Analysis
-
max time kernel
144s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
09-08-2023 18:05
Behavioral task
behavioral1
Sample
3500d4b2b971499632cf0a306f266cfd.exe
Resource
win7-20230712-en
windows7-x64
3 signatures
150 seconds
General
-
Target
3500d4b2b971499632cf0a306f266cfd.exe
-
Size
63KB
-
MD5
3500d4b2b971499632cf0a306f266cfd
-
SHA1
fccd254666c5f3d45d905b81d466d133753a6477
-
SHA256
d674779e87fc5ee336f74f85a0fab74a06c74cf7e95af033700e6140539df97f
-
SHA512
aecc869e89345858936599ca97d87156b1b2ea2f155f029969834ed0b42f645c1cd1e8c25c6948c0da4be6d13b9017b2137a751186a4b8dd62986e6fe2a583d3
-
SSDEEP
1536:gIe8Lwzw4hQD7rDN8kYDxmheee/a8GbbXwzsbGItpqKmY7:gIe8Lwzw4hQD7r58kYDxmEe2GbbX52z
Malware Config
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/memory/1176-133-0x0000028A371E0000-0x0000028A371F6000-memory.dmp asyncrat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1176 3500d4b2b971499632cf0a306f266cfd.exe