Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
04/03/2022, 22:36
Behavioral task
behavioral1
Sample
_-Venom.exe
Resource
win7-20220223-en
General
-
Target
_-Venom.exe
-
Size
534KB
-
MD5
56b18f02883a486cbb4c826028ecfe11
-
SHA1
3e9a496bc38f73910cbd3d5576ec22d9b804a8dd
-
SHA256
815b2bf1ddadfb46a27001e08246e8f82f629eb793963bef856d17e1ef9c4085
-
SHA512
b507414c3d429d0d38dfffe2a5a3ec174012087790dd6c9ce86d16c402e68cc15788a1ec7c6baa8a3fc6f71c8a5695ef155288abc216660f9d5c54df5a75ad35
Malware Config
Extracted
quasar
2.1.0.0
HOST _S
44334333-31579.portmap.io:31579
VNM_MUTEX_yC484ajmODj5OJv3Dx
-
encryption_key
psSc86jtY2yoNlEhs1Dp
-
install_name
svchost.exe
-
log_directory
liblogsconfig
-
reconnect_delay
3000
-
startup_key
Java Update jdk
-
subdirectory
svchost
Signatures
-
Contains code to disable Windows Defender 3 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral2/memory/3132-131-0x0000000000FC0000-0x000000000104C000-memory.dmp disable_win_def behavioral2/files/0x000300000001e533-138.dat disable_win_def behavioral2/files/0x000300000001e533-139.dat disable_win_def -
Quasar Payload 3 IoCs
resource yara_rule behavioral2/memory/3132-131-0x0000000000FC0000-0x000000000104C000-memory.dmp family_quasar behavioral2/files/0x000300000001e533-138.dat family_quasar behavioral2/files/0x000300000001e533-139.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 4028 svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation _-Venom.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features _-Venom.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" _-Venom.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 22 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2916 schtasks.exe 3296 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3140 PING.EXE -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1280 powershell.exe 1280 powershell.exe 3132 _-Venom.exe 3132 _-Venom.exe 3132 _-Venom.exe 3132 _-Venom.exe 3132 _-Venom.exe 3132 _-Venom.exe 3132 _-Venom.exe 3112 _-Venom.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3132 _-Venom.exe Token: SeDebugPrivilege 1280 powershell.exe Token: SeDebugPrivilege 4028 svchost.exe Token: SeDebugPrivilege 4028 svchost.exe Token: SeDebugPrivilege 3112 _-Venom.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4028 svchost.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3132 wrote to memory of 2916 3132 _-Venom.exe 61 PID 3132 wrote to memory of 2916 3132 _-Venom.exe 61 PID 3132 wrote to memory of 2916 3132 _-Venom.exe 61 PID 3132 wrote to memory of 4028 3132 _-Venom.exe 63 PID 3132 wrote to memory of 4028 3132 _-Venom.exe 63 PID 3132 wrote to memory of 4028 3132 _-Venom.exe 63 PID 3132 wrote to memory of 1280 3132 _-Venom.exe 64 PID 3132 wrote to memory of 1280 3132 _-Venom.exe 64 PID 3132 wrote to memory of 1280 3132 _-Venom.exe 64 PID 4028 wrote to memory of 3296 4028 svchost.exe 66 PID 4028 wrote to memory of 3296 4028 svchost.exe 66 PID 4028 wrote to memory of 3296 4028 svchost.exe 66 PID 3132 wrote to memory of 1492 3132 _-Venom.exe 70 PID 3132 wrote to memory of 1492 3132 _-Venom.exe 70 PID 3132 wrote to memory of 1492 3132 _-Venom.exe 70 PID 1492 wrote to memory of 3452 1492 cmd.exe 72 PID 1492 wrote to memory of 3452 1492 cmd.exe 72 PID 1492 wrote to memory of 3452 1492 cmd.exe 72 PID 3132 wrote to memory of 3384 3132 _-Venom.exe 74 PID 3132 wrote to memory of 3384 3132 _-Venom.exe 74 PID 3132 wrote to memory of 3384 3132 _-Venom.exe 74 PID 3384 wrote to memory of 2980 3384 cmd.exe 76 PID 3384 wrote to memory of 2980 3384 cmd.exe 76 PID 3384 wrote to memory of 2980 3384 cmd.exe 76 PID 3384 wrote to memory of 3140 3384 cmd.exe 77 PID 3384 wrote to memory of 3140 3384 cmd.exe 77 PID 3384 wrote to memory of 3140 3384 cmd.exe 77 PID 3384 wrote to memory of 3112 3384 cmd.exe 78 PID 3384 wrote to memory of 3112 3384 cmd.exe 78 PID 3384 wrote to memory of 3112 3384 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\_-Venom.exe"C:\Users\Admin\AppData\Local\Temp\_-Venom.exe"1⤵
- Checks computer location settings
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Java Update jdk" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\_-Venom.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:2916
-
-
C:\Users\Admin\AppData\Roaming\svchost\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Java Update jdk" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\svchost\svchost.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:3296
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1280
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*3⤵PID:3452
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\60i6RhPY6zOV.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:2980
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost3⤵
- Runs ping.exe
PID:3140
-
-
C:\Users\Admin\AppData\Local\Temp\_-Venom.exe"C:\Users\Admin\AppData\Local\Temp\_-Venom.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3112
-
-