Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-10-2024 23:55
Behavioral task
behavioral1
Sample
289d2752c1c8d90131a3360e36e1b8f40457faa1c5af6bfc9c0d913e4f6b75e9N.exe
Resource
win7-20240903-en
General
-
Target
289d2752c1c8d90131a3360e36e1b8f40457faa1c5af6bfc9c0d913e4f6b75e9N.exe
-
Size
59KB
-
MD5
2dc467a23da990e4bda00eb6051994f0
-
SHA1
359469eeb24a5e3cd08bd0e4277d81d3783185d7
-
SHA256
289d2752c1c8d90131a3360e36e1b8f40457faa1c5af6bfc9c0d913e4f6b75e9
-
SHA512
16ef9e6299227c72f0f62de7dfe3731d7b7460ddb3a97f7f86c7a7592419fb60f7a44929362ea33694a842308774ee7d05014469a8fd067249358e2f0702167b
-
SSDEEP
1536:YS408DpQeKsqir5SgXgzbFp20PxFtpqKmY7:YXZD1plSgXgzbFp2Wr2z
Malware Config
Extracted
asyncrat
v5.7
Default
DcRatMutex_qwqdanchun
-
c2_url_file
https://raw.githubusercontent.com/dEWqlDpf0NzeQPrkLvmasX02293xq/Q1pSQVQtTWFsd2FyZS1YV29ybQ-/refs/heads/main/Sever
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 30 IoCs
Processes:
flow ioc 25 raw.githubusercontent.com 28 raw.githubusercontent.com 13 raw.githubusercontent.com 15 raw.githubusercontent.com 22 raw.githubusercontent.com 9 raw.githubusercontent.com 11 raw.githubusercontent.com 31 raw.githubusercontent.com 32 raw.githubusercontent.com 10 raw.githubusercontent.com 18 raw.githubusercontent.com 21 raw.githubusercontent.com 4 raw.githubusercontent.com 6 raw.githubusercontent.com 17 raw.githubusercontent.com 19 raw.githubusercontent.com 27 raw.githubusercontent.com 5 raw.githubusercontent.com 12 raw.githubusercontent.com 16 raw.githubusercontent.com 26 raw.githubusercontent.com 29 raw.githubusercontent.com 30 raw.githubusercontent.com 7 raw.githubusercontent.com 14 raw.githubusercontent.com 23 raw.githubusercontent.com 24 raw.githubusercontent.com 33 raw.githubusercontent.com 8 raw.githubusercontent.com 20 raw.githubusercontent.com -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
289d2752c1c8d90131a3360e36e1b8f40457faa1c5af6bfc9c0d913e4f6b75e9N.exedescription pid process Token: SeDebugPrivilege 2692 289d2752c1c8d90131a3360e36e1b8f40457faa1c5af6bfc9c0d913e4f6b75e9N.exe Token: 33 2692 289d2752c1c8d90131a3360e36e1b8f40457faa1c5af6bfc9c0d913e4f6b75e9N.exe Token: SeIncBasePriorityPrivilege 2692 289d2752c1c8d90131a3360e36e1b8f40457faa1c5af6bfc9c0d913e4f6b75e9N.exe