Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-02-2023 18:08

General

  • Target

    bJyw.exe

  • Size

    47KB

  • MD5

    932283bf61964cc15f22308ae3a9d013

  • SHA1

    15ab81a2bd7d6a430e89aa34c2d4f04b8cc83e8d

  • SHA256

    e8967e7e29637e86409f73b31e2e775bde676b25ae6b121380a1b95a48fd3195

  • SHA512

    2e9d59abf78074e884fa1be009e2a40ebeaf913dec6c179b6280395d4983840d358e4ee6d4aff54ccf923ca7d6d17c30bbecb439a50df7e1424f66b5ec19f8bf

  • SSDEEP

    768:p96mxUTILWCaS+DiMtelDSN+iV08Ybygee9OMHHZ1CvEgK/JnZVc6KN:p96AKWMtKDs4zb1hOWHvCnkJnZVclN

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

Mutex

hAtBdUenfThOelUfgThs

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    https://pastebin.com/raw/FcHGaN0M

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Async RAT payload 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bJyw.exe
    "C:\Users\Admin\AppData\Local\Temp\bJyw.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4644

Network

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4644-132-0x0000000000A90000-0x0000000000AA2000-memory.dmp
    Filesize

    72KB

  • memory/4644-133-0x00007FFD9D490000-0x00007FFD9DF51000-memory.dmp
    Filesize

    10.8MB

  • memory/4644-134-0x00007FFD9D490000-0x00007FFD9DF51000-memory.dmp
    Filesize

    10.8MB