Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2025, 00:51
Static task
static1
Behavioral task
behavioral1
Sample
157a3f7a20b22e78c4d3f7ea88538ff7.exe
Resource
win7-20240729-en
General
-
Target
157a3f7a20b22e78c4d3f7ea88538ff7.exe
-
Size
88KB
-
MD5
157a3f7a20b22e78c4d3f7ea88538ff7
-
SHA1
5289f49becfab4122f62ac5dc5f4ed4a6430d1e3
-
SHA256
0ffd5b54317e01a658684577fee5d5c5f53d5b2e105e7cf8c1cdfd9bd8fee780
-
SHA512
cd517f17d8253dfd8681fce97eaf5f591b8a7427cea2de132d68e1bc047227c287e9d5b11890e16503cf730d52c1117a5312b506ddcca4e223413f271f79f652
-
SSDEEP
1536:fMQTBX+ACkkNQDm4KWtVeZJmDKmVBo2wJhtycPPsahIP7fsLt/vO35T:fMuzFkeS47tgJeKmfoBJhNPsahIP7fsy
Malware Config
Extracted
asyncrat
0.5.8
1
164.92.163.239:3898
AbDUeHz1cUxL
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2148 set thread context of 1692 2148 157a3f7a20b22e78c4d3f7ea88538ff7.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 157a3f7a20b22e78c4d3f7ea88538ff7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1692 RegAsm.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2148 wrote to memory of 1692 2148 157a3f7a20b22e78c4d3f7ea88538ff7.exe 88 PID 2148 wrote to memory of 1692 2148 157a3f7a20b22e78c4d3f7ea88538ff7.exe 88 PID 2148 wrote to memory of 1692 2148 157a3f7a20b22e78c4d3f7ea88538ff7.exe 88 PID 2148 wrote to memory of 1692 2148 157a3f7a20b22e78c4d3f7ea88538ff7.exe 88 PID 2148 wrote to memory of 1692 2148 157a3f7a20b22e78c4d3f7ea88538ff7.exe 88 PID 2148 wrote to memory of 1692 2148 157a3f7a20b22e78c4d3f7ea88538ff7.exe 88 PID 2148 wrote to memory of 1692 2148 157a3f7a20b22e78c4d3f7ea88538ff7.exe 88 PID 2148 wrote to memory of 1692 2148 157a3f7a20b22e78c4d3f7ea88538ff7.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\157a3f7a20b22e78c4d3f7ea88538ff7.exe"C:\Users\Admin\AppData\Local\Temp\157a3f7a20b22e78c4d3f7ea88538ff7.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe#system322⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1692
-