Analysis
-
max time kernel
138s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2024 16:32
Behavioral task
behavioral1
Sample
17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
General
-
Target
17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe
-
Size
47KB
-
MD5
ea189587eda182b5edcb3b4977dbe529
-
SHA1
35ecab87e17c8bac42598118745c92f1bff46a43
-
SHA256
bd0e792d8bccec62065711552deb0a997ff4132e4050f03e9a4adb4811e611cf
-
SHA512
79f96f975d5926fe1f7c56f989d82e0ed1d7b77435d8335cc6bd1fb38ab0643b7e8656336a61b5d82bc90d561768e00d170f516e900d478e548b126102086518
-
SSDEEP
768:4q+s3pUtDILNCCa+DiptelDSN+iV08Ybyge9uFGq3xKvEgK/JvZVc6KN:4q+AGtQOptKDs4zb1fKnkJvZVclN
Malware Config
Extracted
Family
asyncrat
Version
1.0.7
Botnet
Default
C2
sostener2024.duckdns.org:2020
Mutex
DcRatMutex_qwqdanchun
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exedescription pid process Token: SeDebugPrivilege 2836 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe"C:\Users\Admin\AppData\Local\Temp\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2836