520fe6d052ab5c4a8c028f132ea0e8784ae10623eb9dab.exe
Resource
win7-20220812-en
windows7-x64
4 signatures
150 seconds
General
-
Target
8d4aa22f4953a04858520fe6d052ab5c4a8c028f132ea0e8784ae10623eb9dab.exe
-
Size
395KB
-
MD5
780ec342413f191aa74a1334674ca29e
-
SHA1
535f84f49baa7762bc09d22dc67023b3d5e4a774
-
SHA256
8d4aa22f4953a04858520fe6d052ab5c4a8c028f132ea0e8784ae10623eb9dab
-
SHA512
0bba4cea4b647051894a8fb5c733b07db8c2db60a5d999f78efb07c42008c709546ef9cd55e2579f819b0f87bc586272ccdbc6d7c42fc51577686b5a37963df6
-
SSDEEP
6144:yZ/St46RKMNMRbyesagl3lG/6zos+BLWLI7hkYq3FOWajiQU0wet7oWg7Jsbs:S74aM1GizoyLqkH3FmjiR+9g7JOs
Malware Config
Extracted
Family
asyncrat
Version
0.5.7B
Botnet
Default
C2
127.0.0.1:81
Mutex
AsyncMutex_6SI8OkPnk
Attributes
-
delay
3
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/536-56-0x0000000000750000-0x0000000000762000-memory.dmp asyncrat -
Modifies registry class 5 IoCs
Processes:
8d4aa22f4953a04858520fe6d052ab5c4a8c028f132ea0e8784ae10623eb9dab.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\CID\{56004B00-6300-7000-5300-440037002F00}\1 = "8Q0th+9i/0GsFKhwfJPynPTvRKtlyM/Kk2NOlCzjWnqNyJdxuvySnpR30VZb3q0VNILRy4rjGcPJuCb+JuObhgyOrfWiogRFSfjTAQLiy+q7bHwVhgCQIGh93x5LFYLKl3ahURFOL1ivDQEH/soDVzHFSMqYv5TwG/TzN171XjXcoRrdf0dNQYH89XjWM6tc" 8d4aa22f4953a04858520fe6d052ab5c4a8c028f132ea0e8784ae10623eb9dab.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\CID\{2B005300-3900-6100-6700-7A0036006900} 8d4aa22f4953a04858520fe6d052ab5c4a8c028f132ea0e8784ae10623eb9dab.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\CID 8d4aa22f4953a04858520fe6d052ab5c4a8c028f132ea0e8784ae10623eb9dab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\CID\{2B005300-3900-6100-6700-7A0036006900}\1 = "E5O8RMxnOqZ7p04XBm2vawxLi1zmg9XizCB6moiWD9GeLB2OURMS0NBiQQhvCpGDuj4wFrp23nl4mELgtDmvZk7tBRFbGBzmj6HsBg8BlTIEG76kmp96dHfUt3KYg/IOxX1YuP5ItW99dlW1pkPy6TFwpqYblk6yadw7evjh5abHPh0ZSkddFwkJ+r1frkPxZPXyeAsVsK4t3a7yAoCnIP7XWLcw5qMz2jccxMa9HMOp8O/Zc3ujmxfdHdcuGtVV0qMq51SD5WPjlSW7duC1ghGfaHwCc+kdPgoXmsXUshS/OLSEtMpHI19YoWQrUHzQj+pmMHqFCijaztZlfxIKX+FAouQbjGY3RcJPlaY6tILfKATCamD0vtUsJXScM6iRWAuH2qq/rEXFDxzJ7TK85u4fHb2x7l6x6cFuT5d/wGYJW8a07vlEw8z02hULGrEKhaYSKvbkfeXJPmHA2ePmCQ==" 8d4aa22f4953a04858520fe6d052ab5c4a8c028f132ea0e8784ae10623eb9dab.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\CID\{56004B00-6300-7000-5300-440037002F00} 8d4aa22f4953a04858520fe6d052ab5c4a8c028f132ea0e8784ae10623eb9dab.exe -
NTFS ADS 6 IoCs
Processes:
8d4aa22f4953a04858520fe6d052ab5c4a8c028f132ea0e8784ae10623eb9dab.exedescription ioc process File created C:\Users\Admin\Documents\My Music:{56004B00-6300-7000-5300-440037002F00} 8d4aa22f4953a04858520fe6d052ab5c4a8c028f132ea0e8784ae10623eb9dab.exe File created C:\MSOCache:{56004B00-6300-7000-5300-440037002F00} 8d4aa22f4953a04858520fe6d052ab5c4a8c028f132ea0e8784ae10623eb9dab.exe File created C:\Users\Admin\AppData\Local\Temp:{2B005300-3900-6100-6700-7A0036006900} 8d4aa22f4953a04858520fe6d052ab5c4a8c028f132ea0e8784ae10623eb9dab.exe File created C:\Users\Admin\Documents\My Music:{2B005300-3900-6100-6700-7A0036006900} 8d4aa22f4953a04858520fe6d052ab5c4a8c028f132ea0e8784ae10623eb9dab.exe File created C:\MSOCache:{2B005300-3900-6100-6700-7A0036006900} 8d4aa22f4953a04858520fe6d052ab5c4a8c028f132ea0e8784ae10623eb9dab.exe File created C:\Users\Admin\AppData\Local\Temp:{56004B00-6300-7000-5300-440037002F00} 8d4aa22f4953a04858520fe6d052ab5c4a8c028f132ea0e8784ae10623eb9dab.exe