Analysis
-
max time kernel
93s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 00:06
Behavioral task
behavioral1
Sample
17321475076803448d101dbd20e7eb8f565a5a8db8f024eed2198a76bc7e212f0903aa57bf101.dat-decoded.exe
Resource
win7-20240903-en
General
-
Target
17321475076803448d101dbd20e7eb8f565a5a8db8f024eed2198a76bc7e212f0903aa57bf101.dat-decoded.exe
-
Size
47KB
-
MD5
e35231226596142cbc76967e4594bb91
-
SHA1
e2d0fab79b58afc1f7d94c9c811484dd8454dc2b
-
SHA256
8df908c62a851ebaaabbe00d3fc14dd1d11103e1722331705030c77948b2395d
-
SHA512
999898156b2479f380d4d7904e32521ca6270bef4107a57dfa75818b405f79234a71e067c0313eab10791db5476665cde400e0fa62df0ab49924d2f629368671
-
SSDEEP
768:4q+s3pUtDILNCCa+DiptelDSN+iV08Ybyge7lJoPa5+BvEgK/JvZVc6KN:4q+AGtQOptKDs4zb1CkPE0nkJvZVclN
Malware Config
Extracted
asyncrat
1.0.7
Default
remcos2025rem.duckdns.org:2020
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
17321475076803448d101dbd20e7eb8f565a5a8db8f024eed2198a76bc7e212f0903aa57bf101.dat-decoded.exedescription pid Process Token: SeDebugPrivilege 2604 17321475076803448d101dbd20e7eb8f565a5a8db8f024eed2198a76bc7e212f0903aa57bf101.dat-decoded.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\17321475076803448d101dbd20e7eb8f565a5a8db8f024eed2198a76bc7e212f0903aa57bf101.dat-decoded.exe"C:\Users\Admin\AppData\Local\Temp\17321475076803448d101dbd20e7eb8f565a5a8db8f024eed2198a76bc7e212f0903aa57bf101.dat-decoded.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2604