Analysis
-
max time kernel
92s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2024 17:07
Behavioral task
behavioral1
Sample
595d23b3fc8264dd990d995b23879b187fc2934cbfbb472c4dd0fefac1b0018e.exe
Resource
win7-20240708-en
General
-
Target
595d23b3fc8264dd990d995b23879b187fc2934cbfbb472c4dd0fefac1b0018e.exe
-
Size
63KB
-
MD5
3b369d802dd1bcbb9581d2b291845bee
-
SHA1
9536c94f31e4bd44eda47137a21d4f2a9576505a
-
SHA256
595d23b3fc8264dd990d995b23879b187fc2934cbfbb472c4dd0fefac1b0018e
-
SHA512
e7d03c9afee1f805d86ae846ace15d8c6501ecd94c1e1890e28e847c7242f6150a7296d6bb70623a2469e1831c10129836f045239270cb20441620a9765d1689
-
SSDEEP
1536:6JuVTHUv8HtonJTnhKfMZ4JGbbpwj2TRZWKG/kpqKmY7:6JuVTHUv8HyJ7hfgGbbp9TRZWZvz
Malware Config
Extracted
asyncrat
ChuWaWa Rat 5.2
Default
31.173.170.243:7777
31.173.170.243:45080
stores-less.gl.at.ply.gg:7777
stores-less.gl.at.ply.gg:45080
AtomRatMutex_penka
-
delay
1
-
install
true
-
install_file
RuntimeBroker.exe
-
install_folder
%AppData%
Signatures
-
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3972 595d23b3fc8264dd990d995b23879b187fc2934cbfbb472c4dd0fefac1b0018e.exe Token: SeSecurityPrivilege 3972 595d23b3fc8264dd990d995b23879b187fc2934cbfbb472c4dd0fefac1b0018e.exe Token: SeTakeOwnershipPrivilege 3972 595d23b3fc8264dd990d995b23879b187fc2934cbfbb472c4dd0fefac1b0018e.exe Token: SeLoadDriverPrivilege 3972 595d23b3fc8264dd990d995b23879b187fc2934cbfbb472c4dd0fefac1b0018e.exe Token: SeSystemProfilePrivilege 3972 595d23b3fc8264dd990d995b23879b187fc2934cbfbb472c4dd0fefac1b0018e.exe Token: SeSystemtimePrivilege 3972 595d23b3fc8264dd990d995b23879b187fc2934cbfbb472c4dd0fefac1b0018e.exe Token: SeProfSingleProcessPrivilege 3972 595d23b3fc8264dd990d995b23879b187fc2934cbfbb472c4dd0fefac1b0018e.exe Token: SeIncBasePriorityPrivilege 3972 595d23b3fc8264dd990d995b23879b187fc2934cbfbb472c4dd0fefac1b0018e.exe Token: SeCreatePagefilePrivilege 3972 595d23b3fc8264dd990d995b23879b187fc2934cbfbb472c4dd0fefac1b0018e.exe Token: SeBackupPrivilege 3972 595d23b3fc8264dd990d995b23879b187fc2934cbfbb472c4dd0fefac1b0018e.exe Token: SeRestorePrivilege 3972 595d23b3fc8264dd990d995b23879b187fc2934cbfbb472c4dd0fefac1b0018e.exe Token: SeShutdownPrivilege 3972 595d23b3fc8264dd990d995b23879b187fc2934cbfbb472c4dd0fefac1b0018e.exe Token: SeDebugPrivilege 3972 595d23b3fc8264dd990d995b23879b187fc2934cbfbb472c4dd0fefac1b0018e.exe Token: SeSystemEnvironmentPrivilege 3972 595d23b3fc8264dd990d995b23879b187fc2934cbfbb472c4dd0fefac1b0018e.exe Token: SeRemoteShutdownPrivilege 3972 595d23b3fc8264dd990d995b23879b187fc2934cbfbb472c4dd0fefac1b0018e.exe Token: SeUndockPrivilege 3972 595d23b3fc8264dd990d995b23879b187fc2934cbfbb472c4dd0fefac1b0018e.exe Token: SeManageVolumePrivilege 3972 595d23b3fc8264dd990d995b23879b187fc2934cbfbb472c4dd0fefac1b0018e.exe Token: 33 3972 595d23b3fc8264dd990d995b23879b187fc2934cbfbb472c4dd0fefac1b0018e.exe Token: 34 3972 595d23b3fc8264dd990d995b23879b187fc2934cbfbb472c4dd0fefac1b0018e.exe Token: 35 3972 595d23b3fc8264dd990d995b23879b187fc2934cbfbb472c4dd0fefac1b0018e.exe Token: 36 3972 595d23b3fc8264dd990d995b23879b187fc2934cbfbb472c4dd0fefac1b0018e.exe