Analysis Overview
SHA256
71f3d216164b0aea1f79a3dd85f54110811c6daa23a05d3e2b9559f660ffffd0
Threat Level: Known bad
The file s1 was found to be: Known bad.
Malicious Activity Summary
AsyncRat
Async RAT payload
Reads user/profile data of web browsers
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2023-03-16 11:29
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2023-03-16 11:29
Reported
2023-03-16 11:31
Platform
win7-20230220-en
Max time kernel
28s
Max time network
151s
Command Line
Signatures
AsyncRat
Async RAT payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Reads user/profile data of web browsers
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\s1.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\s1.exe
"C:\Users\Admin\AppData\Local\Temp\s1.exe"
Network
| Country | Destination | Domain | Proto |
| US | 209.145.56.157:6606 | tcp | |
| US | 209.145.56.157:6606 | tcp |
Files
memory/1944-54-0x0000000001E00000-0x0000000001E16000-memory.dmp
memory/1944-55-0x0000000027FA0000-0x0000000027FB2000-memory.dmp
memory/1944-56-0x0000000041680000-0x0000000041700000-memory.dmp
memory/1944-57-0x0000000041680000-0x0000000041700000-memory.dmp
memory/1944-75-0x00000000430D0000-0x000000004314E000-memory.dmp
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
| MD5 | e71c8443ae0bc2e282c73faead0a6dd3 |
| SHA1 | 0c110c1b01e68edfacaeae64781a37b1995fa94b |
| SHA256 | 95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72 |
| SHA512 | b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6 |
C:\Users\Admin\AppData\Local\Temp\Tar3BC1.tmp
| MD5 | be2bec6e8c5653136d3e72fe53c98aa3 |
| SHA1 | a8182d6db17c14671c3d5766c72e58d87c0810de |
| SHA256 | 1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd |
| SHA512 | 0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff |
memory/1944-96-0x00000000415C0000-0x00000000415CA000-memory.dmp
memory/1944-97-0x0000000043150000-0x00000000431B0000-memory.dmp
memory/1944-98-0x00000000431B0000-0x0000000043240000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2023-03-16 11:29
Reported
2023-03-16 11:31
Platform
win10v2004-20230220-en
Max time kernel
135s
Max time network
153s
Command Line
Signatures
Processes
C:\Users\Admin\AppData\Local\Temp\s1.exe
"C:\Users\Admin\AppData\Local\Temp\s1.exe"
Network
| Country | Destination | Domain | Proto |
| NL | 84.53.175.11:80 | tcp | |
| NL | 84.53.175.11:80 | tcp | |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 4.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 210.81.184.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 76.38.195.152.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 196.249.167.52.in-addr.arpa | udp |
| US | 52.152.110.14:443 | tcp | |
| US | 52.152.110.14:443 | tcp | |
| NL | 173.223.113.164:443 | tcp | |
| US | 8.8.8.8:53 | 86.8.109.52.in-addr.arpa | udp |
| US | 209.197.3.8:80 | tcp | |
| US | 209.197.3.8:80 | tcp | |
| US | 93.184.220.29:80 | tcp | |
| US | 204.79.197.203:80 | tcp | |
| US | 52.152.110.14:443 | tcp | |
| NL | 173.223.113.131:80 | tcp | |
| US | 204.79.197.203:80 | tcp | |
| US | 8.8.8.8:53 | 135.106.31.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 97.238.32.23.in-addr.arpa | udp |
| US | 52.152.110.14:443 | tcp | |
| US | 52.152.110.14:443 | tcp | |
| US | 52.152.110.14:443 | tcp |
Files
memory/2972-133-0x000002BAD74A0000-0x000002BAD74B6000-memory.dmp