Analysis

  • max time kernel
    147s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    12-07-2024 01:14

General

  • Target

    Eaxset.exe

  • Size

    63KB

  • MD5

    98e17490f6b3040297cbe61dd749b2a3

  • SHA1

    a1049bf2448d92974d5494660d1f76d766917528

  • SHA256

    867357d7dc174c573a8df2f547f276844dc088fc32bc0a44144ecd02f0f92a72

  • SHA512

    59027326624b34127fa10613f96a62afe68913ec7aa2ba88ccdf057e1fe337ce26b2d0e4805986ec92b369ea46c1dc6bcfef9e03ceb14461337d84b23cd5ab95

  • SSDEEP

    768:jnuguX1wbgyX78dIC8A+XkuazcBRL5JTk1+T4KSBGHmDbD/ph0oXLSNuH03SuEdP:rvCCPTDdSJYUbdh9XuEdpqKmY7

Score
10/10

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:5552

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Eaxset.exe
    "C:\Users\Admin\AppData\Local\Temp\Eaxset.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3024

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3024-0-0x000007FEF5883000-0x000007FEF5884000-memory.dmp

    Filesize

    4KB

  • memory/3024-1-0x0000000000170000-0x0000000000186000-memory.dmp

    Filesize

    88KB

  • memory/3024-2-0x000007FEF5880000-0x000007FEF626C000-memory.dmp

    Filesize

    9.9MB

  • memory/3024-3-0x000007FEF5880000-0x000007FEF626C000-memory.dmp

    Filesize

    9.9MB

  • memory/3024-4-0x000007FEF5880000-0x000007FEF626C000-memory.dmp

    Filesize

    9.9MB