Analysis Overview
SHA256
24624fbc08819d03d65e7620531753c2d1ae208d8c7293fb096799effa2f59db
Threat Level: Known bad
The file 24624fbc08819d03d65e7620531753c2d1ae208d8c7293fb096799effa2f59db was found to be: Known bad.
Malicious Activity Summary
Async RAT payload
Asyncrat family
AsyncRat
Checks installed software on the system
Unsigned PE
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-06-18 19:08
Signatures
Async RAT payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Asyncrat family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-18 19:08
Reported
2024-06-18 19:11
Platform
win10v2004-20240508-en
Max time kernel
146s
Max time network
150s
Command Line
Signatures
AsyncRat
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\24624fbc08819d03d65e7620531753c2d1ae208d8c7293fb096799effa2f59db.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\24624fbc08819d03d65e7620531753c2d1ae208d8c7293fb096799effa2f59db.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\24624fbc08819d03d65e7620531753c2d1ae208d8c7293fb096799effa2f59db.exe
"C:\Users\Admin\AppData\Local\Temp\24624fbc08819d03d65e7620531753c2d1ae208d8c7293fb096799effa2f59db.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| BG | 80.76.49.148:4545 | tcp | |
| BG | 80.76.49.148:4545 | tcp | |
| BG | 80.76.49.148:4545 | tcp | |
| BG | 80.76.49.148:4545 | tcp | |
| BG | 80.76.49.148:4545 | tcp | |
| BG | 80.76.49.148:4545 | tcp | |
| BG | 80.76.49.148:4545 | tcp |
Files
memory/968-0-0x00007FFD5BCF3000-0x00007FFD5BCF5000-memory.dmp
memory/968-1-0x0000000000320000-0x0000000000338000-memory.dmp
memory/968-3-0x00007FFD5BCF0000-0x00007FFD5C7B1000-memory.dmp
memory/968-4-0x00007FFD5BCF3000-0x00007FFD5BCF5000-memory.dmp
memory/968-5-0x00007FFD5BCF0000-0x00007FFD5C7B1000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-18 19:08
Reported
2024-06-18 19:11
Platform
win11-20240611-en
Max time kernel
147s
Max time network
149s
Command Line
Signatures
AsyncRat
Checks installed software on the system
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\24624fbc08819d03d65e7620531753c2d1ae208d8c7293fb096799effa2f59db.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\24624fbc08819d03d65e7620531753c2d1ae208d8c7293fb096799effa2f59db.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\24624fbc08819d03d65e7620531753c2d1ae208d8c7293fb096799effa2f59db.exe
"C:\Users\Admin\AppData\Local\Temp\24624fbc08819d03d65e7620531753c2d1ae208d8c7293fb096799effa2f59db.exe"
Network
| Country | Destination | Domain | Proto |
| BG | 80.76.49.148:4545 | tcp | |
| US | 8.8.8.8:53 | 148.49.76.80.in-addr.arpa | udp |
| US | 52.111.227.13:443 | tcp |
Files
memory/428-0-0x00007FF8991A3000-0x00007FF8991A5000-memory.dmp
memory/428-1-0x0000000000760000-0x0000000000778000-memory.dmp
memory/428-3-0x00007FF8991A0000-0x00007FF899C62000-memory.dmp
memory/428-4-0x00007FF8991A0000-0x00007FF899C62000-memory.dmp
memory/428-6-0x00007FF8991A0000-0x00007FF899C62000-memory.dmp
memory/428-7-0x00007FF8991A0000-0x00007FF899C62000-memory.dmp
memory/428-8-0x00007FF8991A3000-0x00007FF8991A5000-memory.dmp
memory/428-9-0x00007FF8991A0000-0x00007FF899C62000-memory.dmp
memory/428-10-0x00007FF8991A0000-0x00007FF899C62000-memory.dmp
memory/428-11-0x00007FF8991A0000-0x00007FF899C62000-memory.dmp