Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2024 17:50
Behavioral task
behavioral1
Sample
08deff83de0b9bbd94bcce8a95e706924a731f511c3f60a056516e5685ec7ca1.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
08deff83de0b9bbd94bcce8a95e706924a731f511c3f60a056516e5685ec7ca1.exe
Resource
win10v2004-20241007-en
General
-
Target
08deff83de0b9bbd94bcce8a95e706924a731f511c3f60a056516e5685ec7ca1.exe
-
Size
45KB
-
MD5
59fd70da51ade77b4804ed5ab930d3e3
-
SHA1
243147d6cd0cb25d753e651bf93b505f2da902a2
-
SHA256
08deff83de0b9bbd94bcce8a95e706924a731f511c3f60a056516e5685ec7ca1
-
SHA512
f4b25df02baa1f9fe57289f7f22f92b59d22b69ffb781c4cad60cf97a5d0573195cb2f29ac05d06438ff8dabc336529b6f3c23603ed01679ec0c8a4ff8a3748f
-
SSDEEP
768:FuPfZTg4pYiWUU9jjmo2qroUD2eNIAPIoRjbKgX3iCnFtUsBDZSx:FuPfZTgKa2jxtoBbdXSg1dSx
Malware Config
Extracted
asyncrat
0.5.8
RED-DEAD II
dave17.bumbleshrimp.com:7581
vX11jfmENVKX
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08deff83de0b9bbd94bcce8a95e706924a731f511c3f60a056516e5685ec7ca1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4812 08deff83de0b9bbd94bcce8a95e706924a731f511c3f60a056516e5685ec7ca1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\08deff83de0b9bbd94bcce8a95e706924a731f511c3f60a056516e5685ec7ca1.exe"C:\Users\Admin\AppData\Local\Temp\08deff83de0b9bbd94bcce8a95e706924a731f511c3f60a056516e5685ec7ca1.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4812