Analysis
-
max time kernel
300s -
max time network
296s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2024 14:02
Behavioral task
behavioral1
Sample
Executor (1).exe
Resource
win10v2004-20241007-en
windows10-2004-x64
4 signatures
300 seconds
General
-
Target
Executor (1).exe
-
Size
63KB
-
MD5
6afda4ff0989c58e7e0c21bba5be2cc7
-
SHA1
0d90163d1b782da31b3adfb0bc8adec179689fb4
-
SHA256
3eb26c350c5c8a32b2259b63ffec5887a93425459044ef8f105f501d3b6b521f
-
SHA512
eb406603cbca1c230f6574f5439056db9969c6ea0163da8fac8e48f0fc5d67c9d2a429e28a19f219dd599632625fba058293a561027b66b2e86c8271d513e754
-
SSDEEP
768:ov7M2nr/978dQC8A+XjCdjN1e9tMpi8Hcimf1+T4pSBGHmDbDYph0oqoLYHBShS/:05/VONMcDCaYUbmhAM8U4ucdpqKmY7
Malware Config
Extracted
Family
asyncrat
Botnet
Default
Attributes
-
delay
3
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/UTPHT9Xx
aes.plain
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Executor (1).exepid process 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe 372 Executor (1).exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Executor (1).exedescription pid process Token: SeDebugPrivilege 372 Executor (1).exe