Analysis
-
max time kernel
132s -
max time network
140s -
platform
windows10_x64 -
resource
win10 -
submitted
15-08-2020 22:44
Static task
static1
Behavioral task
behavioral1
Sample
7-Venom.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
General
-
Target
7-Venom.exe
-
Size
625KB
-
MD5
8e0459ea44e2e136a66683b4bb1b9c66
-
SHA1
e675cd144db3f6adeef99c1d790caae6df4d2b49
-
SHA256
5e74c2b7ac2d1ad593abac2e47d690a083bf96f1566901e58a5f59d221bc9853
-
SHA512
257f134d34a6016295e2807e1ff94afb84e25897ae5dd346a8c17e5e28e9dbc130055d22adadfd1f31776d4d62c055d204f3f1293df9c58da2daa9244e2f5059
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
windowsrc.exepid Process 3420 windowsrc.exe -
Processes:
7-Venom.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 7-Venom.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 7-Venom.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 ip-api.com -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid Process 3768 schtasks.exe 3744 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
powershell.exe7-Venom.exepid Process 3436 powershell.exe 3436 powershell.exe 3436 powershell.exe 3044 7-Venom.exe 3044 7-Venom.exe 3044 7-Venom.exe 3044 7-Venom.exe 3044 7-Venom.exe 3044 7-Venom.exe 3044 7-Venom.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
7-Venom.exepowershell.exewindowsrc.exedescription pid Process Token: SeDebugPrivilege 3044 7-Venom.exe Token: SeDebugPrivilege 3436 powershell.exe Token: SeDebugPrivilege 3420 windowsrc.exe Token: SeDebugPrivilege 3420 windowsrc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
windowsrc.exepid Process 3420 windowsrc.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
7-Venom.exewindowsrc.execmd.execmd.exedescription pid Process procid_target PID 3044 wrote to memory of 3768 3044 7-Venom.exe 68 PID 3044 wrote to memory of 3768 3044 7-Venom.exe 68 PID 3044 wrote to memory of 3768 3044 7-Venom.exe 68 PID 3044 wrote to memory of 3420 3044 7-Venom.exe 70 PID 3044 wrote to memory of 3420 3044 7-Venom.exe 70 PID 3044 wrote to memory of 3420 3044 7-Venom.exe 70 PID 3044 wrote to memory of 3436 3044 7-Venom.exe 71 PID 3044 wrote to memory of 3436 3044 7-Venom.exe 71 PID 3044 wrote to memory of 3436 3044 7-Venom.exe 71 PID 3420 wrote to memory of 3744 3420 windowsrc.exe 73 PID 3420 wrote to memory of 3744 3420 windowsrc.exe 73 PID 3420 wrote to memory of 3744 3420 windowsrc.exe 73 PID 3044 wrote to memory of 568 3044 7-Venom.exe 75 PID 3044 wrote to memory of 568 3044 7-Venom.exe 75 PID 3044 wrote to memory of 568 3044 7-Venom.exe 75 PID 568 wrote to memory of 800 568 cmd.exe 77 PID 568 wrote to memory of 800 568 cmd.exe 77 PID 568 wrote to memory of 800 568 cmd.exe 77 PID 3044 wrote to memory of 2524 3044 7-Venom.exe 78 PID 3044 wrote to memory of 2524 3044 7-Venom.exe 78 PID 3044 wrote to memory of 2524 3044 7-Venom.exe 78 PID 2524 wrote to memory of 484 2524 cmd.exe 80 PID 2524 wrote to memory of 484 2524 cmd.exe 80 PID 2524 wrote to memory of 484 2524 cmd.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\7-Venom.exe"C:\Users\Admin\AppData\Local\Temp\7-Venom.exe"1⤵
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Registry Handler" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\7-Venom.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:3768
-
-
C:\Users\Admin\AppData\Roaming\bin\windowsrc.exe"C:\Users\Admin\AppData\Roaming\bin\windowsrc.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Registry Handler" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\bin\windowsrc.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:3744
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3436
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit2⤵
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*3⤵PID:800
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xVXzfSpkN9Xo.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:484
-
-