Analysis
-
max time kernel
134s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 14:24
Behavioral task
behavioral1
Sample
db504171c7ece47c2ca76a9bf4343b98a4196fec57f74430729b57c180fc219a.exe
Resource
win7-20240705-en
5 signatures
150 seconds
General
-
Target
db504171c7ece47c2ca76a9bf4343b98a4196fec57f74430729b57c180fc219a.exe
-
Size
77KB
-
MD5
8e358be8819281482ce33f1d3335a2d5
-
SHA1
5e787f0d977c44edd0f65be22fb996be82223603
-
SHA256
db504171c7ece47c2ca76a9bf4343b98a4196fec57f74430729b57c180fc219a
-
SHA512
3ea7d496d0806354de3da51fca9681c6a2c9b3d77d54ac5db4cc58e2d7c4334274080a990c954e3cea601385d9a0d05c4bf758d614a2f535cd69525c92cdeb82
-
SSDEEP
1536:5huKQkz01I8B3HqJSlb70neUI3pqKmY7:H9z0e8BGSlb7Bkz
Malware Config
Extracted
Family
asyncrat
Version
v1.0.8
Botnet
Default
C2
38.91.118.194:7415
Mutex
qccopvsmryslxi
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4736 db504171c7ece47c2ca76a9bf4343b98a4196fec57f74430729b57c180fc219a.exe 4736 db504171c7ece47c2ca76a9bf4343b98a4196fec57f74430729b57c180fc219a.exe 4736 db504171c7ece47c2ca76a9bf4343b98a4196fec57f74430729b57c180fc219a.exe 4736 db504171c7ece47c2ca76a9bf4343b98a4196fec57f74430729b57c180fc219a.exe 4736 db504171c7ece47c2ca76a9bf4343b98a4196fec57f74430729b57c180fc219a.exe 4736 db504171c7ece47c2ca76a9bf4343b98a4196fec57f74430729b57c180fc219a.exe 4736 db504171c7ece47c2ca76a9bf4343b98a4196fec57f74430729b57c180fc219a.exe 4736 db504171c7ece47c2ca76a9bf4343b98a4196fec57f74430729b57c180fc219a.exe 4736 db504171c7ece47c2ca76a9bf4343b98a4196fec57f74430729b57c180fc219a.exe 4736 db504171c7ece47c2ca76a9bf4343b98a4196fec57f74430729b57c180fc219a.exe 4736 db504171c7ece47c2ca76a9bf4343b98a4196fec57f74430729b57c180fc219a.exe 4736 db504171c7ece47c2ca76a9bf4343b98a4196fec57f74430729b57c180fc219a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4736 db504171c7ece47c2ca76a9bf4343b98a4196fec57f74430729b57c180fc219a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4736 db504171c7ece47c2ca76a9bf4343b98a4196fec57f74430729b57c180fc219a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\db504171c7ece47c2ca76a9bf4343b98a4196fec57f74430729b57c180fc219a.exe"C:\Users\Admin\AppData\Local\Temp\db504171c7ece47c2ca76a9bf4343b98a4196fec57f74430729b57c180fc219a.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4736