Analysis
-
max time kernel
12s -
max time network
13s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 02:17
Behavioral task
behavioral1
Sample
svchost.exe
Resource
win7-20241010-en
windows7-x64
3 signatures
150 seconds
General
-
Target
svchost.exe
-
Size
63KB
-
MD5
3e88cd6680fb22bbbcd38b378293be25
-
SHA1
1c6892a394e795c4f1417ab5fa38fb0e758e6000
-
SHA256
49641a8f59015bca56c3c355488c35587df0803b5bd50c8daf85bdef2794eadb
-
SHA512
8266238c7524652e5e5275925c3ce669bfdcb553c74c379d73b04b7edf39ec4c17daf19274c97e3cad3bf9876a90113f86d54374c1e02ab46f40f0313888fc13
-
SSDEEP
1536:IhahLzRQA+dsHbp0G8QOjeUJyq8wJGbbUwV7GaPeGC1pqKmY7:IhahLzRQA+dsHbp0AOjeUw8GbbUM7GYF
Malware Config
Extracted
Family
asyncrat
Version
1.0.7
Botnet
Default
C2
31.57.135.113:4199
Mutex
w5g64wef5w4ef
Attributes
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
Suspicious use of AdjustPrivilegeToken 21 IoCs
Processes:
svchost.exedescription pid process Token: SeIncreaseQuotaPrivilege 4728 svchost.exe Token: SeSecurityPrivilege 4728 svchost.exe Token: SeTakeOwnershipPrivilege 4728 svchost.exe Token: SeLoadDriverPrivilege 4728 svchost.exe Token: SeSystemProfilePrivilege 4728 svchost.exe Token: SeSystemtimePrivilege 4728 svchost.exe Token: SeProfSingleProcessPrivilege 4728 svchost.exe Token: SeIncBasePriorityPrivilege 4728 svchost.exe Token: SeCreatePagefilePrivilege 4728 svchost.exe Token: SeBackupPrivilege 4728 svchost.exe Token: SeRestorePrivilege 4728 svchost.exe Token: SeShutdownPrivilege 4728 svchost.exe Token: SeDebugPrivilege 4728 svchost.exe Token: SeSystemEnvironmentPrivilege 4728 svchost.exe Token: SeRemoteShutdownPrivilege 4728 svchost.exe Token: SeUndockPrivilege 4728 svchost.exe Token: SeManageVolumePrivilege 4728 svchost.exe Token: 33 4728 svchost.exe Token: 34 4728 svchost.exe Token: 35 4728 svchost.exe Token: 36 4728 svchost.exe