Analysis
-
max time kernel
80s -
max time network
82s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
14/06/2023, 20:52
Behavioral task
behavioral1
Sample
xPo8U6ZjwEaV.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
xPo8U6ZjwEaV.exe
Resource
win10v2004-20230220-en
General
-
Target
xPo8U6ZjwEaV.exe
-
Size
47KB
-
MD5
1d04efd3c005feba5161fd2ddd8d7194
-
SHA1
da4d6966afc58bd5b4f0e76b3af422f1b0235fce
-
SHA256
aa44b193e2eb0046c55dc1a78fed298c361f06835256504ff42db39c5692df10
-
SHA512
21d82980eb1a51e8cafe6062b2f51636c3dece8a1a67a1b9c22eb9311c39b02931162aea19269c864c638211421614116cd9db7790fc1621d5d1ecb3e4bae774
-
SSDEEP
768:V9umxLiIL1CaS+DiNzTlD0yO5iBBYbugeVFybEvEgK/JzZVc6KN:V9uAPWNzTlwyOgybRmybEnkJzZVclN
Malware Config
Extracted
asyncrat
1.0.7
15JUNIO-RODA
hjgeuyiohfkjsdfhgiwe.duckdns.org:2525
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 3 IoCs
resource yara_rule behavioral1/memory/1400-54-0x0000000000B20000-0x0000000000B32000-memory.dmp asyncrat behavioral1/memory/1400-74-0x00000000004D0000-0x0000000000534000-memory.dmp asyncrat behavioral1/memory/1400-76-0x000000001A7A0000-0x000000001A804000-memory.dmp asyncrat -
Deletes itself 1 IoCs
pid Process 1612 cmd.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 860 timeout.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1400 xPo8U6ZjwEaV.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1400 wrote to memory of 1612 1400 xPo8U6ZjwEaV.exe 29 PID 1400 wrote to memory of 1612 1400 xPo8U6ZjwEaV.exe 29 PID 1400 wrote to memory of 1612 1400 xPo8U6ZjwEaV.exe 29 PID 1612 wrote to memory of 860 1612 cmd.exe 31 PID 1612 wrote to memory of 860 1612 cmd.exe 31 PID 1612 wrote to memory of 860 1612 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\xPo8U6ZjwEaV.exe"C:\Users\Admin\AppData\Local\Temp\xPo8U6ZjwEaV.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp30AB.tmp.bat""2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:860
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
164B
MD58cd0d528199a2e8fd6a3b09edc4dd65e
SHA1f864f47b9f80a04d28a1c1a78e8866a1dcdb6167
SHA256b9d1004206d88ae8e64873abb620057435e2508cdc8d3682fce0c1766fb7ed53
SHA512e4b9ad012e21096543ca6543991bb0bb9d690983a8200c47279c2329d1a946e804ac7392d5b057134902adac1482958e6fa1c59cf06d180c9ceaa95b8feb9963
-
Filesize
164B
MD58cd0d528199a2e8fd6a3b09edc4dd65e
SHA1f864f47b9f80a04d28a1c1a78e8866a1dcdb6167
SHA256b9d1004206d88ae8e64873abb620057435e2508cdc8d3682fce0c1766fb7ed53
SHA512e4b9ad012e21096543ca6543991bb0bb9d690983a8200c47279c2329d1a946e804ac7392d5b057134902adac1482958e6fa1c59cf06d180c9ceaa95b8feb9963