Analysis
-
max time kernel
34s -
max time network
41s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25-03-2023 11:52
General
-
Target
BoratRat_Cracked.exe
-
Size
20.0MB
-
MD5
c68cf8d1c438a9c59878deb36d17e197
-
SHA1
fc6158fbab2762f1da42c7a486fd04bd8b547f05
-
SHA256
9e7e71f470c44d253d72a78f1ccdde34b4a0bff6242d86006cd6e364b6bbf79c
-
SHA512
67bad918bf1b4d1d1461ae949c7ef9e953fe447df46e7d32484914ef74cc658d8746b5bb2fb354f8c07fb961d9e4b395e7c2dab4e49e6b26d0af51aad5b27ccf
-
SSDEEP
393216:nm2XTCP+Zw6NLIsFfskh1BmXGnfBd+Ly:nmmTCP+Zlnk0rmkBYLy
Malware Config
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/4720-133-0x0000017AA6380000-0x0000017AA7786000-memory.dmp asyncrat -
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
BoratRat_Cracked.exepid process 4720 BoratRat_Cracked.exe 4720 BoratRat_Cracked.exe 4720 BoratRat_Cracked.exe 4720 BoratRat_Cracked.exe 4720 BoratRat_Cracked.exe 4720 BoratRat_Cracked.exe 4720 BoratRat_Cracked.exe 4720 BoratRat_Cracked.exe 4720 BoratRat_Cracked.exe 4720 BoratRat_Cracked.exe 4720 BoratRat_Cracked.exe 4720 BoratRat_Cracked.exe 4720 BoratRat_Cracked.exe 4720 BoratRat_Cracked.exe 4720 BoratRat_Cracked.exe 4720 BoratRat_Cracked.exe 4720 BoratRat_Cracked.exe 4720 BoratRat_Cracked.exe 4720 BoratRat_Cracked.exe 4720 BoratRat_Cracked.exe 4720 BoratRat_Cracked.exe 4720 BoratRat_Cracked.exe 4720 BoratRat_Cracked.exe 4720 BoratRat_Cracked.exe 4720 BoratRat_Cracked.exe 4720 BoratRat_Cracked.exe 4720 BoratRat_Cracked.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
BoratRat_Cracked.exedescription pid process Token: SeDebugPrivilege 4720 BoratRat_Cracked.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
BoratRat_Cracked.exepid process 4720 BoratRat_Cracked.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
BoratRat_Cracked.exepid process 4720 BoratRat_Cracked.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\BoratRat_Cracked.exe"C:\Users\Admin\AppData\Local\Temp\BoratRat_Cracked.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4720-133-0x0000017AA6380000-0x0000017AA7786000-memory.dmpFilesize
20.0MB
-
memory/4720-134-0x0000017AC1D30000-0x0000017AC1D40000-memory.dmpFilesize
64KB
-
memory/4720-135-0x0000017AC1D30000-0x0000017AC1D40000-memory.dmpFilesize
64KB
-
memory/4720-136-0x0000017AC1D30000-0x0000017AC1D40000-memory.dmpFilesize
64KB