Analysis
-
max time kernel
131s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-08-2024 08:35
Static task
static1
Behavioral task
behavioral1
Sample
audiencia de conciliación extrajudicial 4875851245896325478451245.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
audiencia de conciliación extrajudicial 4875851245896325478451245.exe
Resource
win10v2004-20240802-en
General
-
Target
audiencia de conciliación extrajudicial 4875851245896325478451245.exe
-
Size
4.9MB
-
MD5
6a4bbf3b5eabe3a212c36cf545d80253
-
SHA1
272837f140e3043de858467c8f7c3492b8d32f0a
-
SHA256
f092b7606233d1512530c5680b4e4ea17212f24024374bfd96061cd7260a0ffa
-
SHA512
5150c6b6e1fc127fba794f7f5e0b6ea8d4cfd066e3d0811cd0ff1d8297952db550eb1e47ed0e8109afb172b4dfb573f1c5eec1769164ead98c6737386f5038de
-
SSDEEP
49152:Kuz9nCckM8wwGbtBiRFWSGqCW4FL5wslsAEL1ksS2NHsF3TjZ1S058qpMfoLI:KuRCwrb64XwWsAwFaFXj8qMQLI
Malware Config
Extracted
asyncrat
1.0.7
Default
dxpam.duckdns.org:5999
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IoloManager = "C:\\Users\\Admin\\Pictures\\Iolo\\IoloManager.exe" audiencia de conciliación extrajudicial 4875851245896325478451245.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3064 set thread context of 948 3064 audiencia de conciliación extrajudicial 4875851245896325478451245.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language audiencia de conciliación extrajudicial 4875851245896325478451245.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 948 csc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3064 wrote to memory of 948 3064 audiencia de conciliación extrajudicial 4875851245896325478451245.exe 94 PID 3064 wrote to memory of 948 3064 audiencia de conciliación extrajudicial 4875851245896325478451245.exe 94 PID 3064 wrote to memory of 948 3064 audiencia de conciliación extrajudicial 4875851245896325478451245.exe 94 PID 3064 wrote to memory of 948 3064 audiencia de conciliación extrajudicial 4875851245896325478451245.exe 94 PID 3064 wrote to memory of 948 3064 audiencia de conciliación extrajudicial 4875851245896325478451245.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\audiencia de conciliación extrajudicial 4875851245896325478451245.exe"C:\Users\Admin\AppData\Local\Temp\audiencia de conciliación extrajudicial 4875851245896325478451245.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1436,i,3210801877307184477,8078594481454001567,262144 --variations-seed-version --mojo-platform-channel-handle=4388 /prefetch:81⤵PID:840