Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 20:07
Behavioral task
behavioral1
Sample
0917419ff6df4443c717ca4710f6c28e600666d85d8ea79516ae943b5af86110.exe
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
0917419ff6df4443c717ca4710f6c28e600666d85d8ea79516ae943b5af86110.exe
-
Size
47KB
-
MD5
2289c8925c4b34e898b28e5b3ba86956
-
SHA1
1710e9e3304d67cf7c04e8d6d2cef0d8929e4636
-
SHA256
0917419ff6df4443c717ca4710f6c28e600666d85d8ea79516ae943b5af86110
-
SHA512
d9970c9f5b3d653e58ba4fa5cb2441f85feb5b6ff9b63f314cedd689baae6da4b1f0f2f7837e4d0dedbccb24b78d8a05f38e2b87b2fa67d7fc0ce06ab2050354
-
SSDEEP
768:QOHAZjNrhoxU5k6CJ4M/DJFS2oPbTgFomnAS5Nlf81/g7sH2tYcFmVc6K:4bSB4M/DJjybMFogA4lf81OsHKmVcl
Malware Config
Extracted
Family
asyncrat
Version
0.5.4H
Mutex
628878991008
Attributes
-
delay
0
-
install
false
-
install_file
FrameworkSupport.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/hwhSKDaJ
aes.plain
Signatures
-
Asyncrat family
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 pastebin.com 5 pastebin.com -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2548 0917419ff6df4443c717ca4710f6c28e600666d85d8ea79516ae943b5af86110.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2548 0917419ff6df4443c717ca4710f6c28e600666d85d8ea79516ae943b5af86110.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0917419ff6df4443c717ca4710f6c28e600666d85d8ea79516ae943b5af86110.exe"C:\Users\Admin\AppData\Local\Temp\0917419ff6df4443c717ca4710f6c28e600666d85d8ea79516ae943b5af86110.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2548