Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
13-07-2024 12:34
Static task
static1
Behavioral task
behavioral1
Sample
cdfb3a8ed030bb040835d4e2d5fd150bff61006971ce84809183127fd758639a.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
cdfb3a8ed030bb040835d4e2d5fd150bff61006971ce84809183127fd758639a.exe
Resource
win11-20240709-en
General
-
Target
cdfb3a8ed030bb040835d4e2d5fd150bff61006971ce84809183127fd758639a.exe
-
Size
607KB
-
MD5
04f81cd3a595c95b20c258a514118388
-
SHA1
30e11f854dfecbd170ac0c5286ed75ffa1f48d86
-
SHA256
cdfb3a8ed030bb040835d4e2d5fd150bff61006971ce84809183127fd758639a
-
SHA512
a769a8b2a26f3dfee0b86522c0c8cd5bf8180deae4d462f7e5a08600e447b27208729f459ba391519ece95d72daf2e33a8563088dd836422a9596d7634076d22
-
SSDEEP
6144:l/Yprz9pQLYJy6BzahC3Ic2TD2mo9txBPRLF:1mH9EYA6RJ4c2nkxp
Malware Config
Extracted
asyncrat
0.5.7B
AsyncMutex_6SI8OkPnk
-
c2_url_file
http://update-checker-status.cc/OCB-Async.txt
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3171217504-1685128607-2237314850-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Roaming\\ViperFolder\\FiperN.exe\"," cdfb3a8ed030bb040835d4e2d5fd150bff61006971ce84809183127fd758639a.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1868 set thread context of 5092 1868 cdfb3a8ed030bb040835d4e2d5fd150bff61006971ce84809183127fd758639a.exe 83 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1868 cdfb3a8ed030bb040835d4e2d5fd150bff61006971ce84809183127fd758639a.exe 1868 cdfb3a8ed030bb040835d4e2d5fd150bff61006971ce84809183127fd758639a.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1868 cdfb3a8ed030bb040835d4e2d5fd150bff61006971ce84809183127fd758639a.exe Token: SeDebugPrivilege 5092 RegAsm.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1868 wrote to memory of 5092 1868 cdfb3a8ed030bb040835d4e2d5fd150bff61006971ce84809183127fd758639a.exe 83 PID 1868 wrote to memory of 5092 1868 cdfb3a8ed030bb040835d4e2d5fd150bff61006971ce84809183127fd758639a.exe 83 PID 1868 wrote to memory of 5092 1868 cdfb3a8ed030bb040835d4e2d5fd150bff61006971ce84809183127fd758639a.exe 83 PID 1868 wrote to memory of 5092 1868 cdfb3a8ed030bb040835d4e2d5fd150bff61006971ce84809183127fd758639a.exe 83 PID 1868 wrote to memory of 5092 1868 cdfb3a8ed030bb040835d4e2d5fd150bff61006971ce84809183127fd758639a.exe 83 PID 1868 wrote to memory of 5092 1868 cdfb3a8ed030bb040835d4e2d5fd150bff61006971ce84809183127fd758639a.exe 83 PID 1868 wrote to memory of 5092 1868 cdfb3a8ed030bb040835d4e2d5fd150bff61006971ce84809183127fd758639a.exe 83 PID 1868 wrote to memory of 5092 1868 cdfb3a8ed030bb040835d4e2d5fd150bff61006971ce84809183127fd758639a.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdfb3a8ed030bb040835d4e2d5fd150bff61006971ce84809183127fd758639a.exe"C:\Users\Admin\AppData\Local\Temp\cdfb3a8ed030bb040835d4e2d5fd150bff61006971ce84809183127fd758639a.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:5092
-