Analysis
-
max time kernel
121s -
max time network
145s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
24-01-2022 13:53
Static task
static1
Behavioral task
behavioral1
Sample
RFQ_ORDER484425083-NJQ.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
RFQ_ORDER484425083-NJQ.exe
Resource
win10-en-20211208
General
-
Target
RFQ_ORDER484425083-NJQ.exe
-
Size
832KB
-
MD5
9e83077fd628fefd80f9abcdc025e648
-
SHA1
faaeb0ce7ee4e268b699ebd57d3af36c8c20cee4
-
SHA256
70cd7f8c5818b4bbec9b33b3518736bd0627d8e92570c015dd630a461d074262
-
SHA512
943fb244cc8e5fc96fc19e5734ce32803e7f2f1c006eb372336db2fc4b5ac112972f468c24605e004f6d04ed27f035253e7b43fb49ea449140dff87c63b79916
Malware Config
Extracted
asyncrat
VenomRAT 5.0.3
Venom Clients
194.5.98.120:4449
Venom_RAT_Mutex_Venom_RAT
-
anti_vm
false
-
bsod
false
-
delay
0
-
install
false
-
install_folder
%AppData%
-
pastebin_config
null
Signatures
-
Async RAT payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3080-138-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat behavioral2/memory/3080-362-0x00000000052F0000-0x00000000052FE000-memory.dmp asyncrat -
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
RFQ_ORDER484425083-NJQ.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion RFQ_ORDER484425083-NJQ.exe -
Processes:
RFQ_ORDER484425083-NJQ.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths RFQ_ORDER484425083-NJQ.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions RFQ_ORDER484425083-NJQ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\RFQ_ORDER484425083-NJQ.exe = "0" RFQ_ORDER484425083-NJQ.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
RFQ_ORDER484425083-NJQ.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ROCKS = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\RFQ_ORDER484425083-NJQ.exe\"" RFQ_ORDER484425083-NJQ.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
RFQ_ORDER484425083-NJQ.exedescription pid process target process PID 3900 set thread context of 3080 3900 RFQ_ORDER484425083-NJQ.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
RFQ_ORDER484425083-NJQ.exepowershell.exeRegSvcs.exepid process 3900 RFQ_ORDER484425083-NJQ.exe 3900 RFQ_ORDER484425083-NJQ.exe 3900 RFQ_ORDER484425083-NJQ.exe 3900 RFQ_ORDER484425083-NJQ.exe 1312 powershell.exe 1312 powershell.exe 1312 powershell.exe 3900 RFQ_ORDER484425083-NJQ.exe 3900 RFQ_ORDER484425083-NJQ.exe 3900 RFQ_ORDER484425083-NJQ.exe 3900 RFQ_ORDER484425083-NJQ.exe 3900 RFQ_ORDER484425083-NJQ.exe 3900 RFQ_ORDER484425083-NJQ.exe 3900 RFQ_ORDER484425083-NJQ.exe 3900 RFQ_ORDER484425083-NJQ.exe 3080 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
RFQ_ORDER484425083-NJQ.exepowershell.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 3900 RFQ_ORDER484425083-NJQ.exe Token: SeDebugPrivilege 1312 powershell.exe Token: SeDebugPrivilege 3080 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RegSvcs.exepid process 3080 RegSvcs.exe -
Suspicious use of WriteProcessMemory 41 IoCs
Processes:
RFQ_ORDER484425083-NJQ.exenet.exenet.exenet.exenet.exedescription pid process target process PID 3900 wrote to memory of 1312 3900 RFQ_ORDER484425083-NJQ.exe powershell.exe PID 3900 wrote to memory of 1312 3900 RFQ_ORDER484425083-NJQ.exe powershell.exe PID 3900 wrote to memory of 1312 3900 RFQ_ORDER484425083-NJQ.exe powershell.exe PID 3900 wrote to memory of 3364 3900 RFQ_ORDER484425083-NJQ.exe net.exe PID 3900 wrote to memory of 3364 3900 RFQ_ORDER484425083-NJQ.exe net.exe PID 3900 wrote to memory of 3364 3900 RFQ_ORDER484425083-NJQ.exe net.exe PID 3364 wrote to memory of 1788 3364 net.exe net1.exe PID 3364 wrote to memory of 1788 3364 net.exe net1.exe PID 3364 wrote to memory of 1788 3364 net.exe net1.exe PID 3900 wrote to memory of 3168 3900 RFQ_ORDER484425083-NJQ.exe net.exe PID 3900 wrote to memory of 3168 3900 RFQ_ORDER484425083-NJQ.exe net.exe PID 3900 wrote to memory of 3168 3900 RFQ_ORDER484425083-NJQ.exe net.exe PID 3168 wrote to memory of 4016 3168 net.exe net1.exe PID 3168 wrote to memory of 4016 3168 net.exe net1.exe PID 3168 wrote to memory of 4016 3168 net.exe net1.exe PID 3900 wrote to memory of 2440 3900 RFQ_ORDER484425083-NJQ.exe net.exe PID 3900 wrote to memory of 2440 3900 RFQ_ORDER484425083-NJQ.exe net.exe PID 3900 wrote to memory of 2440 3900 RFQ_ORDER484425083-NJQ.exe net.exe PID 2440 wrote to memory of 2800 2440 net.exe net1.exe PID 2440 wrote to memory of 2800 2440 net.exe net1.exe PID 2440 wrote to memory of 2800 2440 net.exe net1.exe PID 3900 wrote to memory of 4052 3900 RFQ_ORDER484425083-NJQ.exe net.exe PID 3900 wrote to memory of 4052 3900 RFQ_ORDER484425083-NJQ.exe net.exe PID 3900 wrote to memory of 4052 3900 RFQ_ORDER484425083-NJQ.exe net.exe PID 4052 wrote to memory of 400 4052 net.exe net1.exe PID 4052 wrote to memory of 400 4052 net.exe net1.exe PID 4052 wrote to memory of 400 4052 net.exe net1.exe PID 3900 wrote to memory of 1148 3900 RFQ_ORDER484425083-NJQ.exe schtasks.exe PID 3900 wrote to memory of 1148 3900 RFQ_ORDER484425083-NJQ.exe schtasks.exe PID 3900 wrote to memory of 1148 3900 RFQ_ORDER484425083-NJQ.exe schtasks.exe PID 3900 wrote to memory of 2172 3900 RFQ_ORDER484425083-NJQ.exe aspnet_regsql.exe PID 3900 wrote to memory of 2172 3900 RFQ_ORDER484425083-NJQ.exe aspnet_regsql.exe PID 3900 wrote to memory of 2172 3900 RFQ_ORDER484425083-NJQ.exe aspnet_regsql.exe PID 3900 wrote to memory of 3080 3900 RFQ_ORDER484425083-NJQ.exe RegSvcs.exe PID 3900 wrote to memory of 3080 3900 RFQ_ORDER484425083-NJQ.exe RegSvcs.exe PID 3900 wrote to memory of 3080 3900 RFQ_ORDER484425083-NJQ.exe RegSvcs.exe PID 3900 wrote to memory of 3080 3900 RFQ_ORDER484425083-NJQ.exe RegSvcs.exe PID 3900 wrote to memory of 3080 3900 RFQ_ORDER484425083-NJQ.exe RegSvcs.exe PID 3900 wrote to memory of 3080 3900 RFQ_ORDER484425083-NJQ.exe RegSvcs.exe PID 3900 wrote to memory of 3080 3900 RFQ_ORDER484425083-NJQ.exe RegSvcs.exe PID 3900 wrote to memory of 3080 3900 RFQ_ORDER484425083-NJQ.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ_ORDER484425083-NJQ.exe"C:\Users\Admin\AppData\Local\Temp\RFQ_ORDER484425083-NJQ.exe"1⤵
- Checks BIOS information in registry
- Windows security modification
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\RFQ_ORDER484425083-NJQ.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" user ADMIN~1 SECRET@1234 /add2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user ADMIN~1 SECRET@1234 /add3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" localgroup administrators ADMIN~1 /add2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup administrators ADMIN~1 /add3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" localgroup users "Admin" /add2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup users "Admin" /add3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" localgroup administrators "Admin" /del2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup administrators "Admin" /del3⤵
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /run /tn \Microsoft\Windows\DiskCleanup\SilentCleanup /I2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regsql.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regsql.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1312-153-0x00000000094A0000-0x0000000009545000-memory.dmpFilesize
660KB
-
memory/1312-149-0x000000007E820000-0x000000007E821000-memory.dmpFilesize
4KB
-
memory/1312-131-0x00000000071E0000-0x0000000007202000-memory.dmpFilesize
136KB
-
memory/1312-132-0x00000000078D0000-0x0000000007936000-memory.dmpFilesize
408KB
-
memory/1312-353-0x0000000006E20000-0x0000000006E28000-memory.dmpFilesize
32KB
-
memory/1312-348-0x0000000006E30000-0x0000000006E4A000-memory.dmpFilesize
104KB
-
memory/1312-133-0x0000000007AB0000-0x0000000007E00000-memory.dmpFilesize
3.3MB
-
memory/1312-163-0x00000000047D3000-0x00000000047D4000-memory.dmpFilesize
4KB
-
memory/1312-154-0x0000000009660000-0x00000000096F4000-memory.dmpFilesize
592KB
-
memory/1312-134-0x0000000007F80000-0x0000000007F9C000-memory.dmpFilesize
112KB
-
memory/1312-127-0x00000000047E0000-0x0000000004816000-memory.dmpFilesize
216KB
-
memory/1312-128-0x00000000047D0000-0x00000000047D1000-memory.dmpFilesize
4KB
-
memory/1312-129-0x00000000047D2000-0x00000000047D3000-memory.dmpFilesize
4KB
-
memory/1312-130-0x00000000072A0000-0x00000000078C8000-memory.dmpFilesize
6.2MB
-
memory/1312-147-0x0000000009120000-0x000000000913E000-memory.dmpFilesize
120KB
-
memory/1312-146-0x0000000009140000-0x0000000009173000-memory.dmpFilesize
204KB
-
memory/1312-135-0x00000000084D0000-0x000000000851B000-memory.dmpFilesize
300KB
-
memory/3080-362-0x00000000052F0000-0x00000000052FE000-memory.dmpFilesize
56KB
-
memory/3080-369-0x0000000006720000-0x000000000672A000-memory.dmpFilesize
40KB
-
memory/3080-138-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/3080-141-0x0000000004C60000-0x0000000004C61000-memory.dmpFilesize
4KB
-
memory/3080-368-0x00000000063F0000-0x00000000063F8000-memory.dmpFilesize
32KB
-
memory/3900-115-0x0000000000F50000-0x0000000001024000-memory.dmpFilesize
848KB
-
memory/3900-124-0x00000000075D0000-0x0000000007636000-memory.dmpFilesize
408KB
-
memory/3900-121-0x0000000005930000-0x0000000005E2E000-memory.dmpFilesize
5.0MB
-
memory/3900-123-0x0000000005BC0000-0x0000000005C12000-memory.dmpFilesize
328KB
-
memory/3900-122-0x0000000005B10000-0x0000000005BB6000-memory.dmpFilesize
664KB
-
memory/3900-120-0x0000000005980000-0x000000000599E000-memory.dmpFilesize
120KB
-
memory/3900-119-0x00000000059D0000-0x0000000005A62000-memory.dmpFilesize
584KB
-
memory/3900-118-0x0000000005E30000-0x000000000632E000-memory.dmpFilesize
5.0MB
-
memory/3900-116-0x0000000005810000-0x00000000058AC000-memory.dmpFilesize
624KB
-
memory/3900-117-0x00000000058B0000-0x0000000005926000-memory.dmpFilesize
472KB