Analysis
-
max time kernel
133s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
01/09/2023, 16:31
Behavioral task
behavioral1
Sample
b7d4b9e9051e99ad6b53905d98e6a2f29eb7c25a012fa7fc1e6e546761a538ec_JC.exe
Resource
win7-20230831-en
General
-
Target
b7d4b9e9051e99ad6b53905d98e6a2f29eb7c25a012fa7fc1e6e546761a538ec_JC.exe
-
Size
305KB
-
MD5
a824d5ae995e025f951d2a04792c7307
-
SHA1
d0e9c86d9875d0bb3bae347420d827bb739a8d56
-
SHA256
b7d4b9e9051e99ad6b53905d98e6a2f29eb7c25a012fa7fc1e6e546761a538ec
-
SHA512
765ab7457d7c7b84cd6ce881eab8f3a3b7485a9dce0dd7b94c13a0be0563e27bcc0af0d0f829cc94cefaf3ec1f810c39f2dfaaabe7d63783c80d08c330e57a8e
-
SSDEEP
6144:2TiVSIllyI/bi13ow+gidaC4akQT9rJGyUg7hdC81PQ0okbIx:2TiVPrJ/Vw+giIcjMnPx
Malware Config
Extracted
asyncrat
AuroraRat 1.0.9.1
Default
38.6.189.150:8848
AuroraRatMutex_Nein
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 4 IoCs
resource yara_rule behavioral1/files/0x000e00000001230a-11.dat asyncrat behavioral1/files/0x000e00000001230a-12.dat asyncrat behavioral1/files/0x000e00000001230a-9.dat asyncrat behavioral1/memory/2796-14-0x0000000000C80000-0x0000000000C96000-memory.dmp asyncrat -
Executes dropped EXE 2 IoCs
pid Process 2324 iexpoler.exe 2796 svchsot.exe -
Loads dropped DLL 3 IoCs
pid Process 3068 b7d4b9e9051e99ad6b53905d98e6a2f29eb7c25a012fa7fc1e6e546761a538ec_JC.exe 3068 b7d4b9e9051e99ad6b53905d98e6a2f29eb7c25a012fa7fc1e6e546761a538ec_JC.exe 3068 b7d4b9e9051e99ad6b53905d98e6a2f29eb7c25a012fa7fc1e6e546761a538ec_JC.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3068 b7d4b9e9051e99ad6b53905d98e6a2f29eb7c25a012fa7fc1e6e546761a538ec_JC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2796 svchsot.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3068 b7d4b9e9051e99ad6b53905d98e6a2f29eb7c25a012fa7fc1e6e546761a538ec_JC.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2324 3068 b7d4b9e9051e99ad6b53905d98e6a2f29eb7c25a012fa7fc1e6e546761a538ec_JC.exe 28 PID 3068 wrote to memory of 2324 3068 b7d4b9e9051e99ad6b53905d98e6a2f29eb7c25a012fa7fc1e6e546761a538ec_JC.exe 28 PID 3068 wrote to memory of 2324 3068 b7d4b9e9051e99ad6b53905d98e6a2f29eb7c25a012fa7fc1e6e546761a538ec_JC.exe 28 PID 3068 wrote to memory of 2324 3068 b7d4b9e9051e99ad6b53905d98e6a2f29eb7c25a012fa7fc1e6e546761a538ec_JC.exe 28 PID 3068 wrote to memory of 2796 3068 b7d4b9e9051e99ad6b53905d98e6a2f29eb7c25a012fa7fc1e6e546761a538ec_JC.exe 29 PID 3068 wrote to memory of 2796 3068 b7d4b9e9051e99ad6b53905d98e6a2f29eb7c25a012fa7fc1e6e546761a538ec_JC.exe 29 PID 3068 wrote to memory of 2796 3068 b7d4b9e9051e99ad6b53905d98e6a2f29eb7c25a012fa7fc1e6e546761a538ec_JC.exe 29 PID 3068 wrote to memory of 2796 3068 b7d4b9e9051e99ad6b53905d98e6a2f29eb7c25a012fa7fc1e6e546761a538ec_JC.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7d4b9e9051e99ad6b53905d98e6a2f29eb7c25a012fa7fc1e6e546761a538ec_JC.exe"C:\Users\Admin\AppData\Local\Temp\b7d4b9e9051e99ad6b53905d98e6a2f29eb7c25a012fa7fc1e6e546761a538ec_JC.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\iexpoler.exeC:\Users\Admin\AppData\Local\Temp\\iexpoler.exe2⤵
