Analysis
-
max time kernel
1787s -
max time network
1798s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
10-10-2024 10:33
Static task
static1
1 signatures
General
-
Target
corn.zip
-
Size
42.8MB
-
MD5
b2240d2e0b513829302d88ffe03d0dfc
-
SHA1
53aee13e981747502a54c412794cc7cdc9d1805b
-
SHA256
7f792e120c8f15453d4c3475911aa8ec4bcbe95514d9167aadfc445af7fe68a5
-
SHA512
d687e375b6b70c18f4bb3b4a3c72277eed2f4433be63d7a3f1a192af29a4a89e7b333ec9743e83ed327bb7e7c0f251eb2e5735c5d73b740170afcc0663254c09
-
SSDEEP
786432:CDXXuerfHkIZf06hLwbl9Pm2TW38ZF+oxwk4fbSep82zpMNV:CDnXfHkIZcXM2TdZooxwnXWNV
Malware Config
Extracted
Family
asyncrat
Botnet
Default
C2
91.92.247.210:3232
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
python.exedescription pid process target process PID 1132 created 3196 1132 python.exe Explorer.EXE -
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2896-49-0x000001D8FD9B0000-0x000001D8FD9C6000-memory.dmp family_asyncrat -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
python.exepid process 1132 python.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
Processes:
python.exepid process 1132 python.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
7zFM.exenotepad.exedescription pid process Token: SeRestorePrivilege 3336 7zFM.exe Token: 35 3336 7zFM.exe Token: SeDebugPrivilege 2896 notepad.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.exepython.exedescription pid process target process PID 3572 wrote to memory of 1132 3572 cmd.exe python.exe PID 3572 wrote to memory of 1132 3572 cmd.exe python.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe PID 1132 wrote to memory of 2896 1132 python.exe notepad.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3196
-
C:\Program Files\7-Zip\7zFM.exeC:\Users\Admin\AppData\Local\Temp\corn.zip2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3336 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Users\puncher\Downloads\Python\Python312\python.exepython.exe ve.py3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\System32\notepad.exeC:\Windows\System32\notepad.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2896
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2412