Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
30-07-2024 07:39
Static task
static1
Behavioral task
behavioral1
Sample
5393855b310e160d5643744a5ad1cc91.exe
Resource
win7-20240704-en
General
-
Target
5393855b310e160d5643744a5ad1cc91.exe
-
Size
131KB
-
MD5
5393855b310e160d5643744a5ad1cc91
-
SHA1
a2b4b4504f1f272e33b18a6fbb98f4e5c0c371f2
-
SHA256
068e03599b7f71f00c5ee9ee6b8d574cb722fa9b9302ef094cb8b99e94ea8ca1
-
SHA512
ab1b87b32f79559b1d9756f982c8f992f86e0554de57abe19c6b5567ce0bd3c4cd275d0f3aa1a41c9ac18ea49f265f85d5a94967e0240cf840a8f779bbbd6b85
-
SSDEEP
3072:vWayOLin02remkN7l5cZcLVSZhYoCL26+9P46yf8GOrOfm:v3yOmBr0yyfi7NNy
Malware Config
Extracted
asyncrat
0.5.8
Default
85.28.47.123:7707
QTApl4idKp8T
-
delay
3
-
install
false
-
install_file
microsoftedge.exe
-
install_folder
%AppData%
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1932 set thread context of 2512 1932 5393855b310e160d5643744a5ad1cc91.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5393855b310e160d5643744a5ad1cc91.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1932 5393855b310e160d5643744a5ad1cc91.exe 1932 5393855b310e160d5643744a5ad1cc91.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1932 5393855b310e160d5643744a5ad1cc91.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1932 wrote to memory of 4260 1932 5393855b310e160d5643744a5ad1cc91.exe 84 PID 1932 wrote to memory of 4260 1932 5393855b310e160d5643744a5ad1cc91.exe 84 PID 1932 wrote to memory of 4260 1932 5393855b310e160d5643744a5ad1cc91.exe 84 PID 1932 wrote to memory of 2512 1932 5393855b310e160d5643744a5ad1cc91.exe 86 PID 1932 wrote to memory of 2512 1932 5393855b310e160d5643744a5ad1cc91.exe 86 PID 1932 wrote to memory of 2512 1932 5393855b310e160d5643744a5ad1cc91.exe 86 PID 1932 wrote to memory of 2512 1932 5393855b310e160d5643744a5ad1cc91.exe 86 PID 1932 wrote to memory of 2512 1932 5393855b310e160d5643744a5ad1cc91.exe 86 PID 1932 wrote to memory of 2512 1932 5393855b310e160d5643744a5ad1cc91.exe 86 PID 1932 wrote to memory of 2512 1932 5393855b310e160d5643744a5ad1cc91.exe 86 PID 1932 wrote to memory of 2512 1932 5393855b310e160d5643744a5ad1cc91.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\5393855b310e160d5643744a5ad1cc91.exe"C:\Users\Admin\AppData\Local\Temp\5393855b310e160d5643744a5ad1cc91.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:4260
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2512
-