Analysis
-
max time kernel
91s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03-02-2023 16:08
Behavioral task
behavioral1
Sample
bJyz.exe
Resource
win7-20220812-en
General
-
Target
bJyz.exe
-
Size
47KB
-
MD5
90631c5269980f1ea596b3c76974d262
-
SHA1
889a1edb9b462ed0d3a5cc8ecf0427696d6095c5
-
SHA256
c40f3216652866e041fd154c38dab5f443f65da7e995e45ce473bf2662e2f7e4
-
SHA512
c129df24c9302a9c0cae09cbe1a5c9efca3848719cc80e1801cf8ccdac9d1a714c03cb590446394e2e14ba16dc8bb8e7e6c1ae1110271dcf0896e08634cbb9cd
-
SSDEEP
768:dOEuILWCKi+DiBtelDSN+iV08YbygemmbbeUZvEgK/J9lZVc6KN:dOtmBtKDs4zb1CbeMnkJ3ZVclN
Malware Config
Extracted
asyncrat
1.0.7
Default
20.197.196.201:7749
hAtBdUenfThOelUfgThs
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3684-132-0x0000000000EC0000-0x0000000000ED2000-memory.dmp asyncrat -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1468 timeout.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
bJyz.exedescription pid process Token: SeDebugPrivilege 3684 bJyz.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
bJyz.execmd.exedescription pid process target process PID 3684 wrote to memory of 2948 3684 bJyz.exe cmd.exe PID 3684 wrote to memory of 2948 3684 bJyz.exe cmd.exe PID 2948 wrote to memory of 1468 2948 cmd.exe timeout.exe PID 2948 wrote to memory of 1468 2948 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bJyz.exe"C:\Users\Admin\AppData\Local\Temp\bJyz.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp85BA.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp85BA.tmp.batFilesize
156B
MD5c00db9a67dcbe876ea655d9d00444097
SHA19218cf4d66cce9ba05d5916420dcf2c44851465a
SHA256baa19fc49e7e382301fabbd0aa7cd6ce9ee5e5aa19b75779c6849674fc6b5022
SHA512f51ea2b71680cad3c2a2c398874f72d3da8946a195164534c46af266d44430df32a33c7f6068f977296f481efb3bab936faa8828d35ce3020a62d0da54e06802
-
memory/1468-139-0x0000000000000000-mapping.dmp
-
memory/2948-137-0x0000000000000000-mapping.dmp
-
memory/3684-132-0x0000000000EC0000-0x0000000000ED2000-memory.dmpFilesize
72KB
-
memory/3684-133-0x00007FFCFF2D0000-0x00007FFCFFD91000-memory.dmpFilesize
10.8MB
-
memory/3684-134-0x00007FFCFF2D0000-0x00007FFCFFD91000-memory.dmpFilesize
10.8MB
-
memory/3684-135-0x000000001E4F0000-0x000000001E566000-memory.dmpFilesize
472KB
-
memory/3684-136-0x000000001E4D0000-0x000000001E4EE000-memory.dmpFilesize
120KB
-
memory/3684-140-0x00007FFCFF2D0000-0x00007FFCFFD91000-memory.dmpFilesize
10.8MB