Analysis
-
max time kernel
126s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10-07-2024 04:32
Static task
static1
Behavioral task
behavioral1
Sample
FALLOTUTEDOC20240528001.bin.exe
Resource
win7-20240704-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
FALLOTUTEDOC20240528001.bin.exe
Resource
win10v2004-20240709-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
FALLOTUTEDOC20240528001.bin.exe
-
Size
2.6MB
-
MD5
dd007b6a486b6336cea0c9c2dfd307ca
-
SHA1
f9d1987deb32ae3b244ba8b281d3c75ea149979d
-
SHA256
c9866af2cb943cbe5f4d971518d30ec93e686e8d8e31345fe0e923c0ec121603
-
SHA512
210e997ec4e5b8c64539b19052e694fea48415f1100d0f1d2dae418f5a6e7ec032f9e328dbb7af6b299614b402b9ebc6720a256a3c058b177a830b78783a7dd4
-
SSDEEP
49152:CHV9arGDFfPHRi63T+reNM7I2BnJGQ2sqmsSql2ESrB6jPF:CHkGNPxT6r08p32m9G7SmF
Score
10/10
Malware Config
Extracted
Family
asyncrat
Version
0.5.7B
Botnet
ZZZ6
C2
andresarbosa2003.con-ip.com:4040
Mutex
AsyncMutex_6SI8OkPnk
Attributes
-
delay
3
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\Neouopdwf = "C:\\Users\\Admin\\AppData\\Roaming\\Neouopdwf.exe" FALLOTUTEDOC20240528001.bin.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2544 set thread context of 3504 2544 FALLOTUTEDOC20240528001.bin.exe 31 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2544 FALLOTUTEDOC20240528001.bin.exe Token: SeDebugPrivilege 2544 FALLOTUTEDOC20240528001.bin.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2544 wrote to memory of 3504 2544 FALLOTUTEDOC20240528001.bin.exe 31 PID 2544 wrote to memory of 3504 2544 FALLOTUTEDOC20240528001.bin.exe 31 PID 2544 wrote to memory of 3504 2544 FALLOTUTEDOC20240528001.bin.exe 31 PID 2544 wrote to memory of 3504 2544 FALLOTUTEDOC20240528001.bin.exe 31 PID 2544 wrote to memory of 3504 2544 FALLOTUTEDOC20240528001.bin.exe 31 PID 2544 wrote to memory of 3504 2544 FALLOTUTEDOC20240528001.bin.exe 31 PID 2544 wrote to memory of 3504 2544 FALLOTUTEDOC20240528001.bin.exe 31 PID 2544 wrote to memory of 3504 2544 FALLOTUTEDOC20240528001.bin.exe 31 PID 2544 wrote to memory of 3504 2544 FALLOTUTEDOC20240528001.bin.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\FALLOTUTEDOC20240528001.bin.exe"C:\Users\Admin\AppData\Local\Temp\FALLOTUTEDOC20240528001.bin.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\FALLOTUTEDOC20240528001.bin.exe"C:\Users\Admin\AppData\Local\Temp\FALLOTUTEDOC20240528001.bin.exe"2⤵PID:3504
-