Analysis

  • max time kernel
    1442s
  • max time network
    1449s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    22-07-2024 09:36

General

  • Target

    AsyncRAT_Modified.7z

  • Size

    25.9MB

  • MD5

    e8ece2bce3aa35c3c7ea3396eec0fdab

  • SHA1

    70e6176f05e048e309650f976b0ec87fbe7bb310

  • SHA256

    34155c536f48f9f58f8478ae666f995e23a17af679075294971fa77497c9385d

  • SHA512

    66e4c643be85be013c5912f9fe5776cff73112c6636e633bde98aa5f29cb85ca2d7ccc1fa843c10715f7157f3b1b35d5bd2a3c0822d4b82d7f9f81c5067f5fde

  • SSDEEP

    786432:6prWIWmB7N3hP4nW5zlVDmV4r/2LWhJIT5HcbkwLOvypMBIQFF8MI:LIWQXvzlVqV4725HZwBpO1I

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\AsyncRAT_Modified.7z
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2056
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\AsyncRAT_Modified.7z
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:564
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\AsyncRAT_Modified.7z
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2744
        • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
          "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\AsyncRAT_Modified.7z"
          4⤵
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          PID:1248

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    57b445848a24d149dc82754efc3b027a

    SHA1

    395bb6f3e1ce774a3093f225ef9ec1036ffb6bd6

    SHA256

    2c18cdd8d59743032840584f71a66e773819bf75554b383ca6f566c7537b623e

    SHA512

    c5a6239e86c88ddcc24bbcc73b77c584c4d2e185c275ebb0d7475725169c1b48cfb6d2b8afd79d8652e0647ba615b33ca39d1b7abb8ff662cbb657932a450fe2