Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03-02-2023 18:08
Behavioral task
behavioral1
Sample
bJyw.exe
Resource
win7-20220901-en
windows7-x64
4 signatures
150 seconds
General
-
Target
bJyw.exe
-
Size
47KB
-
MD5
932283bf61964cc15f22308ae3a9d013
-
SHA1
15ab81a2bd7d6a430e89aa34c2d4f04b8cc83e8d
-
SHA256
e8967e7e29637e86409f73b31e2e775bde676b25ae6b121380a1b95a48fd3195
-
SHA512
2e9d59abf78074e884fa1be009e2a40ebeaf913dec6c179b6280395d4983840d358e4ee6d4aff54ccf923ca7d6d17c30bbecb439a50df7e1424f66b5ec19f8bf
-
SSDEEP
768:p96mxUTILWCaS+DiMtelDSN+iV08Ybygee9OMHHZ1CvEgK/JnZVc6KN:p96AKWMtKDs4zb1hOWHvCnkJnZVclN
Malware Config
Extracted
Family
asyncrat
Version
1.0.7
Botnet
Default
Mutex
hAtBdUenfThOelUfgThs
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/FcHGaN0M
aes.plain
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1188-54-0x0000000000190000-0x00000000001A2000-memory.dmp asyncrat -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
bJyw.exedescription pid process Token: SeDebugPrivilege 1188 bJyw.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1188-54-0x0000000000190000-0x00000000001A2000-memory.dmpFilesize
72KB