Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 21:58
Behavioral task
behavioral1
Sample
3cf0b8097c095dee728ba43617425218d0de4daf874599f4fd93c7fa7cdd29d3.exe
Resource
win7-20240215-en
4 signatures
150 seconds
General
-
Target
3cf0b8097c095dee728ba43617425218d0de4daf874599f4fd93c7fa7cdd29d3.exe
-
Size
89KB
-
MD5
10df4e54567706a0d408aa4a202ee956
-
SHA1
3a575a926be8491f0cc621ad4f05937f75be3069
-
SHA256
3cf0b8097c095dee728ba43617425218d0de4daf874599f4fd93c7fa7cdd29d3
-
SHA512
2a73df62321655bb7d681f04765183f2f4be33d56f374cef0580326ddb77594dfa66f64035a04adab89fb30996899cc5d0d3f7b5df354caf4bebdd74b4495b8c
-
SSDEEP
1536:iU8PcxVteCW7PMVIZSE8DIbH1bk/LRhQzcA/4phTJRBVVclN:iUucxV4x7PMVuStCH1bkXQV4pfz3Y
Malware Config
Extracted
Family
asyncrat
Botnet
dad
C2
127.0.0.1:4449
192.168.149.139:4449
Mutex
unslixhdigmnk
Attributes
-
delay
5
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 2860 3cf0b8097c095dee728ba43617425218d0de4daf874599f4fd93c7fa7cdd29d3.exe 2860 3cf0b8097c095dee728ba43617425218d0de4daf874599f4fd93c7fa7cdd29d3.exe 2860 3cf0b8097c095dee728ba43617425218d0de4daf874599f4fd93c7fa7cdd29d3.exe 2860 3cf0b8097c095dee728ba43617425218d0de4daf874599f4fd93c7fa7cdd29d3.exe 2860 3cf0b8097c095dee728ba43617425218d0de4daf874599f4fd93c7fa7cdd29d3.exe 2860 3cf0b8097c095dee728ba43617425218d0de4daf874599f4fd93c7fa7cdd29d3.exe 2860 3cf0b8097c095dee728ba43617425218d0de4daf874599f4fd93c7fa7cdd29d3.exe 2860 3cf0b8097c095dee728ba43617425218d0de4daf874599f4fd93c7fa7cdd29d3.exe 2860 3cf0b8097c095dee728ba43617425218d0de4daf874599f4fd93c7fa7cdd29d3.exe 2860 3cf0b8097c095dee728ba43617425218d0de4daf874599f4fd93c7fa7cdd29d3.exe 2860 3cf0b8097c095dee728ba43617425218d0de4daf874599f4fd93c7fa7cdd29d3.exe 2860 3cf0b8097c095dee728ba43617425218d0de4daf874599f4fd93c7fa7cdd29d3.exe 2860 3cf0b8097c095dee728ba43617425218d0de4daf874599f4fd93c7fa7cdd29d3.exe 2860 3cf0b8097c095dee728ba43617425218d0de4daf874599f4fd93c7fa7cdd29d3.exe 2860 3cf0b8097c095dee728ba43617425218d0de4daf874599f4fd93c7fa7cdd29d3.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2860 3cf0b8097c095dee728ba43617425218d0de4daf874599f4fd93c7fa7cdd29d3.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2860 3cf0b8097c095dee728ba43617425218d0de4daf874599f4fd93c7fa7cdd29d3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3cf0b8097c095dee728ba43617425218d0de4daf874599f4fd93c7fa7cdd29d3.exe"C:\Users\Admin\AppData\Local\Temp\3cf0b8097c095dee728ba43617425218d0de4daf874599f4fd93c7fa7cdd29d3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2860