Analysis
-
max time kernel
121s -
max time network
164s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
30-05-2024 16:26
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3b0e61d6cfe1df9b7406723ce49f605e.exe
Resource
win7-20240508-en
windows7-x64
4 signatures
180 seconds
General
-
Target
3b0e61d6cfe1df9b7406723ce49f605e.exe
-
Size
479KB
-
MD5
3b0e61d6cfe1df9b7406723ce49f605e
-
SHA1
b796a6c31edd70c485b5590f1639c76e1876deb8
-
SHA256
ed96d46674a358fd03d9996721549bdeebaffe1547d0bffa2ffaf08d9289009e
-
SHA512
9134a78f005c5054c0ce8b0be0a4448d3e0717a4df2e07f0b1812a49c90831c65203992632d530e1c03873d2c70caa33482001e76a775cb263d85ce0b99a0c10
-
SSDEEP
12288:wDR+Sb7gHCN1crY/kcinF6AwyOMQetsOUgGkrNc:4tb7gq1w9FbwyOMBPRGkrN
Malware Config
Extracted
Family
asyncrat
Version
0.5.7A
Botnet
DANII
C2
danii.con-ip.com:6606
Mutex
jqqkbjyrndewhwcgsq
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
3b0e61d6cfe1df9b7406723ce49f605e.exedescription pid process target process PID 2104 set thread context of 2728 2104 3b0e61d6cfe1df9b7406723ce49f605e.exe RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegSvcs.exedescription pid process Token: SeDebugPrivilege 2728 RegSvcs.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
3b0e61d6cfe1df9b7406723ce49f605e.exedescription pid process target process PID 2104 wrote to memory of 2728 2104 3b0e61d6cfe1df9b7406723ce49f605e.exe RegSvcs.exe PID 2104 wrote to memory of 2728 2104 3b0e61d6cfe1df9b7406723ce49f605e.exe RegSvcs.exe PID 2104 wrote to memory of 2728 2104 3b0e61d6cfe1df9b7406723ce49f605e.exe RegSvcs.exe PID 2104 wrote to memory of 2728 2104 3b0e61d6cfe1df9b7406723ce49f605e.exe RegSvcs.exe PID 2104 wrote to memory of 2728 2104 3b0e61d6cfe1df9b7406723ce49f605e.exe RegSvcs.exe PID 2104 wrote to memory of 2728 2104 3b0e61d6cfe1df9b7406723ce49f605e.exe RegSvcs.exe PID 2104 wrote to memory of 2728 2104 3b0e61d6cfe1df9b7406723ce49f605e.exe RegSvcs.exe PID 2104 wrote to memory of 2728 2104 3b0e61d6cfe1df9b7406723ce49f605e.exe RegSvcs.exe PID 2104 wrote to memory of 2728 2104 3b0e61d6cfe1df9b7406723ce49f605e.exe RegSvcs.exe PID 2104 wrote to memory of 2728 2104 3b0e61d6cfe1df9b7406723ce49f605e.exe RegSvcs.exe PID 2104 wrote to memory of 2728 2104 3b0e61d6cfe1df9b7406723ce49f605e.exe RegSvcs.exe PID 2104 wrote to memory of 2728 2104 3b0e61d6cfe1df9b7406723ce49f605e.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b0e61d6cfe1df9b7406723ce49f605e.exe"C:\Users\Admin\AppData\Local\Temp\3b0e61d6cfe1df9b7406723ce49f605e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2728
-