Analysis
-
max time kernel
75s -
max time network
64s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-08-2024 08:20
Behavioral task
behavioral1
Sample
test.exe
Resource
win7-20240705-en
windows7-x64
9 signatures
150 seconds
General
-
Target
test.exe
-
Size
45KB
-
MD5
7f29206fc82a922c7f468f1a8c626040
-
SHA1
583ba79e6acd22bfafcef10a13b30a0043f73537
-
SHA256
70c7ef5fc6bc175a30fc1436ee76e05118d1a0c8310a454c373bc5e851689e08
-
SHA512
1896d659e381dbbbd208945bde36991efaef57eb515121adfb5e8a4d2a241e4098ef31815c523782c880d8a98b5f2c5e39a9e1984a5c86b523b3f66e9c158be9
-
SSDEEP
768:Cu/dRTUo0HQbWUnmjSmo2qMh8V1NpxTcPI1zjbkgX3iQ90K6oayV9BDZ2x:Cu/dRTUPE2l8VXPTh13brXSQ90mVTd2x
Malware Config
Extracted
Family
asyncrat
Version
0.5.8
Botnet
Default
C2
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
Mutex
RFI09QOr7ybB
Attributes
-
delay
3
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language test.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 864 test.exe Token: SeDebugPrivilege 864 test.exe