Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
13-07-2024 00:25
Static task
static1
1 signatures
General
-
Target
ComSvcConfig.exe
-
Size
91KB
-
MD5
531a8b9dcacc1caf586fc3c54d5b0d5c
-
SHA1
33544df2d37910946f323b185447b2602b5df73c
-
SHA256
f42dccf9d4ccc4e8c4ff16ec291d75d2c89a9ff09896fa39575abe4f1193d62d
-
SHA512
08123799a24f5332283df02b270d7746c2d3a736667b5b030005f793c892ff35d026dcf7bed9eb927a6b67fae983c01b5ec3fabec50707b4b48f4ee71f58a5d2
-
SSDEEP
1536:kMdVnKe6rNBEgHEB3uZaYx/2AAuAFQO+xZYhii/RoYy9B5Ilu67KhkFkTit:kMd9MNKoSAZbZQiCRoYy9B5Ilu67Kh/+
Malware Config
Extracted
Family
asyncrat
Version
0.5.8
Botnet
Y
C2
20.199.8.16:1726
Mutex
eYLuHMmPZK7A
Attributes
-
delay
3
-
install
false
-
install_file
SeacrhIndexer
-
install_folder
%AppData%
aes.plain
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4940 set thread context of 4944 4940 ComSvcConfig.exe 81 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4944 RegAsm.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4940 wrote to memory of 4944 4940 ComSvcConfig.exe 81 PID 4940 wrote to memory of 4944 4940 ComSvcConfig.exe 81 PID 4940 wrote to memory of 4944 4940 ComSvcConfig.exe 81 PID 4940 wrote to memory of 4944 4940 ComSvcConfig.exe 81 PID 4940 wrote to memory of 4944 4940 ComSvcConfig.exe 81 PID 4940 wrote to memory of 4944 4940 ComSvcConfig.exe 81 PID 4940 wrote to memory of 4944 4940 ComSvcConfig.exe 81 PID 4940 wrote to memory of 4944 4940 ComSvcConfig.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\ComSvcConfig.exe"C:\Users\Admin\AppData\Local\Temp\ComSvcConfig.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe#system322⤵
- Suspicious use of AdjustPrivilegeToken
PID:4944
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3044