Analysis
-
max time kernel
1442s -
max time network
1449s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22-07-2024 09:36
Behavioral task
behavioral1
Sample
AsyncRAT_Modified.7z
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
AsyncRAT_Modified.7z
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
AsyncRAT_Modified.7z
Resource
win10v2004-20240709-en
Behavioral task
behavioral4
Sample
AsyncRAT_Modified.7z
Resource
win11-20240709-en
General
-
Target
AsyncRAT_Modified.7z
-
Size
25.9MB
-
MD5
e8ece2bce3aa35c3c7ea3396eec0fdab
-
SHA1
70e6176f05e048e309650f976b0ec87fbe7bb310
-
SHA256
34155c536f48f9f58f8478ae666f995e23a17af679075294971fa77497c9385d
-
SHA512
66e4c643be85be013c5912f9fe5776cff73112c6636e633bde98aa5f29cb85ca2d7ccc1fa843c10715f7157f3b1b35d5bd2a3c0822d4b82d7f9f81c5067f5fde
-
SSDEEP
786432:6prWIWmB7N3hP4nW5zlVDmV4r/2LWhJIT5HcbkwLOvypMBIQFF8MI:LIWQXvzlVqV4725HZwBpO1I
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1248 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1248 AcroRd32.exe 1248 AcroRd32.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2056 wrote to memory of 564 2056 cmd.exe 30 PID 2056 wrote to memory of 564 2056 cmd.exe 30 PID 2056 wrote to memory of 564 2056 cmd.exe 30 PID 564 wrote to memory of 2744 564 rundll32.exe 31 PID 564 wrote to memory of 2744 564 rundll32.exe 31 PID 564 wrote to memory of 2744 564 rundll32.exe 31 PID 2744 wrote to memory of 1248 2744 rundll32.exe 33 PID 2744 wrote to memory of 1248 2744 rundll32.exe 33 PID 2744 wrote to memory of 1248 2744 rundll32.exe 33 PID 2744 wrote to memory of 1248 2744 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\AsyncRAT_Modified.7z1⤵
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\AsyncRAT_Modified.7z2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\AsyncRAT_Modified.7z3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\AsyncRAT_Modified.7z"4⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1248
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD557b445848a24d149dc82754efc3b027a
SHA1395bb6f3e1ce774a3093f225ef9ec1036ffb6bd6
SHA2562c18cdd8d59743032840584f71a66e773819bf75554b383ca6f566c7537b623e
SHA512c5a6239e86c88ddcc24bbcc73b77c584c4d2e185c275ebb0d7475725169c1b48cfb6d2b8afd79d8652e0647ba615b33ca39d1b7abb8ff662cbb657932a450fe2