Analysis
-
max time kernel
138s -
max time network
149s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
15-08-2020 22:48
Static task
static1
Behavioral task
behavioral1
Sample
77-Venom.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
General
-
Target
77-Venom.exe
-
Size
576KB
-
MD5
a4a92cfdc1b3a949970eb6f5b20e1f21
-
SHA1
6f46b5386bb1cdcf83861666ddeb2be02ae7ee5f
-
SHA256
e83d13fcdc0f133482d558c8ce25b45a491ba3aff13849ce8169f05bb4972f0d
-
SHA512
8b9153e6ab420e088de44005f5bc8d335ae83ad2b7705802c6140cd407df6a6f690adb172806846e39ce2a899ea849520a0b71c2a7057cf5adb58df436369447
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Discord.exepid Process 1204 Discord.exe -
Processes:
77-Venom.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 77-Venom.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 77-Venom.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 1 ip-api.com -
Drops file in System32 directory 5 IoCs
Processes:
77-Venom.exeDiscord.exedescription ioc Process File created C:\Windows\SysWOW64\SubDir\Discord.exe 77-Venom.exe File opened for modification C:\Windows\SysWOW64\SubDir\Discord.exe 77-Venom.exe File opened for modification C:\Windows\SysWOW64\SubDir\Discord.exe Discord.exe File opened for modification C:\Windows\SysWOW64\SubDir Discord.exe File created C:\Windows\SysWOW64\SubDir\r77-x64.dll 77-Venom.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid Process 404 schtasks.exe 3924 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
powershell.exe77-Venom.exepid Process 1456 powershell.exe 1456 powershell.exe 1456 powershell.exe 3288 77-Venom.exe 3288 77-Venom.exe 3288 77-Venom.exe 3288 77-Venom.exe 3288 77-Venom.exe 3288 77-Venom.exe 3288 77-Venom.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
77-Venom.exepowershell.exeDiscord.exedescription pid Process Token: SeDebugPrivilege 3288 77-Venom.exe Token: SeDebugPrivilege 1456 powershell.exe Token: SeDebugPrivilege 1204 Discord.exe Token: SeDebugPrivilege 1204 Discord.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Discord.exepid Process 1204 Discord.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
77-Venom.exeDiscord.execmd.exedescription pid Process procid_target PID 3288 wrote to memory of 404 3288 77-Venom.exe 67 PID 3288 wrote to memory of 404 3288 77-Venom.exe 67 PID 3288 wrote to memory of 404 3288 77-Venom.exe 67 PID 3288 wrote to memory of 1204 3288 77-Venom.exe 69 PID 3288 wrote to memory of 1204 3288 77-Venom.exe 69 PID 3288 wrote to memory of 1204 3288 77-Venom.exe 69 PID 3288 wrote to memory of 1456 3288 77-Venom.exe 70 PID 3288 wrote to memory of 1456 3288 77-Venom.exe 70 PID 3288 wrote to memory of 1456 3288 77-Venom.exe 70 PID 1204 wrote to memory of 3924 1204 Discord.exe 74 PID 1204 wrote to memory of 3924 1204 Discord.exe 74 PID 1204 wrote to memory of 3924 1204 Discord.exe 74 PID 3288 wrote to memory of 2700 3288 77-Venom.exe 76 PID 3288 wrote to memory of 2700 3288 77-Venom.exe 76 PID 3288 wrote to memory of 2700 3288 77-Venom.exe 76 PID 3288 wrote to memory of 3788 3288 77-Venom.exe 78 PID 3288 wrote to memory of 3788 3288 77-Venom.exe 78 PID 3288 wrote to memory of 3788 3288 77-Venom.exe 78 PID 2700 wrote to memory of 408 2700 cmd.exe 80 PID 2700 wrote to memory of 408 2700 cmd.exe 80 PID 2700 wrote to memory of 408 2700 cmd.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\77-Venom.exe"C:\Users\Admin\AppData\Local\Temp\77-Venom.exe"1⤵
- Windows security modification
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Venom Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\77-Venom.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:404
-
-
C:\Windows\SysWOW64\SubDir\Discord.exe"C:\Windows\SysWOW64\SubDir\Discord.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Venom Client Startup" /sc ONLOGON /tr "C:\Windows\SysWOW64\SubDir\Discord.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:3924
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1456
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*3⤵PID:408
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1FluQtMZZYbd.bat" "2⤵PID:3788
-