Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 12:41
Behavioral task
behavioral1
Sample
f281ee063206b48d5fcf7bc5e87427653a3882c403486c1ec25b4b937e167d27.exe
Resource
win7-20240903-en
windows7-x64
5 signatures
150 seconds
General
-
Target
f281ee063206b48d5fcf7bc5e87427653a3882c403486c1ec25b4b937e167d27.exe
-
Size
101KB
-
MD5
a1fe7a12cb417958f64b2a7486d23337
-
SHA1
bc88d369bb44e96eefad961260d8f5ed56f21d31
-
SHA256
f281ee063206b48d5fcf7bc5e87427653a3882c403486c1ec25b4b937e167d27
-
SHA512
5785cec36f07903239c530b15012de3f7707a471f039056aa2e8a425f620183a3988ec493ae805f45d85278b0f89dc39f5888e960dfce76007cd495cc0cf665f
-
SSDEEP
3072:LU5cxwf3iPMVDe9VdQsH1bf4DmpQbl9m0EARiBY:Lw3iPMVDaesVb+mpH0Zw
Malware Config
Extracted
Family
asyncrat
Botnet
Default
C2
127.0.0.1:4449
127.0.0.1:8080
127.0.0.1:41232
panel.zikq-shmily.com:4449
panel.zikq-shmily.com:8080
panel.zikq-shmily.com:41232
Mutex
mdhfyafeuhum
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 3132 f281ee063206b48d5fcf7bc5e87427653a3882c403486c1ec25b4b937e167d27.exe 3132 f281ee063206b48d5fcf7bc5e87427653a3882c403486c1ec25b4b937e167d27.exe 3132 f281ee063206b48d5fcf7bc5e87427653a3882c403486c1ec25b4b937e167d27.exe 3132 f281ee063206b48d5fcf7bc5e87427653a3882c403486c1ec25b4b937e167d27.exe 3132 f281ee063206b48d5fcf7bc5e87427653a3882c403486c1ec25b4b937e167d27.exe 3132 f281ee063206b48d5fcf7bc5e87427653a3882c403486c1ec25b4b937e167d27.exe 3132 f281ee063206b48d5fcf7bc5e87427653a3882c403486c1ec25b4b937e167d27.exe 3132 f281ee063206b48d5fcf7bc5e87427653a3882c403486c1ec25b4b937e167d27.exe 3132 f281ee063206b48d5fcf7bc5e87427653a3882c403486c1ec25b4b937e167d27.exe 3132 f281ee063206b48d5fcf7bc5e87427653a3882c403486c1ec25b4b937e167d27.exe 3132 f281ee063206b48d5fcf7bc5e87427653a3882c403486c1ec25b4b937e167d27.exe 3132 f281ee063206b48d5fcf7bc5e87427653a3882c403486c1ec25b4b937e167d27.exe 3132 f281ee063206b48d5fcf7bc5e87427653a3882c403486c1ec25b4b937e167d27.exe 3132 f281ee063206b48d5fcf7bc5e87427653a3882c403486c1ec25b4b937e167d27.exe 3132 f281ee063206b48d5fcf7bc5e87427653a3882c403486c1ec25b4b937e167d27.exe 3132 f281ee063206b48d5fcf7bc5e87427653a3882c403486c1ec25b4b937e167d27.exe 3132 f281ee063206b48d5fcf7bc5e87427653a3882c403486c1ec25b4b937e167d27.exe 3132 f281ee063206b48d5fcf7bc5e87427653a3882c403486c1ec25b4b937e167d27.exe 3132 f281ee063206b48d5fcf7bc5e87427653a3882c403486c1ec25b4b937e167d27.exe 3132 f281ee063206b48d5fcf7bc5e87427653a3882c403486c1ec25b4b937e167d27.exe 3132 f281ee063206b48d5fcf7bc5e87427653a3882c403486c1ec25b4b937e167d27.exe 3132 f281ee063206b48d5fcf7bc5e87427653a3882c403486c1ec25b4b937e167d27.exe 3132 f281ee063206b48d5fcf7bc5e87427653a3882c403486c1ec25b4b937e167d27.exe 3132 f281ee063206b48d5fcf7bc5e87427653a3882c403486c1ec25b4b937e167d27.exe 3132 f281ee063206b48d5fcf7bc5e87427653a3882c403486c1ec25b4b937e167d27.exe 3132 f281ee063206b48d5fcf7bc5e87427653a3882c403486c1ec25b4b937e167d27.exe 3132 f281ee063206b48d5fcf7bc5e87427653a3882c403486c1ec25b4b937e167d27.exe 3132 f281ee063206b48d5fcf7bc5e87427653a3882c403486c1ec25b4b937e167d27.exe 3132 f281ee063206b48d5fcf7bc5e87427653a3882c403486c1ec25b4b937e167d27.exe 3132 f281ee063206b48d5fcf7bc5e87427653a3882c403486c1ec25b4b937e167d27.exe 3132 f281ee063206b48d5fcf7bc5e87427653a3882c403486c1ec25b4b937e167d27.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3132 f281ee063206b48d5fcf7bc5e87427653a3882c403486c1ec25b4b937e167d27.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3132 f281ee063206b48d5fcf7bc5e87427653a3882c403486c1ec25b4b937e167d27.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f281ee063206b48d5fcf7bc5e87427653a3882c403486c1ec25b4b937e167d27.exe"C:\Users\Admin\AppData\Local\Temp\f281ee063206b48d5fcf7bc5e87427653a3882c403486c1ec25b4b937e167d27.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3132