Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 21:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exe
Resource
win7-20240708-en
5 signatures
150 seconds
General
-
Target
7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exe
-
Size
3.6MB
-
MD5
2e63f2a5cebd089139f32b434c91115c
-
SHA1
605916a5841886b87ead21b79128d9a78828095b
-
SHA256
7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3
-
SHA512
d3a448690bd2ba62d7416eac23b8ae01738290ba40e1a4183534655e1d0d78792da26846ba5d4076851c71d883bb944b452f76896ae4918caa0d6831bd775e8f
-
SSDEEP
98304:500i4fMjTHCmLccBWBlfRQibRNiFSWk5rR+F:3icISoWBV/2kWgrR+F
Malware Config
Extracted
Family
asyncrat
Version
1.0.7
Botnet
Default
C2
host.rorasama.top:63321
127.0.0.1:63321
Mutex
DcRatMutex_qwqdanchun
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2312-7-0x0000000002030000-0x0000000002046000-memory.dmp family_asyncrat -
Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
pid Process 2312 7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exe 2312 7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exe 2312 7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exe 2312 7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exe 2312 7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exe 2312 7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exe 2312 7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exe 2312 7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exe 2312 7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exe 2312 7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exe 2312 7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exe 2312 7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exe 2312 7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exe 2312 7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exe 2312 7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exe 2312 7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2312 7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exe"C:\Users\Admin\AppData\Local\Temp\7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:2312