Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 14:22
Behavioral task
behavioral1
Sample
15c37fc34c843c04dd97fdb40a9c767c0964a02ee7c0d9b22fd67a85fcf39a8a.exe
Resource
win7-20240221-en
General
-
Target
15c37fc34c843c04dd97fdb40a9c767c0964a02ee7c0d9b22fd67a85fcf39a8a.exe
-
Size
47KB
-
MD5
7a51aa3884526620751838e6c9714f25
-
SHA1
9f0210f25aaa9d2598a02132cf8faa5541d6ff3a
-
SHA256
15c37fc34c843c04dd97fdb40a9c767c0964a02ee7c0d9b22fd67a85fcf39a8a
-
SHA512
7460684b61e37eb842463abd8203eecfbb635767168be8d6bc79a6da5282dcee8ed9034adaecd315419117eb9f7851b20e14a9221e5b0c38dcb85127f5aa14d7
-
SSDEEP
768:5CT3ILNCKi+Di5hFxhLR5qiH6Ybrge8ZIar7XvEgK/JTZVc6KN:5CYm5jxXDpbUVeY7XnkJTZVclN
Malware Config
Extracted
asyncrat
1.0.7
MAYO27
flugrekorder.duckdns.org:7786
"$%#&63T%y/34rdy@
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4868 timeout.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
15c37fc34c843c04dd97fdb40a9c767c0964a02ee7c0d9b22fd67a85fcf39a8a.exedescription pid process Token: SeDebugPrivilege 2744 15c37fc34c843c04dd97fdb40a9c767c0964a02ee7c0d9b22fd67a85fcf39a8a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
15c37fc34c843c04dd97fdb40a9c767c0964a02ee7c0d9b22fd67a85fcf39a8a.execmd.exedescription pid process target process PID 2744 wrote to memory of 2420 2744 15c37fc34c843c04dd97fdb40a9c767c0964a02ee7c0d9b22fd67a85fcf39a8a.exe cmd.exe PID 2744 wrote to memory of 2420 2744 15c37fc34c843c04dd97fdb40a9c767c0964a02ee7c0d9b22fd67a85fcf39a8a.exe cmd.exe PID 2420 wrote to memory of 4868 2420 cmd.exe timeout.exe PID 2420 wrote to memory of 4868 2420 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\15c37fc34c843c04dd97fdb40a9c767c0964a02ee7c0d9b22fd67a85fcf39a8a.exe"C:\Users\Admin\AppData\Local\Temp\15c37fc34c843c04dd97fdb40a9c767c0964a02ee7c0d9b22fd67a85fcf39a8a.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpA604.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:4868
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD567b7eba08a33edb90d8f7d6dc7078eff
SHA10975af23fd6160c80aafb2c09e3f52ee113f8793
SHA256d84bb747cf9fb2661bab1dc826ad1e2b2a64001a2503f211a302b8334422822d
SHA51269714fae39e36ac6fa3ee8137cc1daf6e52cf59daac5bcedd3f65750e5502b4e21c8f1e066bd6ddaec7133d83d755bc6f14b72fafd7ba0d1aa67f8d626202bd6