Analysis
-
max time kernel
55s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/03/2025, 19:50
Behavioral task
behavioral1
Sample
803d79a3f8834e6ee798ff4fffb21aadb6fac5119f0d1f433152cb124754be74.exe
Resource
win7-20240903-en
5 signatures
60 seconds
General
-
Target
803d79a3f8834e6ee798ff4fffb21aadb6fac5119f0d1f433152cb124754be74.exe
-
Size
113KB
-
MD5
e7f4f2a1c9f58b14bb65229b6eae9138
-
SHA1
21c4983c6b0f9c23765ac9b666f3ceaa96efeb99
-
SHA256
803d79a3f8834e6ee798ff4fffb21aadb6fac5119f0d1f433152cb124754be74
-
SHA512
c94a778673e1074382d3acf1f2cc3e60fae8629e99db4c057324bcd658541ccbf6da117d84ef4ecaa8377c128f054f523d7bf2630e690a9604c5fce12ed093fa
-
SSDEEP
1536:6aHy8auomt/km5qLLaEuj3dW/fg0YmF+:Syomtsm5ILaEuBPOQ
Malware Config
Extracted
Family
asyncrat
Version
false
Botnet
Default
Mutex
BcXINwVfoTMI
Attributes
-
delay
3
-
install
false
-
install_file
hamid.exe
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 803d79a3f8834e6ee798ff4fffb21aadb6fac5119f0d1f433152cb124754be74.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2056 803d79a3f8834e6ee798ff4fffb21aadb6fac5119f0d1f433152cb124754be74.exe 2056 803d79a3f8834e6ee798ff4fffb21aadb6fac5119f0d1f433152cb124754be74.exe 2056 803d79a3f8834e6ee798ff4fffb21aadb6fac5119f0d1f433152cb124754be74.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2056 803d79a3f8834e6ee798ff4fffb21aadb6fac5119f0d1f433152cb124754be74.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\803d79a3f8834e6ee798ff4fffb21aadb6fac5119f0d1f433152cb124754be74.exe"C:\Users\Admin\AppData\Local\Temp\803d79a3f8834e6ee798ff4fffb21aadb6fac5119f0d1f433152cb124754be74.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2056