Analysis
-
max time kernel
26s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24-07-2024 13:05
Static task
static1
Behavioral task
behavioral1
Sample
8bd1977b9103ba367f4ef6dab9faeca0N.exe
Resource
win7-20240705-en
General
-
Target
8bd1977b9103ba367f4ef6dab9faeca0N.exe
-
Size
58KB
-
MD5
8bd1977b9103ba367f4ef6dab9faeca0
-
SHA1
08e87dfef23486e089bf42cc9048297cdad48005
-
SHA256
aa00ecf9f75092b10571a992d4a6c736939eef4b742cf0e735a1c7c4a7ee71eb
-
SHA512
adb8d875752102220d18e1f067c9d58378f79538faa951edbb95a858128d21ad0520802013789a175de12ec6e6341d69f96bcdf206e6bf5ee6aa4958baca8b97
-
SSDEEP
1536:PgdmilPJab/ZNKyLJeA/CTVIU9w2yCgP75dBAwQ4Dca:al3qNKoe8gVI+DgPNcw99
Malware Config
Extracted
asyncrat
1.0.7
Default
darknessdz.ddns.net:1177
DcRatMutex_qwqdanchun
-
delay
10
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x00080000000175f2-9.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 1860 edge.exe -
Loads dropped DLL 1 IoCs
pid Process 2960 8bd1977b9103ba367f4ef6dab9faeca0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8bd1977b9103ba367f4ef6dab9faeca0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2960 wrote to memory of 1860 2960 8bd1977b9103ba367f4ef6dab9faeca0N.exe 31 PID 2960 wrote to memory of 1860 2960 8bd1977b9103ba367f4ef6dab9faeca0N.exe 31 PID 2960 wrote to memory of 1860 2960 8bd1977b9103ba367f4ef6dab9faeca0N.exe 31 PID 2960 wrote to memory of 1860 2960 8bd1977b9103ba367f4ef6dab9faeca0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8bd1977b9103ba367f4ef6dab9faeca0N.exe"C:\Users\Admin\AppData\Local\Temp\8bd1977b9103ba367f4ef6dab9faeca0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\edge.exe"C:\Users\Admin\AppData\Local\Temp\edge.exe"2⤵
- Executes dropped EXE
PID:1860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5b1337fc76c1e8f218b5dc4e87307a15d
SHA1522439c505edc1388249034420af28b87e46727c
SHA25616619eff9b177087be47f503b0cb2db02061637125a4ec7111bb54b828b95d0a
SHA512c6f057cd82d6c01d7994520be3c5afc205fe1972b0bc5d583cc80aedcabc8a10c3bb43dcfb13f5a48362d99a4e07e127140a1211fadf52ddfd03251412774c1b