Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    04/03/2022, 22:36

General

  • Target

    _-Venom.exe

  • Size

    534KB

  • MD5

    56b18f02883a486cbb4c826028ecfe11

  • SHA1

    3e9a496bc38f73910cbd3d5576ec22d9b804a8dd

  • SHA256

    815b2bf1ddadfb46a27001e08246e8f82f629eb793963bef856d17e1ef9c4085

  • SHA512

    b507414c3d429d0d38dfffe2a5a3ec174012087790dd6c9ce86d16c402e68cc15788a1ec7c6baa8a3fc6f71c8a5695ef155288abc216660f9d5c54df5a75ad35

Malware Config

Extracted

Family

quasar

Version

2.1.0.0

Botnet

HOST _S

C2

44334333-31579.portmap.io:31579

Mutex

VNM_MUTEX_yC484ajmODj5OJv3Dx

Attributes
  • encryption_key

    psSc86jtY2yoNlEhs1Dp

  • install_name

    svchost.exe

  • log_directory

    liblogsconfig

  • reconnect_delay

    3000

  • startup_key

    Java Update jdk

  • subdirectory

    svchost

Signatures

  • Contains code to disable Windows Defender 3 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Quasar Payload 3 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • VenomRAT

    VenomRAT is a modified version of QuasarRAT with some added features, such as rootkit and stealer capabilites.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Windows security modification 2 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\_-Venom.exe
    "C:\Users\Admin\AppData\Local\Temp\_-Venom.exe"
    1⤵
    • Checks computer location settings
    • Windows security modification
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3132
    • C:\Windows\SysWOW64\schtasks.exe
      "schtasks" /create /tn "Java Update jdk" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\_-Venom.exe" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:2916
    • C:\Users\Admin\AppData\Roaming\svchost\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4028
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /create /tn "Java Update jdk" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\svchost\svchost.exe" /rl HIGHEST /f
        3⤵
        • Creates scheduled task(s)
        PID:3296
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell" Get-MpPreference -verbose
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1280
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1492
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*
        3⤵
          PID:3452
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\60i6RhPY6zOV.bat" "
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3384
        • C:\Windows\SysWOW64\chcp.com
          chcp 65001
          3⤵
            PID:2980
          • C:\Windows\SysWOW64\PING.EXE
            ping -n 10 localhost
            3⤵
            • Runs ping.exe
            PID:3140
          • C:\Users\Admin\AppData\Local\Temp\_-Venom.exe
            "C:\Users\Admin\AppData\Local\Temp\_-Venom.exe"
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3112

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1280-150-0x0000000007C60000-0x0000000007C7E000-memory.dmp

        Filesize

        120KB

      • memory/1280-152-0x0000000008230000-0x0000000008262000-memory.dmp

        Filesize

        200KB

      • memory/1280-163-0x0000000009280000-0x0000000009288000-memory.dmp

        Filesize

        32KB

      • memory/1280-162-0x00000000092A0000-0x00000000092BA000-memory.dmp

        Filesize

        104KB

      • memory/1280-161-0x0000000009190000-0x000000000919E000-memory.dmp

        Filesize

        56KB

      • memory/1280-160-0x00000000091E0000-0x0000000009276000-memory.dmp

        Filesize

        600KB

      • memory/1280-142-0x0000000004330000-0x0000000004366000-memory.dmp

        Filesize

        216KB

      • memory/1280-143-0x0000000006E90000-0x00000000074B8000-memory.dmp

        Filesize

        6.2MB

      • memory/1280-159-0x0000000008FD0000-0x0000000008FDA000-memory.dmp

        Filesize

        40KB

      • memory/1280-145-0x0000000074990000-0x0000000075140000-memory.dmp

        Filesize

        7.7MB

      • memory/1280-147-0x00000000043B2000-0x00000000043B3000-memory.dmp

        Filesize

        4KB

      • memory/1280-146-0x00000000043B0000-0x00000000043B1000-memory.dmp

        Filesize

        4KB

      • memory/1280-148-0x00000000074F0000-0x0000000007512000-memory.dmp

        Filesize

        136KB

      • memory/1280-149-0x00000000075A0000-0x0000000007606000-memory.dmp

        Filesize

        408KB

      • memory/1280-157-0x00000000095A0000-0x0000000009C1A000-memory.dmp

        Filesize

        6.5MB

      • memory/1280-156-0x000000007FAC0000-0x000000007FAC1000-memory.dmp

        Filesize

        4KB

      • memory/1280-158-0x0000000008F60000-0x0000000008F7A000-memory.dmp

        Filesize

        104KB

      • memory/1280-153-0x000000006FD90000-0x000000006FDDC000-memory.dmp

        Filesize

        304KB

      • memory/1280-154-0x0000000008210000-0x000000000822E000-memory.dmp

        Filesize

        120KB

      • memory/1280-155-0x00000000043B5000-0x00000000043B7000-memory.dmp

        Filesize

        8KB

      • memory/3112-168-0x0000000002AA0000-0x0000000002AA1000-memory.dmp

        Filesize

        4KB

      • memory/3112-167-0x0000000074990000-0x0000000075140000-memory.dmp

        Filesize

        7.7MB

      • memory/3132-130-0x0000000074990000-0x0000000075140000-memory.dmp

        Filesize

        7.7MB

      • memory/3132-135-0x0000000005A30000-0x0000000005A96000-memory.dmp

        Filesize

        408KB

      • memory/3132-133-0x0000000005B00000-0x0000000005B92000-memory.dmp

        Filesize

        584KB

      • memory/3132-134-0x0000000005A20000-0x0000000005A21000-memory.dmp

        Filesize

        4KB

      • memory/3132-137-0x0000000006E60000-0x0000000006E9C000-memory.dmp

        Filesize

        240KB

      • memory/3132-136-0x0000000006A40000-0x0000000006A52000-memory.dmp

        Filesize

        72KB

      • memory/3132-132-0x00000000060B0000-0x0000000006654000-memory.dmp

        Filesize

        5.6MB

      • memory/3132-131-0x0000000000FC0000-0x000000000104C000-memory.dmp

        Filesize

        560KB

      • memory/4028-144-0x0000000074990000-0x0000000075140000-memory.dmp

        Filesize

        7.7MB

      • memory/4028-151-0x0000000007400000-0x000000000740A000-memory.dmp

        Filesize

        40KB