Analysis
-
max time kernel
117s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2023, 18:44
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
19b1dc02146d5358c01094863b9e1c39.exe
Resource
win7-20230220-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
19b1dc02146d5358c01094863b9e1c39.exe
Resource
win10v2004-20230220-en
8 signatures
150 seconds
General
-
Target
19b1dc02146d5358c01094863b9e1c39.exe
-
Size
584KB
-
MD5
19b1dc02146d5358c01094863b9e1c39
-
SHA1
dafb8945aa60b3e609ee0eb55793a1ac46c51d24
-
SHA256
682a3a8e439b5c9d4f563eab109fb26bbeec146a5e2ed94956b8609fe8b7fd91
-
SHA512
7521d7f7259bc82fedd5af3aebf5ee57d28719d7b89d095c12333492eb229847f16e13d06032a072c763eaf0d32c9b444be5c79af78e3a3cc45e91d48ccf3cdf
-
SSDEEP
12288:6byb2Zi0Uyz4DNsiV5P9dQfObqPpQYUcx08BBq:6ut04NsiVRPQfObqR7vx9Bq
Score
10/10
Malware Config
Extracted
Family
asyncrat
Version
1.0.7
Botnet
Loads
C2
84.54.50.51:8848
Mutex
DcRatMutex_qwqdanchun
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/memory/3568-141-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows\CurrentVersion\Run 19b1dc02146d5358c01094863b9e1c39.exe Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysWOW = "C:\\Users\\Admin\\AppData\\Roaming\\SysWOW\\SysWOW64.exe.exe" 19b1dc02146d5358c01094863b9e1c39.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3660 set thread context of 3568 3660 19b1dc02146d5358c01094863b9e1c39.exe 85 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3568 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3660 19b1dc02146d5358c01094863b9e1c39.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3660 wrote to memory of 2544 3660 19b1dc02146d5358c01094863b9e1c39.exe 84 PID 3660 wrote to memory of 2544 3660 19b1dc02146d5358c01094863b9e1c39.exe 84 PID 3660 wrote to memory of 2544 3660 19b1dc02146d5358c01094863b9e1c39.exe 84 PID 3660 wrote to memory of 3568 3660 19b1dc02146d5358c01094863b9e1c39.exe 85 PID 3660 wrote to memory of 3568 3660 19b1dc02146d5358c01094863b9e1c39.exe 85 PID 3660 wrote to memory of 3568 3660 19b1dc02146d5358c01094863b9e1c39.exe 85 PID 3660 wrote to memory of 3568 3660 19b1dc02146d5358c01094863b9e1c39.exe 85 PID 3660 wrote to memory of 3568 3660 19b1dc02146d5358c01094863b9e1c39.exe 85 PID 3660 wrote to memory of 3568 3660 19b1dc02146d5358c01094863b9e1c39.exe 85 PID 3660 wrote to memory of 3568 3660 19b1dc02146d5358c01094863b9e1c39.exe 85 PID 3660 wrote to memory of 3568 3660 19b1dc02146d5358c01094863b9e1c39.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\19b1dc02146d5358c01094863b9e1c39.exe"C:\Users\Admin\AppData\Local\Temp\19b1dc02146d5358c01094863b9e1c39.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2544
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3568
-