Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
30-07-2024 07:38
Static task
static1
Behavioral task
behavioral1
Sample
5393855b310e160d5643744a5ad1cc91.exe
Resource
win7-20240704-en
General
-
Target
5393855b310e160d5643744a5ad1cc91.exe
-
Size
131KB
-
MD5
5393855b310e160d5643744a5ad1cc91
-
SHA1
a2b4b4504f1f272e33b18a6fbb98f4e5c0c371f2
-
SHA256
068e03599b7f71f00c5ee9ee6b8d574cb722fa9b9302ef094cb8b99e94ea8ca1
-
SHA512
ab1b87b32f79559b1d9756f982c8f992f86e0554de57abe19c6b5567ce0bd3c4cd275d0f3aa1a41c9ac18ea49f265f85d5a94967e0240cf840a8f779bbbd6b85
-
SSDEEP
3072:vWayOLin02remkN7l5cZcLVSZhYoCL26+9P46yf8GOrOfm:v3yOmBr0yyfi7NNy
Malware Config
Extracted
asyncrat
0.5.8
Default
85.28.47.123:7707
QTApl4idKp8T
-
delay
3
-
install
false
-
install_file
microsoftedge.exe
-
install_folder
%AppData%
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1056 set thread context of 1652 1056 5393855b310e160d5643744a5ad1cc91.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5393855b310e160d5643744a5ad1cc91.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1056 wrote to memory of 1652 1056 5393855b310e160d5643744a5ad1cc91.exe 86 PID 1056 wrote to memory of 1652 1056 5393855b310e160d5643744a5ad1cc91.exe 86 PID 1056 wrote to memory of 1652 1056 5393855b310e160d5643744a5ad1cc91.exe 86 PID 1056 wrote to memory of 1652 1056 5393855b310e160d5643744a5ad1cc91.exe 86 PID 1056 wrote to memory of 1652 1056 5393855b310e160d5643744a5ad1cc91.exe 86 PID 1056 wrote to memory of 1652 1056 5393855b310e160d5643744a5ad1cc91.exe 86 PID 1056 wrote to memory of 1652 1056 5393855b310e160d5643744a5ad1cc91.exe 86 PID 1056 wrote to memory of 1652 1056 5393855b310e160d5643744a5ad1cc91.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\5393855b310e160d5643744a5ad1cc91.exe"C:\Users\Admin\AppData\Local\Temp\5393855b310e160d5643744a5ad1cc91.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1652
-