Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
04/05/2023, 01:08
Static task
static1
Behavioral task
behavioral1
Sample
RFQ#0003725812.pdf.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
RFQ#0003725812.pdf.exe
Resource
win10v2004-20230221-en
General
-
Target
RFQ#0003725812.pdf.exe
-
Size
969KB
-
MD5
d7a342009bfd76a907b3f2baf9acb1d8
-
SHA1
4a909029a5f6fce74e7ae0c11897d44658027e34
-
SHA256
c72e8271a4eb3c18cd2f83c50acd4d1b77f162be15b2011aa384eab178a7d51d
-
SHA512
ee73044eead64b4c1231b246d432a134f6b64399ea82f4e3f4bf5a8c80f606354e239f696d3a12a7a3493e2aec0afe2301dbb9c1bc0f1ad613425ee5a1c9b30d
-
SSDEEP
12288:b4mT/RcXtvyJdBQhXVQp/Dv4alfZqby13caYgd2DFW9Xmmd:b4C/6XtvWBmQp/T4gcaYgdGWB3d
Malware Config
Extracted
asyncrat
0.5.7B
Default
95.214.27.226:6606
95.214.27.226:7707
95.214.27.226:8808
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 2 IoCs
resource yara_rule behavioral1/memory/1980-55-0x0000000027F20000-0x0000000027F32000-memory.dmp asyncrat behavioral1/memory/1980-56-0x0000000041460000-0x00000000414E0000-memory.dmp asyncrat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1980 RFQ#0003725812.pdf.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD5b5fcc55cffd66f38d548e8b63206c5e6
SHA179db08ababfa33a4f644fa8fe337195b5aba44c7
SHA2567730df1165195dd5bb6b40d6e519b4ce07aceb03601a77bca6535d31698d4ca1
SHA512aaa17175e90dbca04f0fa753084731313e70119fef7d408b41ff4170116ab24eaee0bd05dca2cc43464b1ee920819e5ce6f6e750d97e3c4fc605f01e7ff9c649