Analysis
-
max time kernel
74s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 02:17
Behavioral task
behavioral1
Sample
svchost.exe
Resource
win7-20241010-en
windows7-x64
3 signatures
150 seconds
General
-
Target
svchost.exe
-
Size
63KB
-
MD5
3e88cd6680fb22bbbcd38b378293be25
-
SHA1
1c6892a394e795c4f1417ab5fa38fb0e758e6000
-
SHA256
49641a8f59015bca56c3c355488c35587df0803b5bd50c8daf85bdef2794eadb
-
SHA512
8266238c7524652e5e5275925c3ce669bfdcb553c74c379d73b04b7edf39ec4c17daf19274c97e3cad3bf9876a90113f86d54374c1e02ab46f40f0313888fc13
-
SSDEEP
1536:IhahLzRQA+dsHbp0G8QOjeUJyq8wJGbbUwV7GaPeGC1pqKmY7:IhahLzRQA+dsHbp0AOjeUw8GbbUM7GYF
Malware Config
Extracted
Family
asyncrat
Version
1.0.7
Botnet
Default
C2
31.57.135.113:4199
Mutex
w5g64wef5w4ef
Attributes
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
Suspicious use of AdjustPrivilegeToken 20 IoCs
Processes:
svchost.exedescription pid process Token: SeIncreaseQuotaPrivilege 2116 svchost.exe Token: SeSecurityPrivilege 2116 svchost.exe Token: SeTakeOwnershipPrivilege 2116 svchost.exe Token: SeLoadDriverPrivilege 2116 svchost.exe Token: SeSystemProfilePrivilege 2116 svchost.exe Token: SeSystemtimePrivilege 2116 svchost.exe Token: SeProfSingleProcessPrivilege 2116 svchost.exe Token: SeIncBasePriorityPrivilege 2116 svchost.exe Token: SeCreatePagefilePrivilege 2116 svchost.exe Token: SeBackupPrivilege 2116 svchost.exe Token: SeRestorePrivilege 2116 svchost.exe Token: SeShutdownPrivilege 2116 svchost.exe Token: SeDebugPrivilege 2116 svchost.exe Token: SeSystemEnvironmentPrivilege 2116 svchost.exe Token: SeRemoteShutdownPrivilege 2116 svchost.exe Token: SeUndockPrivilege 2116 svchost.exe Token: SeManageVolumePrivilege 2116 svchost.exe Token: 33 2116 svchost.exe Token: 34 2116 svchost.exe Token: 35 2116 svchost.exe