Analysis
-
max time kernel
135s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
08-12-2023 07:15
Static task
static1
1 signatures
General
-
Target
fd240aa98faddeb1c59ecbf0caecb1449fb8aca2f187ef28db6729a41e9b03cf.exe
-
Size
82KB
-
MD5
b650d8ff26e23317d9e2e7b634b89be2
-
SHA1
fdc2f4d5067d1e065e79756f37ba439a0a0a86b1
-
SHA256
fd240aa98faddeb1c59ecbf0caecb1449fb8aca2f187ef28db6729a41e9b03cf
-
SHA512
c0a11833921fd3793b426a1ef8d681ce514e51aec1f290f16035823bacb4700c1c9ee46390fb9142a83d6e0dd36586cf17a49066d88c28e706d8a62f98373eeb
-
SSDEEP
1536:OFVaxnTCdOnFO14Q8YcZUbTbxmtqE587/WlVE2f2L79fbqncY69:OFVahCUFO2YawRmN87/aVEZJqncT
Malware Config
Extracted
Family
asyncrat
Version
0.5.7B
Botnet
441d
C2
88.248.18.120:33918
Mutex
sdf324
Attributes
-
delay
3
-
install
false
-
install_file
da44rks.exe
-
install_folder
%AppData%
aes.plain
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/4604-3-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
fd240aa98faddeb1c59ecbf0caecb1449fb8aca2f187ef28db6729a41e9b03cf.exedescription pid process target process PID 4496 set thread context of 4604 4496 fd240aa98faddeb1c59ecbf0caecb1449fb8aca2f187ef28db6729a41e9b03cf.exe RegAsm.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
fd240aa98faddeb1c59ecbf0caecb1449fb8aca2f187ef28db6729a41e9b03cf.exedescription pid process target process PID 4496 wrote to memory of 4604 4496 fd240aa98faddeb1c59ecbf0caecb1449fb8aca2f187ef28db6729a41e9b03cf.exe RegAsm.exe PID 4496 wrote to memory of 4604 4496 fd240aa98faddeb1c59ecbf0caecb1449fb8aca2f187ef28db6729a41e9b03cf.exe RegAsm.exe PID 4496 wrote to memory of 4604 4496 fd240aa98faddeb1c59ecbf0caecb1449fb8aca2f187ef28db6729a41e9b03cf.exe RegAsm.exe PID 4496 wrote to memory of 4604 4496 fd240aa98faddeb1c59ecbf0caecb1449fb8aca2f187ef28db6729a41e9b03cf.exe RegAsm.exe PID 4496 wrote to memory of 4604 4496 fd240aa98faddeb1c59ecbf0caecb1449fb8aca2f187ef28db6729a41e9b03cf.exe RegAsm.exe PID 4496 wrote to memory of 4604 4496 fd240aa98faddeb1c59ecbf0caecb1449fb8aca2f187ef28db6729a41e9b03cf.exe RegAsm.exe PID 4496 wrote to memory of 4604 4496 fd240aa98faddeb1c59ecbf0caecb1449fb8aca2f187ef28db6729a41e9b03cf.exe RegAsm.exe PID 4496 wrote to memory of 4604 4496 fd240aa98faddeb1c59ecbf0caecb1449fb8aca2f187ef28db6729a41e9b03cf.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd240aa98faddeb1c59ecbf0caecb1449fb8aca2f187ef28db6729a41e9b03cf.exe"C:\Users\Admin\AppData\Local\Temp\fd240aa98faddeb1c59ecbf0caecb1449fb8aca2f187ef28db6729a41e9b03cf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe#cmd2⤵PID:4604