Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2024 10:57

General

  • Target

    8971f4598d5d15fd2eba21429ac5585d6c1b9a3ca1b246a3a5389924ef60e200.exe

  • Size

    63KB

  • MD5

    be3ec57511b9d1f3e71d5a4e640afa70

  • SHA1

    91b81b3c8d9fa78f4dfc8c7b2ff99e20edc70b7c

  • SHA256

    8971f4598d5d15fd2eba21429ac5585d6c1b9a3ca1b246a3a5389924ef60e200

  • SHA512

    46b439ddd9c79f5ef5807eb0d258843af9b693fc55392923619ba90a3fbd922160a8bc1ef052bcfc5f675b5cb79235431b55548f0f8c76c690603cd1610fb29d

  • SSDEEP

    768:QvsM2sk/978SQC8A+XjlazcBRL5JTk1+T4KSBGHmDbD/ph0oXJ2waKpRRKISu0dn:j1/M/dSJYUbdh9swzpnKPu0dpqKmY7v

Score
10/10

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

sigmaskibidisigma-36671.portmap.host:36671

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8971f4598d5d15fd2eba21429ac5585d6c1b9a3ca1b246a3a5389924ef60e200.exe
    "C:\Users\Admin\AppData\Local\Temp\8971f4598d5d15fd2eba21429ac5585d6c1b9a3ca1b246a3a5389924ef60e200.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:824

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/824-0-0x00007FFD651D3000-0x00007FFD651D5000-memory.dmp

    Filesize

    8KB

  • memory/824-1-0x00000000009F0000-0x0000000000A06000-memory.dmp

    Filesize

    88KB

  • memory/824-2-0x00007FFD651D0000-0x00007FFD65C91000-memory.dmp

    Filesize

    10.8MB

  • memory/824-3-0x00007FFD651D0000-0x00007FFD65C91000-memory.dmp

    Filesize

    10.8MB

  • memory/824-4-0x00007FFD651D3000-0x00007FFD651D5000-memory.dmp

    Filesize

    8KB

  • memory/824-5-0x00007FFD651D0000-0x00007FFD65C91000-memory.dmp

    Filesize

    10.8MB