Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03-08-2024 12:44
Behavioral task
behavioral1
Sample
141dbd540ae2a9a07dba2c3e1508cdd5bfbdf44ec4fecac7ea69b4d48b7c0db3.exe
Resource
win7-20240729-en
General
-
Target
141dbd540ae2a9a07dba2c3e1508cdd5bfbdf44ec4fecac7ea69b4d48b7c0db3.exe
-
Size
64KB
-
MD5
b5869ca2bc01b3f51ee0ec4d2cdf8925
-
SHA1
af1382af0c1f1f64e07d744487f3205d17fddf96
-
SHA256
141dbd540ae2a9a07dba2c3e1508cdd5bfbdf44ec4fecac7ea69b4d48b7c0db3
-
SHA512
6ab6b25427b82e0275baea545bc4ea800d5dcab0a0f21eea809b418c4c2e71708885ad1c91cd2659ea67bfffeb3420b5cc47e2bc1a2c9f005f2754c362e5073d
-
SSDEEP
1536:zQ9KoccuIkQKHHUN26blwl8UtinZVclN:zGKocrIk5nE26blY8RzY
Malware Config
Extracted
asyncrat
WinRat [beta]
crypt
123423543
-
c2_url_file
https://raw.githubusercontent.com/valp3r/TestNoSocket/main/589734gfmngr09e.bin
-
delay
1
-
install
false
-
install_file
UnityLisency.exe
-
install_folder
%AppData%
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 28 IoCs
Processes:
flow ioc 5 raw.githubusercontent.com 12 raw.githubusercontent.com 24 raw.githubusercontent.com 30 raw.githubusercontent.com 11 raw.githubusercontent.com 15 raw.githubusercontent.com 16 raw.githubusercontent.com 21 raw.githubusercontent.com 22 raw.githubusercontent.com 10 raw.githubusercontent.com 13 raw.githubusercontent.com 9 raw.githubusercontent.com 23 raw.githubusercontent.com 18 raw.githubusercontent.com 26 raw.githubusercontent.com 29 raw.githubusercontent.com 6 raw.githubusercontent.com 14 raw.githubusercontent.com 17 raw.githubusercontent.com 20 raw.githubusercontent.com 28 raw.githubusercontent.com 31 raw.githubusercontent.com 7 raw.githubusercontent.com 8 raw.githubusercontent.com 25 raw.githubusercontent.com 27 raw.githubusercontent.com 4 raw.githubusercontent.com 19 raw.githubusercontent.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
141dbd540ae2a9a07dba2c3e1508cdd5bfbdf44ec4fecac7ea69b4d48b7c0db3.exedescription pid process Token: SeDebugPrivilege 1544 141dbd540ae2a9a07dba2c3e1508cdd5bfbdf44ec4fecac7ea69b4d48b7c0db3.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1544-1-0x0000000000F10000-0x0000000000F26000-memory.dmpFilesize
88KB
-
memory/1544-0-0x000007FEF5463000-0x000007FEF5464000-memory.dmpFilesize
4KB
-
memory/1544-2-0x000007FEF5460000-0x000007FEF5E4C000-memory.dmpFilesize
9.9MB
-
memory/1544-3-0x000007FEF5460000-0x000007FEF5E4C000-memory.dmpFilesize
9.9MB
-
memory/1544-4-0x000007FEF5463000-0x000007FEF5464000-memory.dmpFilesize
4KB
-
memory/1544-5-0x000007FEF5460000-0x000007FEF5E4C000-memory.dmpFilesize
9.9MB