Analysis
-
max time kernel
135s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2024 07:07
Behavioral task
behavioral1
Sample
1721804764a66192ba8849c107aecf73332780289e57101d88022de3de452c4d4afc349344344.dat-decoded.exe
Resource
win7-20240708-en
windows7-x64
2 signatures
150 seconds
General
-
Target
1721804764a66192ba8849c107aecf73332780289e57101d88022de3de452c4d4afc349344344.dat-decoded.exe
-
Size
63KB
-
MD5
496312b110d506032227dcfb19ac70bb
-
SHA1
971c2fda616b7f2ed24633a6cfecb57abc3988cf
-
SHA256
0fbf52d1174106e43acfb53511e3b2dbc45f43687fe00e677723961e850bd7e0
-
SHA512
ed33a1eac0040eb4ff68b3a2b2843c80ead4accce7e178ac4ffbef852bacb636882862886b2d46242e966130c9b07cf663329988e165f45adeb38504eff6f1db
-
SSDEEP
1536:qEXizR3NzJWtrUbYh9W7lW3usdpqKmY7:qZzRdzJurUbYOiGz
Malware Config
Extracted
Family
asyncrat
Botnet
Default
C2
deopjef.duckdns.org:20245
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
Processes
-
C:\Users\Admin\AppData\Local\Temp\1721804764a66192ba8849c107aecf73332780289e57101d88022de3de452c4d4afc349344344.dat-decoded.exe"C:\Users\Admin\AppData\Local\Temp\1721804764a66192ba8849c107aecf73332780289e57101d88022de3de452c4d4afc349344344.dat-decoded.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1528