- Executes dropped EXE
PID:2324
-
-
C:\Users\Admin\AppData\Local\Temp\svchsot.exeC:\Users\Admin\AppData\Local\Temp\\svchsot.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114KB
MD571227a3af26b22238f0b03b11abfa7be
SHA116356ae80ca36c906b4a5314e35c01bbf44a6668
SHA2569c3985677e2a0cf6b2d8af4f1e7f99dd4dc13d26770bd97022474088b379d618
SHA512e1df4d66f44c288209ac3718c7c4905e100a0f1c3e0c53c2249e9fc6bc99c57771e1bbab0775baa2f2674737dad865a4a82bf9fd6fc998d5c26134a61b8f0733
-
Filesize
114KB
MD571227a3af26b22238f0b03b11abfa7be
SHA116356ae80ca36c906b4a5314e35c01bbf44a6668
SHA2569c3985677e2a0cf6b2d8af4f1e7f99dd4dc13d26770bd97022474088b379d618
SHA512e1df4d66f44c288209ac3718c7c4905e100a0f1c3e0c53c2249e9fc6bc99c57771e1bbab0775baa2f2674737dad865a4a82bf9fd6fc998d5c26134a61b8f0733
-
Filesize
63KB
MD56cd26d6bb4b50164f6d55ce39daa2006
SHA12693732777757f7246c78d83897f5c1e9eba3ffb
SHA25658adae9c12bb223fb534124951a7a51efaa66f5a531946a744e7671605a57138
SHA512558e443d3b9dd45303ca89604f005292db2dbd32e5b577b20704ccc96af0526012758ac107a25d1ac49b8a7c9671cc28a89eb420324df89d52f2bbc6052b5ea2
-
Filesize
63KB
MD56cd26d6bb4b50164f6d55ce39daa2006
SHA12693732777757f7246c78d83897f5c1e9eba3ffb
SHA25658adae9c12bb223fb534124951a7a51efaa66f5a531946a744e7671605a57138
SHA512558e443d3b9dd45303ca89604f005292db2dbd32e5b577b20704ccc96af0526012758ac107a25d1ac49b8a7c9671cc28a89eb420324df89d52f2bbc6052b5ea2
-
Filesize
114KB
MD571227a3af26b22238f0b03b11abfa7be
SHA116356ae80ca36c906b4a5314e35c01bbf44a6668
SHA2569c3985677e2a0cf6b2d8af4f1e7f99dd4dc13d26770bd97022474088b379d618
SHA512e1df4d66f44c288209ac3718c7c4905e100a0f1c3e0c53c2249e9fc6bc99c57771e1bbab0775baa2f2674737dad865a4a82bf9fd6fc998d5c26134a61b8f0733
-
Filesize
114KB
MD571227a3af26b22238f0b03b11abfa7be
SHA116356ae80ca36c906b4a5314e35c01bbf44a6668
SHA2569c3985677e2a0cf6b2d8af4f1e7f99dd4dc13d26770bd97022474088b379d618
SHA512e1df4d66f44c288209ac3718c7c4905e100a0f1c3e0c53c2249e9fc6bc99c57771e1bbab0775baa2f2674737dad865a4a82bf9fd6fc998d5c26134a61b8f0733
-
Filesize
63KB
MD56cd26d6bb4b50164f6d55ce39daa2006
SHA12693732777757f7246c78d83897f5c1e9eba3ffb
SHA25658adae9c12bb223fb534124951a7a51efaa66f5a531946a744e7671605a57138
SHA512558e443d3b9dd45303ca89604f005292db2dbd32e5b577b20704ccc96af0526012758ac107a25d1ac49b8a7c9671cc28a89eb420324df89d52f2bbc6052b5ea2