Analysis
-
max time kernel
82s -
max time network
85s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-02-2023 16:08
Behavioral task
behavioral1
Sample
bJyz.exe
Resource
win7-20220812-en
General
-
Target
bJyz.exe
-
Size
47KB
-
MD5
90631c5269980f1ea596b3c76974d262
-
SHA1
889a1edb9b462ed0d3a5cc8ecf0427696d6095c5
-
SHA256
c40f3216652866e041fd154c38dab5f443f65da7e995e45ce473bf2662e2f7e4
-
SHA512
c129df24c9302a9c0cae09cbe1a5c9efca3848719cc80e1801cf8ccdac9d1a714c03cb590446394e2e14ba16dc8bb8e7e6c1ae1110271dcf0896e08634cbb9cd
-
SSDEEP
768:dOEuILWCKi+DiBtelDSN+iV08YbygemmbbeUZvEgK/J9lZVc6KN:dOtmBtKDs4zb1CbeMnkJ3ZVclN
Malware Config
Extracted
asyncrat
1.0.7
Default
20.197.196.201:7749
hAtBdUenfThOelUfgThs
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1832-54-0x0000000001090000-0x00000000010A2000-memory.dmp asyncrat behavioral1/memory/1832-55-0x0000000000EE0000-0x0000000000F44000-memory.dmp asyncrat -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1488 cmd.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1628 timeout.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
bJyz.exedescription pid process Token: SeDebugPrivilege 1832 bJyz.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
bJyz.execmd.exedescription pid process target process PID 1832 wrote to memory of 1488 1832 bJyz.exe cmd.exe PID 1832 wrote to memory of 1488 1832 bJyz.exe cmd.exe PID 1832 wrote to memory of 1488 1832 bJyz.exe cmd.exe PID 1488 wrote to memory of 1628 1488 cmd.exe timeout.exe PID 1488 wrote to memory of 1628 1488 cmd.exe timeout.exe PID 1488 wrote to memory of 1628 1488 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bJyz.exe"C:\Users\Admin\AppData\Local\Temp\bJyz.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp3A4B.tmp.bat""2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp3A4B.tmp.batFilesize
156B
MD5dae6d2c237560b15611e5220dafa2043
SHA19e54898f88713dacf6883d6bfa66484e77940663
SHA256c597bc3e4f14e85cd5ec999ffbac5355977deada50eee9e25325b76d271f6dfb
SHA512af7de93b7932af6ae532658ac5fa02947cbdb09ada976846dd99bf52dbf096d807fddff0ed231386868854109958cc272151f1a42cd0b0b4b847b2ce6ac8f8fc
-
memory/1488-56-0x0000000000000000-mapping.dmp
-
memory/1628-58-0x0000000000000000-mapping.dmp
-
memory/1832-54-0x0000000001090000-0x00000000010A2000-memory.dmpFilesize
72KB
-
memory/1832-55-0x0000000000EE0000-0x0000000000F44000-memory.dmpFilesize
400KB