Analysis
-
max time kernel
149s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 07:42
Behavioral task
behavioral1
Sample
0e7c56b00281e18e385042a28f0e6202fbe39f3cdb219d17489799fca09b6550.exe
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
General
-
Target
0e7c56b00281e18e385042a28f0e6202fbe39f3cdb219d17489799fca09b6550.exe
-
Size
46KB
-
MD5
36959ff8dbe435a6d48ca9c3c6699a27
-
SHA1
55ebd85589544886920b51779d36336f38ea9781
-
SHA256
0e7c56b00281e18e385042a28f0e6202fbe39f3cdb219d17489799fca09b6550
-
SHA512
42207753bdbd3821532685fa5870384ac4fa450baeacc99e5764401caba94e41b0df0ee0bd85ad597176902db20ccc6d93d47243300bb3d128adf26fc31df758
-
SSDEEP
768:9qXrebXXEF5STUkOicvHk3eHlWMPbPgF0qtL+A03byeRThjYI6OC32tYcFmVc6K:9Y5STUXvZH0ub4FrtL+A03RTht6OyKme
Malware Config
Extracted
Family
asyncrat
Version
0.5.6A
Botnet
null
C2
192.168.1.7:8080
Mutex
ybkivqifannhi
Attributes
-
delay
5
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
0e7c56b00281e18e385042a28f0e6202fbe39f3cdb219d17489799fca09b6550.exepid process 2936 0e7c56b00281e18e385042a28f0e6202fbe39f3cdb219d17489799fca09b6550.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
0e7c56b00281e18e385042a28f0e6202fbe39f3cdb219d17489799fca09b6550.exedescription pid process Token: SeDebugPrivilege 2936 0e7c56b00281e18e385042a28f0e6202fbe39f3cdb219d17489799fca09b6550.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e7c56b00281e18e385042a28f0e6202fbe39f3cdb219d17489799fca09b6550.exe"C:\Users\Admin\AppData\Local\Temp\0e7c56b00281e18e385042a28f0e6202fbe39f3cdb219d17489799fca09b6550.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2936