Analysis
-
max time kernel
148s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-01-2023 21:29
Static task
static1
Behavioral task
behavioral1
Sample
12c8d90de14cf20a4a82f02be8756e342c269461b53b32892c1f9bc662885474.exe
Resource
win7-20220812-en
windows7-x64
4 signatures
150 seconds
General
-
Target
12c8d90de14cf20a4a82f02be8756e342c269461b53b32892c1f9bc662885474.exe
-
Size
392KB
-
MD5
cc1f6560f58ca3fac7c3a2dc51ef8878
-
SHA1
938281bebd33245312e6c264fdf73374ed3bd1d5
-
SHA256
12c8d90de14cf20a4a82f02be8756e342c269461b53b32892c1f9bc662885474
-
SHA512
0dcd3f26ec3e69977555acd7f22feb632ece792a778c54d839c212cc9a152f039144b435ec44542f286a6b6b96e802552b3df79095bfc38f2fc70cdad270a86a
-
SSDEEP
6144:Lt/3d3mlYM4Ac0knk3RnhkG/c+s+9hTNKVDvVNm702km1dhtt:X0YMBkn4RnhkGU+ThKBPs02kmdp
Malware Config
Extracted
Family
asyncrat
Version
0.5.7B
Botnet
Default
C2
127.0.0.1:81
Mutex
AsyncMutex_6SI8OkPnk
Attributes
-
delay
3
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1684-56-0x00000000004A0000-0x00000000004B2000-memory.dmp asyncrat -
Modifies registry class 5 IoCs
Processes:
12c8d90de14cf20a4a82f02be8756e342c269461b53b32892c1f9bc662885474.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\CID 12c8d90de14cf20a4a82f02be8756e342c269461b53b32892c1f9bc662885474.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\CID\{2B005300-3900-6100-6700-7A0036006900}\1 = "E5O8RMxnOqZ7p04XBm2vawxLi1zmg9XizCB6moiWD9GeLB2OURMS0NBiQQhvCpGDuj4wFrp23nl4mELgtDmvZk7tBRFbGBzmj6HsBg8BlTIEG76kmp96dHfUt3KYg/IOxX1YuP5ItW99dlW1pkPy6TFwpqYblk6yadw7evjh5abHPh0ZSkddFwkJ+r1frkPx73mGcSTNh3bYBcoJhcZlC3terhk9R6j0/1OAkB/DO+Z7FCR7IN5n+QkDd6iiOwxrhsLDF26XFeANvRSUF/UJMTOAvZqWknFnXVolIA6qdF8oSndBNqJ+Zk7S9gEB8tKx6WRfR+rfN4me2WhDs/wV+uC6qHLl5j1O+UjejMwfNkIIiKfteWARnAo0P9nD5vIwawndD97ED83EhJpOmsXbT4rDDUnHKiop44QZyVf4eTKr1k7+9MMlP0dgmi2ln6N3oHJcAkPl4SjHvf65/WseTQ==" 12c8d90de14cf20a4a82f02be8756e342c269461b53b32892c1f9bc662885474.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\CID\{56004B00-6300-7000-5300-440037002F00} 12c8d90de14cf20a4a82f02be8756e342c269461b53b32892c1f9bc662885474.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\CID\{56004B00-6300-7000-5300-440037002F00}\1 = "8Q0th+9i/0GsFKhwfJPynPTvRKtlyM/Kk2NOlCzjWnqNyJdxuvySnpR30VZb3q0VNILRy4rjGcPJuCb+JuObhgyOrfWiogRFSfjTAQLiy+q7bHwVhgCQIGh93x5LFYLKl3ahURFOL1ivDQEH/soDVzHFSMqYv5TwG/TzN171XjXcoRrdf0dNQYH89XjWM6tc" 12c8d90de14cf20a4a82f02be8756e342c269461b53b32892c1f9bc662885474.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\CID\{2B005300-3900-6100-6700-7A0036006900} 12c8d90de14cf20a4a82f02be8756e342c269461b53b32892c1f9bc662885474.exe -
NTFS ADS 6 IoCs
Processes:
12c8d90de14cf20a4a82f02be8756e342c269461b53b32892c1f9bc662885474.exedescription ioc process File created C:\Users\Admin\AppData\Local\Temp:{2B005300-3900-6100-6700-7A0036006900} 12c8d90de14cf20a4a82f02be8756e342c269461b53b32892c1f9bc662885474.exe File created C:\Users\Admin\Documents\My Music:{2B005300-3900-6100-6700-7A0036006900} 12c8d90de14cf20a4a82f02be8756e342c269461b53b32892c1f9bc662885474.exe File created C:\MSOCache:{2B005300-3900-6100-6700-7A0036006900} 12c8d90de14cf20a4a82f02be8756e342c269461b53b32892c1f9bc662885474.exe File created C:\Users\Admin\AppData\Local\Temp:{56004B00-6300-7000-5300-440037002F00} 12c8d90de14cf20a4a82f02be8756e342c269461b53b32892c1f9bc662885474.exe File created C:\Users\Admin\Documents\My Music:{56004B00-6300-7000-5300-440037002F00} 12c8d90de14cf20a4a82f02be8756e342c269461b53b32892c1f9bc662885474.exe File created C:\MSOCache:{56004B00-6300-7000-5300-440037002F00} 12c8d90de14cf20a4a82f02be8756e342c269461b53b32892c1f9bc662885474.exe