Analysis

  • max time kernel
    77s
  • max time network
    73s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-08-2024 02:49

General

  • Target

    New folder/Anarchy Panel.exe

  • Size

    54.6MB

  • MD5

    94bac1a0cc0dbac256f0d3b4c90648c2

  • SHA1

    4abcb8a31881e88322f6a37cbb24a14a80c6eef2

  • SHA256

    50c2dba1d961e09cb8df397b71bd3b6a32d0ee6dbe886e7309305dc4ba968f94

  • SHA512

    30ecee38d5d641abaf73e09a23c614cb3b8b84aa1f8ff1818e92c1f2b51bf6841d3e51564aecb5efd01a3d98db88f0938e7dd4ee9c74ca5477785c33c969ffd9

  • SSDEEP

    786432:RvcKHU1yll1EcgYwm/7hPo9b9DMs2PTUpRYj:lPU4bZwm/NwEIYj

Score
10/10

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • .NET Reactor proctector 1 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Loads dropped DLL 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\New folder\Anarchy Panel.exe
    "C:\Users\Admin\AppData\Local\Temp\New folder\Anarchy Panel.exe"
    1⤵
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:692
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4216,i,16316361669272684588,6171287487746154806,262144 --variations-seed-version --mojo-platform-channel-handle=4128 /prefetch:8
    1⤵
      PID:3984
    • C:\Windows\system32\wbem\WmiApSrv.exe
      C:\Windows\system32\wbem\WmiApSrv.exe
      1⤵
        PID:3588

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Costura\C5730A4C0FDD612A5678E51A536CE09E\64\sqlite.interop.dll

        Filesize

        1.7MB

        MD5

        56a504a34d2cfbfc7eaa2b68e34af8ad

        SHA1

        426b48b0f3b691e3bb29f465aed9b936f29fc8cc

        SHA256

        9309fb2a3f326d0f2cc3f2ab837cfd02e4f8cb6b923b3b2be265591fd38f4961

        SHA512

        170c3645083d869e2368ee16325d7edaeba2d8f1d3d4a6a1054cfdd8616e03073772eeae30c8f79a93173825f83891e7b0e4fd89ef416808359f715a641747d7

      • memory/692-17-0x0000000023A70000-0x0000000023A84000-memory.dmp

        Filesize

        80KB

      • memory/692-39-0x00007FFA24B60000-0x00007FFA25621000-memory.dmp

        Filesize

        10.8MB

      • memory/692-16-0x00000000237D0000-0x000000002391E000-memory.dmp

        Filesize

        1.3MB

      • memory/692-1-0x00000000005A0000-0x0000000003C3E000-memory.dmp

        Filesize

        54.6MB

      • memory/692-8-0x0000000005E10000-0x0000000005E22000-memory.dmp

        Filesize

        72KB

      • memory/692-9-0x000000001ED60000-0x000000001F348000-memory.dmp

        Filesize

        5.9MB

      • memory/692-10-0x000000001F350000-0x000000001F710000-memory.dmp

        Filesize

        3.8MB

      • memory/692-11-0x00007FFA24B60000-0x00007FFA25621000-memory.dmp

        Filesize

        10.8MB

      • memory/692-12-0x00007FFA24B60000-0x00007FFA25621000-memory.dmp

        Filesize

        10.8MB

      • memory/692-13-0x00007FFA24B60000-0x00007FFA25621000-memory.dmp

        Filesize

        10.8MB

      • memory/692-14-0x00007FFA24B60000-0x00007FFA25621000-memory.dmp

        Filesize

        10.8MB

      • memory/692-15-0x0000000022F40000-0x0000000023192000-memory.dmp

        Filesize

        2.3MB

      • memory/692-3-0x00007FFA24B60000-0x00007FFA25621000-memory.dmp

        Filesize

        10.8MB

      • memory/692-2-0x00007FFA24B60000-0x00007FFA25621000-memory.dmp

        Filesize

        10.8MB

      • memory/692-25-0x00007FFA24B60000-0x00007FFA25621000-memory.dmp

        Filesize

        10.8MB

      • memory/692-19-0x00007FFA24B63000-0x00007FFA24B65000-memory.dmp

        Filesize

        8KB

      • memory/692-20-0x00007FFA24B60000-0x00007FFA25621000-memory.dmp

        Filesize

        10.8MB

      • memory/692-21-0x00007FFA24B60000-0x00007FFA25621000-memory.dmp

        Filesize

        10.8MB

      • memory/692-22-0x00007FFA24B60000-0x00007FFA25621000-memory.dmp

        Filesize

        10.8MB

      • memory/692-23-0x00007FFA24B60000-0x00007FFA25621000-memory.dmp

        Filesize

        10.8MB

      • memory/692-24-0x00007FFA24B60000-0x00007FFA25621000-memory.dmp

        Filesize

        10.8MB

      • memory/692-18-0x00007FFA24B60000-0x00007FFA25621000-memory.dmp

        Filesize

        10.8MB

      • memory/692-26-0x0000000023A20000-0x0000000023A32000-memory.dmp

        Filesize

        72KB

      • memory/692-27-0x00000000253C0000-0x0000000025638000-memory.dmp

        Filesize

        2.5MB

      • memory/692-33-0x000000001E990000-0x000000001E99A000-memory.dmp

        Filesize

        40KB

      • memory/692-36-0x00007FFA24B60000-0x00007FFA25621000-memory.dmp

        Filesize

        10.8MB

      • memory/692-0-0x00007FFA24B63000-0x00007FFA24B65000-memory.dmp

        Filesize

        8KB