Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
19-07-2024 23:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
sigma8.exe
Resource
win11-20240709-en
windows11-21h2-x64
4 signatures
150 seconds
General
-
Target
sigma8.exe
-
Size
317KB
-
MD5
3f5d49e0931b38e06bc462ece96e05eb
-
SHA1
3f8e5cc785431afbeaeec4c03e020e1fb98b8c9a
-
SHA256
b51ccac9172b10f3b730c8ae7353cd11bfe2ead8cc8d0e153bada5ad23e1e090
-
SHA512
67cc3f844403308eaa13ded7e0c4167f0878e3faed0813a23559d15097b0d7c7884922bb913b895ffeb3078ed2130646a8d9f13af05d4c20e33e0c162fe2fb0a
-
SSDEEP
6144:rrlK1ugS2q7Yu2+Kpe7dYXq2r0xAKyGJlETs9lWXoIsJVl85hee5hur:rrlYu2D87XmnBTs95ordbW
Score
10/10
Malware Config
Extracted
Family
asyncrat
Version
0.5.8
Botnet
Default
C2
10.8.0.4:6606
10.8.0.4:7707
10.8.0.4:8808
Mutex
jKcnVXaROJ1n
Attributes
-
delay
3
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/memory/3984-10-0x000001378EE20000-0x000001378EE32000-memory.dmp family_asyncrat -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3666881604-935092360-1617577973-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Google Chrome Updater QC = "C:\\Users\\Admin\\AppData\\Roaming\\Google Chrome\\Update Service\\Chrome Update Daemon.exe" sigma8.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2612 wrote to memory of 3984 2612 sigma8.exe 88 PID 2612 wrote to memory of 3984 2612 sigma8.exe 88 PID 2612 wrote to memory of 3984 2612 sigma8.exe 88 PID 2612 wrote to memory of 3984 2612 sigma8.exe 88 PID 2612 wrote to memory of 3984 2612 sigma8.exe 88 PID 2612 wrote to memory of 3984 2612 sigma8.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\sigma8.exe"C:\Users\Admin\AppData\Local\Temp\sigma8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe"2⤵PID:3984
-