Analysis
-
max time kernel
34s -
max time network
39s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 08:23
Behavioral task
behavioral1
Sample
Infected.exe
Resource
win7-20241010-en
General
-
Target
Infected.exe
-
Size
63KB
-
MD5
04931a4ac11f49a23d3dba80a515d998
-
SHA1
11a5f75b4a285538204fe9e624c8faafe69fc683
-
SHA256
c763a1188c727a656ebf034044019c5e0692fc8346a6ff3cf2df8951df78fda9
-
SHA512
0836fe05283ac19c476c1d6850b2c9015945a1e8e1f84e5dbd6f9bc6f4991c9d3ed215ad23d13216deab7348eaba5bbdc74359cb16af14acae63ced587c70af3
-
SSDEEP
768:IFtqDQZRYAO78DOC8A+Xu7azcBRL5JTk1+T4KSBGHmDbD/ph0oXdqVbEZSuDdpqM:IqMeAAkdSJYUbdh9dqZjuDdpqKmY7
Malware Config
Extracted
asyncrat
Default
127.0.0.1:37754
tcp://nasdnasnd-55496.portmap.host:55496:37754
tcp://nasdnasnd-55496.portmap.host:37754
floor-getting.gl.at.ply.gg:37754
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Deletes itself 1 IoCs
pid Process 1884 cmd.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1616 timeout.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2376 Infected.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2376 wrote to memory of 1884 2376 Infected.exe 30 PID 2376 wrote to memory of 1884 2376 Infected.exe 30 PID 2376 wrote to memory of 1884 2376 Infected.exe 30 PID 1884 wrote to memory of 1616 1884 cmd.exe 32 PID 1884 wrote to memory of 1616 1884 cmd.exe 32 PID 1884 wrote to memory of 1616 1884 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\Infected.exe"C:\Users\Admin\AppData\Local\Temp\Infected.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpE8D1.tmp.bat""2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:1616
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
160B
MD58a301d0d4476c5ba71e0bee7e84d9b51
SHA13d4d2a507f89794d48656032637fcda1c51a7ae6
SHA256f3e547c4256e31b657c4f07271da7a0d9e89387d4684a5ad2b0d8073b7250e02
SHA5127ea4ae51fc801f9a587ff4c22f6818ace79e722a00b98c055cb15a3b92757f3e3a1034758792d4de092a2dcfcfb602bbda30c81af14dbacc09f1dbef35490645