Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13-07-2024 12:34
Static task
static1
Behavioral task
behavioral1
Sample
cdfb3a8ed030bb040835d4e2d5fd150bff61006971ce84809183127fd758639a.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
cdfb3a8ed030bb040835d4e2d5fd150bff61006971ce84809183127fd758639a.exe
Resource
win11-20240709-en
General
-
Target
cdfb3a8ed030bb040835d4e2d5fd150bff61006971ce84809183127fd758639a.exe
-
Size
607KB
-
MD5
04f81cd3a595c95b20c258a514118388
-
SHA1
30e11f854dfecbd170ac0c5286ed75ffa1f48d86
-
SHA256
cdfb3a8ed030bb040835d4e2d5fd150bff61006971ce84809183127fd758639a
-
SHA512
a769a8b2a26f3dfee0b86522c0c8cd5bf8180deae4d462f7e5a08600e447b27208729f459ba391519ece95d72daf2e33a8563088dd836422a9596d7634076d22
-
SSDEEP
6144:l/Yprz9pQLYJy6BzahC3Ic2TD2mo9txBPRLF:1mH9EYA6RJ4c2nkxp
Malware Config
Extracted
asyncrat
0.5.7B
AsyncMutex_6SI8OkPnk
-
c2_url_file
http://update-checker-status.cc/OCB-Async.txt
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Roaming\\ViperFolder\\FiperN.exe\"," cdfb3a8ed030bb040835d4e2d5fd150bff61006971ce84809183127fd758639a.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3704 set thread context of 1952 3704 cdfb3a8ed030bb040835d4e2d5fd150bff61006971ce84809183127fd758639a.exe 87 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3704 cdfb3a8ed030bb040835d4e2d5fd150bff61006971ce84809183127fd758639a.exe 3704 cdfb3a8ed030bb040835d4e2d5fd150bff61006971ce84809183127fd758639a.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3704 cdfb3a8ed030bb040835d4e2d5fd150bff61006971ce84809183127fd758639a.exe Token: SeDebugPrivilege 1952 RegAsm.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3704 wrote to memory of 1952 3704 cdfb3a8ed030bb040835d4e2d5fd150bff61006971ce84809183127fd758639a.exe 87 PID 3704 wrote to memory of 1952 3704 cdfb3a8ed030bb040835d4e2d5fd150bff61006971ce84809183127fd758639a.exe 87 PID 3704 wrote to memory of 1952 3704 cdfb3a8ed030bb040835d4e2d5fd150bff61006971ce84809183127fd758639a.exe 87 PID 3704 wrote to memory of 1952 3704 cdfb3a8ed030bb040835d4e2d5fd150bff61006971ce84809183127fd758639a.exe 87 PID 3704 wrote to memory of 1952 3704 cdfb3a8ed030bb040835d4e2d5fd150bff61006971ce84809183127fd758639a.exe 87 PID 3704 wrote to memory of 1952 3704 cdfb3a8ed030bb040835d4e2d5fd150bff61006971ce84809183127fd758639a.exe 87 PID 3704 wrote to memory of 1952 3704 cdfb3a8ed030bb040835d4e2d5fd150bff61006971ce84809183127fd758639a.exe 87 PID 3704 wrote to memory of 1952 3704 cdfb3a8ed030bb040835d4e2d5fd150bff61006971ce84809183127fd758639a.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdfb3a8ed030bb040835d4e2d5fd150bff61006971ce84809183127fd758639a.exe"C:\Users\Admin\AppData\Local\Temp\cdfb3a8ed030bb040835d4e2d5fd150bff61006971ce84809183127fd758639a.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1952
-