Overview
overview
10Static
static
79e98c04e77...21d.js
windows7-x64
109e98c04e77...21d.js
windows10-2004-x64
10c72d738747...8bf.js
windows7-x64
10c72d738747...8bf.js
windows10-2004-x64
10cc03a8f943...70.exe
windows7-x64
10cc03a8f943...70.exe
windows10-2004-x64
1eb6af295c3...cb.exe
windows7-x64
7eb6af295c3...cb.exe
windows10-2004-x64
7Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
25-03-2023 09:17
Behavioral task
behavioral1
Sample
9e98c04e777e77b1498f4b3447b6221d.js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
9e98c04e777e77b1498f4b3447b6221d.js
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
c72d738747f68d4f8d9e9368e47928bf.js
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
c72d738747f68d4f8d9e9368e47928bf.js
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
cc03a8f9433b57e4ea8a87544dde5470.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
cc03a8f9433b57e4ea8a87544dde5470.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
eb6af295c348f16f2361cbe96fdc3bcb.exe
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
eb6af295c348f16f2361cbe96fdc3bcb.exe
Resource
win10v2004-20230220-en
General
-
Target
cc03a8f9433b57e4ea8a87544dde5470.exe
-
Size
35KB
-
MD5
cc03a8f9433b57e4ea8a87544dde5470
-
SHA1
d44e2e33aa3f7780db64ece0483958b87b063a75
-
SHA256
8688a4bb898f17009992f83072b5c5a3a60e9e552a95002470e1c2f885563fbd
-
SHA512
50ac102923a0eb17f27c24ca1528fd03258eef549448bfe6e4b7d91c57a2e0a2b4c8eb2a7018afca875f547b9d12c2d5e046755edef55301be9dcd6632d5fdce
-
SSDEEP
768:tTRSgQ0ZZeIYVudX6nHs+Y5nXq0AZ7yx6tWLrx7GR4:t1peKT5Xq0s6GWLr9q4
Malware Config
Extracted
asyncrat
1.0.7
Default
120.78.151.171:6658
bbbanchun
-
delay
10
-
install
false
-
install_file
flash.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral5/memory/1336-58-0x0000000000A10000-0x0000000000A26000-memory.dmp asyncrat -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1336 cc03a8f9433b57e4ea8a87544dde5470.exe Token: SeDebugPrivilege 1336 cc03a8f9433b57e4ea8a87544dde5470.exe