Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 23:07
Behavioral task
behavioral1
Sample
17307615657d8e9c23704510177419d94d1258dd7cbe74515f054bbb2d426532f682bfe5a4468.dat-decoded.exe
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
General
-
Target
17307615657d8e9c23704510177419d94d1258dd7cbe74515f054bbb2d426532f682bfe5a4468.dat-decoded.exe
-
Size
47KB
-
MD5
dc89c75911b40f874982069e133e6477
-
SHA1
27c013aa6af97eac5783a2a861f74367e58d29fe
-
SHA256
30835224c241d265accce064de51542cb01f90f7737a409a275e863fa55b8eeb
-
SHA512
8908f1814bb5da251aa226f7d4c979c35d24457458e1df573dc03c1097c28c21fc1a3891b312a92b9578d74204a17a5032b9e7113691105599357a4cb3edfb84
-
SSDEEP
768:4q+s3pUtDILNCCa+DiptelDSN+iV08YbygeSHhMBLtvEgK/JvZVc6KN:4q+AGtQOptKDs4zb11ORnkJvZVclN
Malware Config
Extracted
Family
asyncrat
Version
1.0.7
Botnet
Default
C2
dcratyprograma.duckdns.org:2020
Mutex
DcRatMutex_qwqdanchun
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
17307615657d8e9c23704510177419d94d1258dd7cbe74515f054bbb2d426532f682bfe5a4468.dat-decoded.exedescription pid Process Token: SeDebugPrivilege 5056 17307615657d8e9c23704510177419d94d1258dd7cbe74515f054bbb2d426532f682bfe5a4468.dat-decoded.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\17307615657d8e9c23704510177419d94d1258dd7cbe74515f054bbb2d426532f682bfe5a4468.dat-decoded.exe"C:\Users\Admin\AppData\Local\Temp\17307615657d8e9c23704510177419d94d1258dd7cbe74515f054bbb2d426532f682bfe5a4468.dat-decoded.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5056