Analysis
-
max time kernel
148s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 21:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exe
Resource
win7-20240708-en
windows7-x64
5 signatures
150 seconds
General
-
Target
7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exe
-
Size
3.6MB
-
MD5
2e63f2a5cebd089139f32b434c91115c
-
SHA1
605916a5841886b87ead21b79128d9a78828095b
-
SHA256
7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3
-
SHA512
d3a448690bd2ba62d7416eac23b8ae01738290ba40e1a4183534655e1d0d78792da26846ba5d4076851c71d883bb944b452f76896ae4918caa0d6831bd775e8f
-
SSDEEP
98304:500i4fMjTHCmLccBWBlfRQibRNiFSWk5rR+F:3icISoWBV/2kWgrR+F
Malware Config
Extracted
Family
asyncrat
Version
1.0.7
Botnet
Default
C2
host.rorasama.top:63321
127.0.0.1:63321
Mutex
DcRatMutex_qwqdanchun
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3460-6-0x000001B70CC70000-0x000001B70CC86000-memory.dmp family_asyncrat -
Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
Processes:
7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exepid process 3460 7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exe 3460 7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exe 3460 7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exe 3460 7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exe 3460 7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exe 3460 7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exe 3460 7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exe 3460 7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exe 3460 7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exe 3460 7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exe 3460 7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exe 3460 7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exe 3460 7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exe 3460 7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exe 3460 7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exe 3460 7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exedescription pid process Token: SeDebugPrivilege 3460 7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exe"C:\Users\Admin\AppData\Local\Temp\7d09f14e3053d887b4d7a44b1e90a7efd52b66d4aa8ca3f6a8a3c4b87f331ca3.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:3460