Analysis

  • max time kernel
    141s
  • max time network
    156s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-07-2024 10:18

General

  • Target

    n.exe

  • Size

    58KB

  • MD5

    45f751b95f8f7b7109037d93c31dca94

  • SHA1

    5c206b274e942fb3eb3242a3ba7cb83ca7c8b3bc

  • SHA256

    21110b3fea3acb08b2473cd1ab0cc419ca0abfb1a9d49e380eb2d78bc80b020f

  • SHA512

    be072dce776158d27069eb96d9332e62bb761823e3e158083f64304879fc00d538b1bfa78d4ed55efb50c5630f043501da58923d7d5f30c1e26d9f52cea878a0

  • SSDEEP

    1536:tEKEJoIoSSTTRBfHiCvSbidURpD8kXYFvf+:2Kmo3tBlSbieRXYVm

Malware Config

Extracted

Family

asyncrat

Version

SuperBoo Rat v1.1

Botnet

Default

C2

127.0.0.1:1337

127.0.0.1:5552

127.0.0.1:6703

le-pencil.gl.at.ply.gg:1337

le-pencil.gl.at.ply.gg:5552

le-pencil.gl.at.ply.gg:6703

Mutex

SuperBoo_mtex_920393

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\n.exe
    "C:\Users\Admin\AppData\Local\Temp\n.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4128

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4128-0-0x000000007324E000-0x000000007324F000-memory.dmp

    Filesize

    4KB

  • memory/4128-1-0x0000000000440000-0x0000000000454000-memory.dmp

    Filesize

    80KB

  • memory/4128-2-0x0000000073240000-0x000000007392E000-memory.dmp

    Filesize

    6.9MB

  • memory/4128-3-0x000000007324E000-0x000000007324F000-memory.dmp

    Filesize

    4KB

  • memory/4128-4-0x0000000073240000-0x000000007392E000-memory.dmp

    Filesize

    6.9MB

  • memory/4128-7-0x0000000005860000-0x00000000058FC000-memory.dmp

    Filesize

    624KB

  • memory/4128-8-0x0000000006140000-0x000000000663E000-memory.dmp

    Filesize

    5.0MB

  • memory/4128-9-0x0000000005CB0000-0x0000000005D16000-memory.dmp

    Filesize

    408KB

  • memory/4128-11-0x0000000005CA0000-0x0000000005CAE000-memory.dmp

    Filesize

    56KB

  • memory/4128-10-0x0000000006740000-0x00000000067B6000-memory.dmp

    Filesize

    472KB

  • memory/4128-12-0x00000000067E0000-0x00000000067FE000-memory.dmp

    Filesize

    120KB

  • memory/4128-13-0x0000000006CF0000-0x0000000006D82000-memory.dmp

    Filesize

    584KB

  • memory/4128-14-0x0000000006BD0000-0x0000000006BDE000-memory.dmp

    Filesize

    56KB

  • memory/4128-15-0x0000000006E50000-0x0000000006E5C000-memory.dmp

    Filesize

    48KB