Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
13-07-2024 12:34
Static task
static1
Behavioral task
behavioral1
Sample
1063141a71a9f3b788d4be37ff25d52cb29f7ec8105fbd8b90129073e78cd033.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
1063141a71a9f3b788d4be37ff25d52cb29f7ec8105fbd8b90129073e78cd033.exe
Resource
win11-20240709-en
General
-
Target
1063141a71a9f3b788d4be37ff25d52cb29f7ec8105fbd8b90129073e78cd033.exe
-
Size
1.7MB
-
MD5
47d2d449ec519d7d24feafff8088735f
-
SHA1
75fd74fffc8a9da0ef33dce2a616fd2424e41b86
-
SHA256
1063141a71a9f3b788d4be37ff25d52cb29f7ec8105fbd8b90129073e78cd033
-
SHA512
9fd8f13e6fc0ddf3cd69eb23f5fd9982b1f9f2f361b4b37de445bceea18860bdf8ca9ef546302d927b8ad749f48789ff51fe4797a69106a82921e275b5ada08b
-
SSDEEP
24576:Bn1MHQ7hZjEnBmMYYsB3J0zNMESsm/r8REOuPOEkU1johR:1NZjEnBmMAJGNusYr8REOuP3kUZohR
Malware Config
Extracted
asyncrat
0.5.7B
Aakn1515knAakn1515kn
-
c2_url_file
http://update-checker-status.cc/OCB-Async.txt
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-95457810-830748662-4054918673-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Roaming\\SystemGPU\\PCI-GPU.exe\"," 1063141a71a9f3b788d4be37ff25d52cb29f7ec8105fbd8b90129073e78cd033.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1136 set thread context of 4028 1136 1063141a71a9f3b788d4be37ff25d52cb29f7ec8105fbd8b90129073e78cd033.exe 79 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1136 1063141a71a9f3b788d4be37ff25d52cb29f7ec8105fbd8b90129073e78cd033.exe Token: SeDebugPrivilege 4028 RegAsm.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1136 wrote to memory of 4028 1136 1063141a71a9f3b788d4be37ff25d52cb29f7ec8105fbd8b90129073e78cd033.exe 79 PID 1136 wrote to memory of 4028 1136 1063141a71a9f3b788d4be37ff25d52cb29f7ec8105fbd8b90129073e78cd033.exe 79 PID 1136 wrote to memory of 4028 1136 1063141a71a9f3b788d4be37ff25d52cb29f7ec8105fbd8b90129073e78cd033.exe 79 PID 1136 wrote to memory of 4028 1136 1063141a71a9f3b788d4be37ff25d52cb29f7ec8105fbd8b90129073e78cd033.exe 79 PID 1136 wrote to memory of 4028 1136 1063141a71a9f3b788d4be37ff25d52cb29f7ec8105fbd8b90129073e78cd033.exe 79 PID 1136 wrote to memory of 4028 1136 1063141a71a9f3b788d4be37ff25d52cb29f7ec8105fbd8b90129073e78cd033.exe 79 PID 1136 wrote to memory of 4028 1136 1063141a71a9f3b788d4be37ff25d52cb29f7ec8105fbd8b90129073e78cd033.exe 79 PID 1136 wrote to memory of 4028 1136 1063141a71a9f3b788d4be37ff25d52cb29f7ec8105fbd8b90129073e78cd033.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\1063141a71a9f3b788d4be37ff25d52cb29f7ec8105fbd8b90129073e78cd033.exe"C:\Users\Admin\AppData\Local\Temp\1063141a71a9f3b788d4be37ff25d52cb29f7ec8105fbd8b90129073e78cd033.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4028
-