Analysis
-
max time kernel
120s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12-02-2024 03:20
Behavioral task
behavioral1
Sample
50a16971e1979b9fedd35969fb3e0658480d2d18139a935d065f76c002c8a961.exe
Resource
win7-20231215-en
General
-
Target
50a16971e1979b9fedd35969fb3e0658480d2d18139a935d065f76c002c8a961.exe
-
Size
45KB
-
MD5
a46741ec2864a2c9c7cfe6afa5f38873
-
SHA1
58019aaf83bb12c84e5df67b01bfb3295006c3ae
-
SHA256
50a16971e1979b9fedd35969fb3e0658480d2d18139a935d065f76c002c8a961
-
SHA512
1c291721f2b7b7fd0292521829502c4263bd4358800f1b4279f8f4cdf6c0b02d964ed71035ad2ca3f53ff71ca530601b7eedb3bba48778a3f9daa5ab2cc3bc60
-
SSDEEP
768:IeI6b/GoWoGX8ye91Vstjb0gxh5tdd3EvMCPEJAAuYDDG62tYcFmVc6K:IwGsYlbbxryvnAtDG6KmVcl
Malware Config
Extracted
asyncrat
0.5.6B
koradon.giize.com:6606
vomsklihddikoeyxag
-
delay
5
-
install
false
-
install_folder
%AppData%
Signatures
-
Detects file containing reversed ASEP Autorun registry keys 1 IoCs
resource yara_rule behavioral1/memory/3012-0-0x0000000000B10000-0x0000000000B22000-memory.dmp INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3012 50a16971e1979b9fedd35969fb3e0658480d2d18139a935d065f76c002c8a961.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d