Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 17:46

General

  • Target

    test2.exe

  • Size

    63KB

  • MD5

    a6b6984d49636b219e58e00e044e0148

  • SHA1

    a905952810ad0d694ce0012ca88fb6e2aa44b75d

  • SHA256

    3213f4fcf0e572ac3ea6460af7478aacea9f70daceec692c2f8514e267a6f429

  • SHA512

    b71a2e221f46032c901ac4846c6ee0aaa6f69e96a730eb4871b454a0043066c4ebf2d0915843423a8b6be40421fe8ba1032a68cce3aa8529180a4fcc831cf017

  • SSDEEP

    1536:H1/k1+XU3RblJpUYUbhh988XuwdpqKmY7:H6iU3hiYUbh48NGz

Score
10/10

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

tcp://5.tcp.eu.ngrok.io:18322

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\test2.exe
    "C:\Users\Admin\AppData\Local\Temp\test2.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1860

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1860-0-0x00007FFE57C23000-0x00007FFE57C25000-memory.dmp
    Filesize

    8KB

  • memory/1860-1-0x0000000000DF0000-0x0000000000E06000-memory.dmp
    Filesize

    88KB

  • memory/1860-2-0x00007FFE57C20000-0x00007FFE586E1000-memory.dmp
    Filesize

    10.8MB

  • memory/1860-3-0x00007FFE57C20000-0x00007FFE586E1000-memory.dmp
    Filesize

    10.8MB

  • memory/1860-4-0x00007FFE57C23000-0x00007FFE57C25000-memory.dmp
    Filesize

    8KB

  • memory/1860-5-0x00007FFE57C20000-0x00007FFE586E1000-memory.dmp
    Filesize

    10.8MB

  • memory/1860-6-0x00007FFE57C20000-0x00007FFE586E1000-memory.dmp
    Filesize

    10.8MB