Analysis

  • max time kernel
    146s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    28-06-2024 02:33

General

  • Target

    3cfc3cb76ccecf137e270368bd174334.exe

  • Size

    63KB

  • MD5

    3cfc3cb76ccecf137e270368bd174334

  • SHA1

    ba01794efeda53df6310ecdd138f4568f44af809

  • SHA256

    52dd82eb47d8e01e510f37e399404589c18b1b7fa78f176a9cdecafddbbd9225

  • SHA512

    a5312b49a088fee80fe67eb4102642f3a17ed4e23c1e8c129e0d3c0b0a57e56a7422fe157a1faf7c4b448f54b72594d67216909c7ca0c36ee52d9ef1e55cb891

  • SSDEEP

    768:CmUvnkjXf78dwC8A+XU2azcBRL5JTk1+T4KSBGHmDbD/ph0oXPwaVKzI+SNySusV:6wXzLdSJYUbdh9PbVKE+qlusdpqKmY7

Score
10/10

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:3232

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3cfc3cb76ccecf137e270368bd174334.exe
    "C:\Users\Admin\AppData\Local\Temp\3cfc3cb76ccecf137e270368bd174334.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1276

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1276-0-0x000007FEF5D83000-0x000007FEF5D84000-memory.dmp

    Filesize

    4KB

  • memory/1276-1-0x0000000000AC0000-0x0000000000AD6000-memory.dmp

    Filesize

    88KB

  • memory/1276-2-0x000007FEF5D80000-0x000007FEF676C000-memory.dmp

    Filesize

    9.9MB

  • memory/1276-3-0x000007FEF5D80000-0x000007FEF676C000-memory.dmp

    Filesize

    9.9MB

  • memory/1276-4-0x000007FEF5D83000-0x000007FEF5D84000-memory.dmp

    Filesize

    4KB

  • memory/1276-5-0x000007FEF5D80000-0x000007FEF676C000-memory.dmp

    Filesize

    9.9MB

  • memory/1276-6-0x000007FEF5D80000-0x000007FEF676C000-memory.dmp

    Filesize

    9.9MB