Analysis
-
max time kernel
96s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
26-04-2023 20:21
Behavioral task
behavioral1
Sample
swoof swoof.exe
Resource
win7-20230220-en
windows7-x64
2 signatures
150 seconds
General
-
Target
swoof swoof.exe
-
Size
47KB
-
MD5
30bc03b0beddefb0f387e85f7b22bac4
-
SHA1
5d4284b80a96f290f5ab77023e824c2cac05e1a5
-
SHA256
74f3e08db818c32c24b4cec7a16122007ebadf9dcf822fc5c1f4f8491a687807
-
SHA512
6eb8fed063afcdbd89735ad1e272412891e56f160e9bc641b47434aba801d2a88345a48c19fff640c98ba041be7d1440062a13746c5328d8e003105d1336b03d
-
SSDEEP
768:IbERqILEWgg+jiwjG/Diln8Ybmgd+oZvEgK/JjZVc6KN:kEgIwjG/Kzb51ZnkJjZVclN
Malware Config
Extracted
Family
asyncrat
Version
1.0.7
Botnet
Default
C2
127.0.0.1:8848
Mutex
DcRatMutex_qwqdanchun
Attributes
-
delay
1
-
install
true
-
install_file
run.exe
-
install_folder
%Temp%
aes.plain
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/memory/5056-133-0x0000000000F10000-0x0000000000F22000-memory.dmp asyncrat -
Program crash 1 IoCs
pid pid_target Process procid_target 4588 5056 WerFault.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\swoof swoof.exe"C:\Users\Admin\AppData\Local\Temp\swoof swoof.exe"1⤵PID:5056
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5056 -s 10882⤵
- Program crash
PID:4588
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 440 -p 5056 -ip 50561⤵PID:3660