Analysis
-
max time kernel
148s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 15:47
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e052edd5f47c509205c54b76d2a6ad65.exe
Resource
win7-20231215-en
8 signatures
150 seconds
General
-
Target
e052edd5f47c509205c54b76d2a6ad65.exe
-
Size
604KB
-
MD5
e052edd5f47c509205c54b76d2a6ad65
-
SHA1
6751051969eebbf1a1e55692c014d9b2de5a0299
-
SHA256
6d54fcbf8e77d62a42cb898c139586cdc30a022e3c6122746619c88c778fe499
-
SHA512
54333bd2a2ede843de91c63bc877c639a4b392ef17b02c365cb1601413248a28414e237f19a1b37588895a1839fe00a2636e19ae79573d2610fbb8543e3bbf79
-
SSDEEP
12288:zfeBIF3YGLnH3xBfboQfvEMB0fUDLoodsj2G5QhZz6HNv:CBIBYGjH3xGDUDcod4uZzG
Malware Config
Extracted
Family
asyncrat
Version
0.5.7B
Botnet
Default
C2
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
Mutex
AsyncMutex_6SI8OkPnk
Attributes
-
delay
3
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Async RAT payload 4 IoCs
resource yara_rule behavioral1/memory/2592-131-0x0000000000630000-0x0000000000730000-memory.dmp asyncrat behavioral1/memory/2164-145-0x0000000000400000-0x0000000000417000-memory.dmp asyncrat behavioral1/memory/2164-143-0x0000000000400000-0x0000000000417000-memory.dmp asyncrat behavioral1/memory/2164-141-0x0000000000400000-0x0000000000417000-memory.dmp asyncrat -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2592 e052edd5f47c509205c54b76d2a6ad65.exe 2592 e052edd5f47c509205c54b76d2a6ad65.exe 2164 regasm.exe 2164 regasm.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1960 set thread context of 2592 1960 e052edd5f47c509205c54b76d2a6ad65.exe 28 PID 2592 set thread context of 2164 2592 e052edd5f47c509205c54b76d2a6ad65.exe 29 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2592 e052edd5f47c509205c54b76d2a6ad65.exe 2592 e052edd5f47c509205c54b76d2a6ad65.exe 2592 e052edd5f47c509205c54b76d2a6ad65.exe 2592 e052edd5f47c509205c54b76d2a6ad65.exe 2592 e052edd5f47c509205c54b76d2a6ad65.exe 2592 e052edd5f47c509205c54b76d2a6ad65.exe 2592 e052edd5f47c509205c54b76d2a6ad65.exe 2592 e052edd5f47c509205c54b76d2a6ad65.exe 2592 e052edd5f47c509205c54b76d2a6ad65.exe 2592 e052edd5f47c509205c54b76d2a6ad65.exe 2592 e052edd5f47c509205c54b76d2a6ad65.exe 2592 e052edd5f47c509205c54b76d2a6ad65.exe 2592 e052edd5f47c509205c54b76d2a6ad65.exe 2592 e052edd5f47c509205c54b76d2a6ad65.exe 2592 e052edd5f47c509205c54b76d2a6ad65.exe 2592 e052edd5f47c509205c54b76d2a6ad65.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe 2164 regasm.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1960 e052edd5f47c509205c54b76d2a6ad65.exe 2592 e052edd5f47c509205c54b76d2a6ad65.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1960 e052edd5f47c509205c54b76d2a6ad65.exe 2592 e052edd5f47c509205c54b76d2a6ad65.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1960 wrote to memory of 2592 1960 e052edd5f47c509205c54b76d2a6ad65.exe 28 PID 1960 wrote to memory of 2592 1960 e052edd5f47c509205c54b76d2a6ad65.exe 28 PID 1960 wrote to memory of 2592 1960 e052edd5f47c509205c54b76d2a6ad65.exe 28 PID 1960 wrote to memory of 2592 1960 e052edd5f47c509205c54b76d2a6ad65.exe 28 PID 1960 wrote to memory of 2592 1960 e052edd5f47c509205c54b76d2a6ad65.exe 28 PID 2592 wrote to memory of 2164 2592 e052edd5f47c509205c54b76d2a6ad65.exe 29 PID 2592 wrote to memory of 2164 2592 e052edd5f47c509205c54b76d2a6ad65.exe 29 PID 2592 wrote to memory of 2164 2592 e052edd5f47c509205c54b76d2a6ad65.exe 29 PID 2592 wrote to memory of 2164 2592 e052edd5f47c509205c54b76d2a6ad65.exe 29 PID 2592 wrote to memory of 2164 2592 e052edd5f47c509205c54b76d2a6ad65.exe 29 PID 2592 wrote to memory of 2164 2592 e052edd5f47c509205c54b76d2a6ad65.exe 29 PID 2592 wrote to memory of 2164 2592 e052edd5f47c509205c54b76d2a6ad65.exe 29 PID 2592 wrote to memory of 2164 2592 e052edd5f47c509205c54b76d2a6ad65.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\e052edd5f47c509205c54b76d2a6ad65.exe"C:\Users\Admin\AppData\Local\Temp\e052edd5f47c509205c54b76d2a6ad65.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\e052edd5f47c509205c54b76d2a6ad65.exe"C:\Users\Admin\AppData\Local\Temp\e052edd5f47c509205c54b76d2a6ad65.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2164
-
-