Analysis
-
max time kernel
136s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 18:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7487cd09c2770f9ab80ae62c27c23c707d1bb89123abf54dc376e4f0b99a97c0.exe
Resource
win7-20240903-en
windows7-x64
0 signatures
150 seconds
General
-
Target
7487cd09c2770f9ab80ae62c27c23c707d1bb89123abf54dc376e4f0b99a97c0.exe
-
Size
11.6MB
-
MD5
a39acc4ed79bda566dcf79628f4f26e4
-
SHA1
f6aef5c418c543bb78e902436d92460b562fc788
-
SHA256
7487cd09c2770f9ab80ae62c27c23c707d1bb89123abf54dc376e4f0b99a97c0
-
SHA512
761d3501cc0681cc08950d54efc77f7d35b64e7ae0aba8ef00eb2aaa6ff56dfc46414bc08e1a5eb63b3c4e15607b430fd046000a7de4099e66e5a4aa4e8ed220
-
SSDEEP
196608:hCMZZPH5bfETRe01Q1/g0A9LFWhqAKJUjxx+4HRSIpG/hXzNNpYw9Y:sysRKjADkPB5I/9NNX
Malware Config
Extracted
Family
asyncrat
Version
0.0.1
Botnet
Default
C2
192.168.248.130:8848
Mutex
DcRatMutex_qwqdanchun
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
7487cd09c2770f9ab80ae62c27c23c707d1bb89123abf54dc376e4f0b99a97c0.exepid process 4624 7487cd09c2770f9ab80ae62c27c23c707d1bb89123abf54dc376e4f0b99a97c0.exe 4624 7487cd09c2770f9ab80ae62c27c23c707d1bb89123abf54dc376e4f0b99a97c0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
7487cd09c2770f9ab80ae62c27c23c707d1bb89123abf54dc376e4f0b99a97c0.exedescription pid process Token: SeDebugPrivilege 4624 7487cd09c2770f9ab80ae62c27c23c707d1bb89123abf54dc376e4f0b99a97c0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7487cd09c2770f9ab80ae62c27c23c707d1bb89123abf54dc376e4f0b99a97c0.exe"C:\Users\Admin\AppData\Local\Temp\7487cd09c2770f9ab80ae62c27c23c707d1bb89123abf54dc376e4f0b99a97c0.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4624