Analysis
-
max time kernel
119s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 21:21
Static task
static1
Behavioral task
behavioral1
Sample
9211293FDF6164567C9C0557CF200057.exe
Resource
win7-20240508-en
General
-
Target
9211293FDF6164567C9C0557CF200057.exe
-
Size
91KB
-
MD5
9211293fdf6164567c9c0557cf200057
-
SHA1
cef794bc498b0b4ffea444c8f0bd002f0ad717bc
-
SHA256
4f9ae5b89c89e5c79c53db694d4d67e2d9b3c47c7389c8c3899dedbc9e92be76
-
SHA512
bc858a5bf2f61a84718c204b1b3cef8883e91d88f5ca3f974b9531f433e44b62d2d7474a8f5f65213703146603ff531a5441a2640c7c63bf0e3b05de0671a609
-
SSDEEP
1536:nMZI65tohmg4x4mRpkKzk9c/8a95TmjsqeEPQk4SfV:nMuHdOpkKzuc/8afmjsqeEPQk4S9
Malware Config
Extracted
asyncrat
0.5.8
OS
20.117.108.240:7825
IOr8QBoiV215
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
9211293FDF6164567C9C0557CF200057.exedescription pid process target process PID 2036 set thread context of 2356 2036 9211293FDF6164567C9C0557CF200057.exe RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegAsm.exedescription pid process Token: SeDebugPrivilege 2356 RegAsm.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
9211293FDF6164567C9C0557CF200057.exedescription pid process target process PID 2036 wrote to memory of 2356 2036 9211293FDF6164567C9C0557CF200057.exe RegAsm.exe PID 2036 wrote to memory of 2356 2036 9211293FDF6164567C9C0557CF200057.exe RegAsm.exe PID 2036 wrote to memory of 2356 2036 9211293FDF6164567C9C0557CF200057.exe RegAsm.exe PID 2036 wrote to memory of 2356 2036 9211293FDF6164567C9C0557CF200057.exe RegAsm.exe PID 2036 wrote to memory of 2356 2036 9211293FDF6164567C9C0557CF200057.exe RegAsm.exe PID 2036 wrote to memory of 2356 2036 9211293FDF6164567C9C0557CF200057.exe RegAsm.exe PID 2036 wrote to memory of 2356 2036 9211293FDF6164567C9C0557CF200057.exe RegAsm.exe PID 2036 wrote to memory of 2356 2036 9211293FDF6164567C9C0557CF200057.exe RegAsm.exe PID 2036 wrote to memory of 2356 2036 9211293FDF6164567C9C0557CF200057.exe RegAsm.exe PID 2036 wrote to memory of 2356 2036 9211293FDF6164567C9C0557CF200057.exe RegAsm.exe PID 2036 wrote to memory of 2356 2036 9211293FDF6164567C9C0557CF200057.exe RegAsm.exe PID 2036 wrote to memory of 2356 2036 9211293FDF6164567C9C0557CF200057.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9211293FDF6164567C9C0557CF200057.exe"C:\Users\Admin\AppData\Local\Temp\9211293FDF6164567C9C0557CF200057.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe#system322⤵
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa