Analysis
-
max time kernel
4294208s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
04/03/2022, 22:36
Behavioral task
behavioral1
Sample
_-Venom.exe
Resource
win7-20220223-en
General
-
Target
_-Venom.exe
-
Size
534KB
-
MD5
56b18f02883a486cbb4c826028ecfe11
-
SHA1
3e9a496bc38f73910cbd3d5576ec22d9b804a8dd
-
SHA256
815b2bf1ddadfb46a27001e08246e8f82f629eb793963bef856d17e1ef9c4085
-
SHA512
b507414c3d429d0d38dfffe2a5a3ec174012087790dd6c9ce86d16c402e68cc15788a1ec7c6baa8a3fc6f71c8a5695ef155288abc216660f9d5c54df5a75ad35
Malware Config
Extracted
quasar
2.1.0.0
HOST _S
44334333-31579.portmap.io:31579
VNM_MUTEX_yC484ajmODj5OJv3Dx
-
encryption_key
psSc86jtY2yoNlEhs1Dp
-
install_name
svchost.exe
-
log_directory
liblogsconfig
-
reconnect_delay
3000
-
startup_key
Java Update jdk
-
subdirectory
svchost
Signatures
-
Contains code to disable Windows Defender 6 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/1752-54-0x0000000000BE0000-0x0000000000C6C000-memory.dmp disable_win_def behavioral1/files/0x000900000001235e-58.dat disable_win_def behavioral1/files/0x000900000001235e-59.dat disable_win_def behavioral1/files/0x000900000001235e-60.dat disable_win_def behavioral1/memory/1484-61-0x0000000000AD0000-0x0000000000B5C000-memory.dmp disable_win_def behavioral1/memory/876-72-0x0000000001140000-0x00000000011CC000-memory.dmp disable_win_def -
Quasar Payload 6 IoCs
resource yara_rule behavioral1/memory/1752-54-0x0000000000BE0000-0x0000000000C6C000-memory.dmp family_quasar behavioral1/files/0x000900000001235e-58.dat family_quasar behavioral1/files/0x000900000001235e-59.dat family_quasar behavioral1/files/0x000900000001235e-60.dat family_quasar behavioral1/memory/1484-61-0x0000000000AD0000-0x0000000000B5C000-memory.dmp family_quasar behavioral1/memory/876-72-0x0000000001140000-0x00000000011CC000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
pid Process 1484 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 1752 _-Venom.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features _-Venom.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" _-Venom.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1164 schtasks.exe 2000 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 _-Venom.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 _-Venom.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1324 PING.EXE -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1516 powershell.exe 1752 _-Venom.exe 1752 _-Venom.exe 1752 _-Venom.exe 1752 _-Venom.exe 1752 _-Venom.exe 1752 _-Venom.exe 1752 _-Venom.exe 876 _-Venom.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1752 _-Venom.exe Token: SeDebugPrivilege 1484 svchost.exe Token: SeDebugPrivilege 1516 powershell.exe Token: SeDebugPrivilege 1484 svchost.exe Token: SeDebugPrivilege 876 _-Venom.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1484 svchost.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1752 wrote to memory of 1164 1752 _-Venom.exe 28 PID 1752 wrote to memory of 1164 1752 _-Venom.exe 28 PID 1752 wrote to memory of 1164 1752 _-Venom.exe 28 PID 1752 wrote to memory of 1164 1752 _-Venom.exe 28 PID 1752 wrote to memory of 1484 1752 _-Venom.exe 30 PID 1752 wrote to memory of 1484 1752 _-Venom.exe 30 PID 1752 wrote to memory of 1484 1752 _-Venom.exe 30 PID 1752 wrote to memory of 1484 1752 _-Venom.exe 30 PID 1752 wrote to memory of 1516 1752 _-Venom.exe 31 PID 1752 wrote to memory of 1516 1752 _-Venom.exe 31 PID 1752 wrote to memory of 1516 1752 _-Venom.exe 31 PID 1752 wrote to memory of 1516 1752 _-Venom.exe 31 PID 1484 wrote to memory of 2000 1484 svchost.exe 33 PID 1484 wrote to memory of 2000 1484 svchost.exe 33 PID 1484 wrote to memory of 2000 1484 svchost.exe 33 PID 1484 wrote to memory of 2000 1484 svchost.exe 33 PID 1752 wrote to memory of 2036 1752 _-Venom.exe 35 PID 1752 wrote to memory of 2036 1752 _-Venom.exe 35 PID 1752 wrote to memory of 2036 1752 _-Venom.exe 35 PID 1752 wrote to memory of 2036 1752 _-Venom.exe 35 PID 2036 wrote to memory of 1744 2036 cmd.exe 37 PID 2036 wrote to memory of 1744 2036 cmd.exe 37 PID 2036 wrote to memory of 1744 2036 cmd.exe 37 PID 2036 wrote to memory of 1744 2036 cmd.exe 37 PID 1752 wrote to memory of 1976 1752 _-Venom.exe 38 PID 1752 wrote to memory of 1976 1752 _-Venom.exe 38 PID 1752 wrote to memory of 1976 1752 _-Venom.exe 38 PID 1752 wrote to memory of 1976 1752 _-Venom.exe 38 PID 1976 wrote to memory of 1172 1976 cmd.exe 40 PID 1976 wrote to memory of 1172 1976 cmd.exe 40 PID 1976 wrote to memory of 1172 1976 cmd.exe 40 PID 1976 wrote to memory of 1172 1976 cmd.exe 40 PID 1976 wrote to memory of 1324 1976 cmd.exe 41 PID 1976 wrote to memory of 1324 1976 cmd.exe 41 PID 1976 wrote to memory of 1324 1976 cmd.exe 41 PID 1976 wrote to memory of 1324 1976 cmd.exe 41 PID 1976 wrote to memory of 876 1976 cmd.exe 42 PID 1976 wrote to memory of 876 1976 cmd.exe 42 PID 1976 wrote to memory of 876 1976 cmd.exe 42 PID 1976 wrote to memory of 876 1976 cmd.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\_-Venom.exe"C:\Users\Admin\AppData\Local\Temp\_-Venom.exe"1⤵
- Loads dropped DLL
- Windows security modification
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Java Update jdk" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\_-Venom.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:1164
-
-
C:\Users\Admin\AppData\Roaming\svchost\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Java Update jdk" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\svchost\svchost.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:2000
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1516
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*3⤵PID:1744
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\hW9xcsE8LMXZ.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:1172
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost3⤵
- Runs ping.exe
PID:1324
-
-
C:\Users\Admin\AppData\Local\Temp\_-Venom.exe"C:\Users\Admin\AppData\Local\Temp\_-Venom.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:876
-
-