Analysis
-
max time kernel
144s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-01-2023 21:28
Static task
static1
Behavioral task
behavioral1
Sample
7b2a7e95bd6975cbd90ada2a101019c16900d17dae6c0c67c7f745be7db8e521.exe
Resource
win7-20221111-en
windows7-x64
4 signatures
150 seconds
General
-
Target
7b2a7e95bd6975cbd90ada2a101019c16900d17dae6c0c67c7f745be7db8e521.exe
-
Size
394KB
-
MD5
bc8f8c74a40c5147cd7dd2f846714554
-
SHA1
9b7d28cbc9ac820ab30ebe23d908382b8978054c
-
SHA256
7b2a7e95bd6975cbd90ada2a101019c16900d17dae6c0c67c7f745be7db8e521
-
SHA512
b604f491135c4cc31e0a89cd1312355457086fa6831274cf50d70c78a68c79e96058f937c322ddf74bf5fccd8b461bb8cf04e1acab4657b06da5ec6a7e2c3348
-
SSDEEP
6144:lPCJARdjv5mSGaoG/6uWs//z1177twu9vwQgZxm7FvhMoZ:REGiuW6P/KudwQgZxmn
Malware Config
Extracted
Family
asyncrat
Version
0.5.7B
Botnet
Default
C2
127.0.0.1:81
Mutex
AsyncMutex_6SI8OkPnk
Attributes
-
delay
3
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1336-56-0x0000000001E50000-0x0000000001E62000-memory.dmp asyncrat -
Modifies registry class 5 IoCs
Processes:
7b2a7e95bd6975cbd90ada2a101019c16900d17dae6c0c67c7f745be7db8e521.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\CID\{2B005300-3900-6100-6700-7A0036006900} 7b2a7e95bd6975cbd90ada2a101019c16900d17dae6c0c67c7f745be7db8e521.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\CID 7b2a7e95bd6975cbd90ada2a101019c16900d17dae6c0c67c7f745be7db8e521.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\CID\{2B005300-3900-6100-6700-7A0036006900}\1 = "E5O8RMxnOqZ7p04XBm2vawxLi1zmg9XizCB6moiWD9GeLB2OURMS0NBiQQhvCpGDuj4wFrp23nl4mELgtDmvZk7tBRFbGBzmj6HsBg8BlTIEG76kmp96dHfUt3KYg/IOxX1YuP5ItW99dlW1pkPy6TFwpqYblk6yadw7evjh5abHPh0ZSkddFwkJ+r1frkPxJYay56Nke6Y5E1shq/g3tePhVDyfMAezAWbPdxufUYVcwjrPt1kKpZ/njXBkmFwRT5eCrbkDKSEnEWIC7ileeyiWkHQ9Eu1kr7r4zIPFJFU2jBhef//dzAiJMi0KWyICcCsMleRjc+dVWLJZuw5ZqS14pZcbA1bDee7GpA06ZR51h/Tcvgl9blMBjru/b/s0mznJE7QVXO3UtJXxH/4ASWI2+sZud/2IfsYjdS5Y3Cf0GmLa9z6YcKE7ibMK43RBlN3vXzr8DAEAhDbyc+cfYQ==" 7b2a7e95bd6975cbd90ada2a101019c16900d17dae6c0c67c7f745be7db8e521.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\CID\{56004B00-6300-7000-5300-440037002F00} 7b2a7e95bd6975cbd90ada2a101019c16900d17dae6c0c67c7f745be7db8e521.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\CID\{56004B00-6300-7000-5300-440037002F00}\1 = "8Q0th+9i/0GsFKhwfJPynPTvRKtlyM/Kk2NOlCzjWnqNyJdxuvySnpR30VZb3q0VNILRy4rjGcPJuCb+JuObhgyOrfWiogRFSfjTAQLiy+q7bHwVhgCQIGh93x5LFYLKl3ahURFOL1ivDQEH/soDVzHFSMqYv5TwG/TzN171XjXcoRrdf0dNQYH89XjWM6tc" 7b2a7e95bd6975cbd90ada2a101019c16900d17dae6c0c67c7f745be7db8e521.exe -
NTFS ADS 6 IoCs
Processes:
7b2a7e95bd6975cbd90ada2a101019c16900d17dae6c0c67c7f745be7db8e521.exedescription ioc process File created C:\MSOCache:{56004B00-6300-7000-5300-440037002F00} 7b2a7e95bd6975cbd90ada2a101019c16900d17dae6c0c67c7f745be7db8e521.exe File created C:\Users\Admin\AppData\Local\Temp:{2B005300-3900-6100-6700-7A0036006900} 7b2a7e95bd6975cbd90ada2a101019c16900d17dae6c0c67c7f745be7db8e521.exe File created C:\Users\Admin\Documents\My Music:{2B005300-3900-6100-6700-7A0036006900} 7b2a7e95bd6975cbd90ada2a101019c16900d17dae6c0c67c7f745be7db8e521.exe File created C:\MSOCache:{2B005300-3900-6100-6700-7A0036006900} 7b2a7e95bd6975cbd90ada2a101019c16900d17dae6c0c67c7f745be7db8e521.exe File created C:\Users\Admin\AppData\Local\Temp:{56004B00-6300-7000-5300-440037002F00} 7b2a7e95bd6975cbd90ada2a101019c16900d17dae6c0c67c7f745be7db8e521.exe File created C:\Users\Admin\Documents\My Music:{56004B00-6300-7000-5300-440037002F00} 7b2a7e95bd6975cbd90ada2a101019c16900d17dae6c0c67c7f745be7db8e521.exe