Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2025 22:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
370d953f40c47ff2b764c5c60372e80e14cf972361425205a4caa47b02d6bca4N.exe
Resource
win7-20240903-en
0 signatures
120 seconds
General
-
Target
370d953f40c47ff2b764c5c60372e80e14cf972361425205a4caa47b02d6bca4N.exe
-
Size
481KB
-
MD5
aa1a6e03fa0867632db3cf96b97358f0
-
SHA1
fe90a165a0fc03272a512d2afb0190519e65fa7c
-
SHA256
370d953f40c47ff2b764c5c60372e80e14cf972361425205a4caa47b02d6bca4
-
SHA512
6232c7e656023cc5b6e0965b975d5ee65dafd437435147d9cdb975108d00bc506c5c5cc7a403432fdef71697659a4102fe3c60e71c4d3f535f34808c30319e31
-
SSDEEP
6144:4ygCJK8O9BPkCGvkQENothciEohCzkNiPXF5QD01QZGjPmXIUFx6vf0vQUr6aice:PbThCsoj+h8kNe15y01ioOLafyQAN2
Malware Config
Extracted
Family
asyncrat
Version
0.0.1
Botnet
Default
C2
45.144.139.127:8000
Mutex
sdkkhfsdhoihwwhfkjshdf12qw
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2588 370d953f40c47ff2b764c5c60372e80e14cf972361425205a4caa47b02d6bca4N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2588 wrote to memory of 5064 2588 370d953f40c47ff2b764c5c60372e80e14cf972361425205a4caa47b02d6bca4N.exe 82 PID 2588 wrote to memory of 5064 2588 370d953f40c47ff2b764c5c60372e80e14cf972361425205a4caa47b02d6bca4N.exe 82 PID 5064 wrote to memory of 4272 5064 cmd.exe 84 PID 5064 wrote to memory of 4272 5064 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\370d953f40c47ff2b764c5c60372e80e14cf972361425205a4caa47b02d6bca4N.exe"C:\Users\Admin\AppData\Local\Temp\370d953f40c47ff2b764c5c60372e80e14cf972361425205a4caa47b02d6bca4N.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\system32\cmd.exe"cmd" /c "curl -s https://myip.ipip.net/"2⤵
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\system32\curl.execurl -s https://myip.ipip.net/3⤵PID:4272
-
-