Analysis
-
max time kernel
508s -
max time network
510s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2022, 00:37
Static task
static1
Behavioral task
behavioral1
Sample
a6790b94598f37630241e6cd5727f4e1ba0b90dce40bb6302a6e4b52839077cc.rar
Resource
win10v2004-20220812-en
General
-
Target
a6790b94598f37630241e6cd5727f4e1ba0b90dce40bb6302a6e4b52839077cc.rar
-
Size
1.6MB
-
MD5
3c631b8a295f115daecd22d097026312
-
SHA1
776517116dbd2dd5faa7bf79796f868eaabd3513
-
SHA256
a6790b94598f37630241e6cd5727f4e1ba0b90dce40bb6302a6e4b52839077cc
-
SHA512
81914c1dc797127e598b30e53c1422fe9b1a9e960ca03ad670e8b29e7a57dfcc88ebb367602bce1efca45a4cd2d379ba18000fd0b27b8cddba062495a95628b9
-
SSDEEP
49152:tPgnrgcNTSpj28CxsnbPMxkiFLf4uEXYzMh:twhi2zsynFLQXYIh
Malware Config
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions VenomRootKit_cracked.exe -
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
pid Process 3544 VenomRootKit_cracked.exe 3976 InstallerVenom.exe 4928 VenomRootKit_cracked.exe 460 CommandCam.exe 3468 ctfmom.exe 3536 InstallerVenom.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools VenomRootKit_cracked.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion VenomRootKit_cracked.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion VenomRootKit_cracked.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation VenomRootKit_cracked.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 86 ip-api.com -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum VenomRootKit_cracked.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 VenomRootKit_cracked.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3544 set thread context of 4928 3544 VenomRootKit_cracked.exe 109 PID 4928 set thread context of 2264 4928 VenomRootKit_cracked.exe 110 PID 3976 set thread context of 3536 3976 InstallerVenom.exe 122 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 5080 3536 WerFault.exe 122 -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2436 tasklist.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3468 ctfmom.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2264 MSBuild.exe 2264 MSBuild.exe 2264 MSBuild.exe 2264 MSBuild.exe 2264 MSBuild.exe 2264 MSBuild.exe 2264 MSBuild.exe 3536 InstallerVenom.exe 3536 InstallerVenom.exe 3536 InstallerVenom.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeRestorePrivilege 3932 7zG.exe Token: 35 3932 7zG.exe Token: SeSecurityPrivilege 3932 7zG.exe Token: SeSecurityPrivilege 3932 7zG.exe Token: SeDebugPrivilege 2264 MSBuild.exe Token: SeDebugPrivilege 2436 tasklist.exe Token: SeDebugPrivilege 3536 InstallerVenom.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3932 7zG.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4604 OpenWith.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 3544 wrote to memory of 4928 3544 VenomRootKit_cracked.exe 109 PID 3544 wrote to memory of 4928 3544 VenomRootKit_cracked.exe 109 PID 3544 wrote to memory of 4928 3544 VenomRootKit_cracked.exe 109 PID 3544 wrote to memory of 4928 3544 VenomRootKit_cracked.exe 109 PID 3544 wrote to memory of 4928 3544 VenomRootKit_cracked.exe 109 PID 3544 wrote to memory of 4928 3544 VenomRootKit_cracked.exe 109 PID 3544 wrote to memory of 4928 3544 VenomRootKit_cracked.exe 109 PID 3544 wrote to memory of 4928 3544 VenomRootKit_cracked.exe 109 PID 4928 wrote to memory of 2264 4928 VenomRootKit_cracked.exe 110 PID 4928 wrote to memory of 2264 4928 VenomRootKit_cracked.exe 110 PID 4928 wrote to memory of 2264 4928 VenomRootKit_cracked.exe 110 PID 4928 wrote to memory of 2264 4928 VenomRootKit_cracked.exe 110 PID 4928 wrote to memory of 2264 4928 VenomRootKit_cracked.exe 110 PID 4928 wrote to memory of 2264 4928 VenomRootKit_cracked.exe 110 PID 4928 wrote to memory of 2264 4928 VenomRootKit_cracked.exe 110 PID 4928 wrote to memory of 2264 4928 VenomRootKit_cracked.exe 110 PID 2264 wrote to memory of 1144 2264 MSBuild.exe 111 PID 2264 wrote to memory of 1144 2264 MSBuild.exe 111 PID 2264 wrote to memory of 1144 2264 MSBuild.exe 111 PID 1144 wrote to memory of 3212 1144 cmd.exe 113 PID 1144 wrote to memory of 3212 1144 cmd.exe 113 PID 1144 wrote to memory of 3212 1144 cmd.exe 113 PID 1144 wrote to memory of 4832 1144 cmd.exe 114 PID 1144 wrote to memory of 4832 1144 cmd.exe 114 PID 1144 wrote to memory of 4832 1144 cmd.exe 114 PID 1144 wrote to memory of 768 1144 cmd.exe 115 PID 1144 wrote to memory of 768 1144 cmd.exe 115 PID 1144 wrote to memory of 768 1144 cmd.exe 115 PID 2264 wrote to memory of 1352 2264 MSBuild.exe 116 PID 2264 wrote to memory of 1352 2264 MSBuild.exe 116 PID 2264 wrote to memory of 1352 2264 MSBuild.exe 116 PID 1352 wrote to memory of 2436 1352 cmd.exe 118 PID 1352 wrote to memory of 2436 1352 cmd.exe 118 PID 1352 wrote to memory of 2436 1352 cmd.exe 118 PID 2264 wrote to memory of 460 2264 MSBuild.exe 119 PID 2264 wrote to memory of 460 2264 MSBuild.exe 119 PID 2264 wrote to memory of 460 2264 MSBuild.exe 119 PID 4928 wrote to memory of 3468 4928 VenomRootKit_cracked.exe 121 PID 4928 wrote to memory of 3468 4928 VenomRootKit_cracked.exe 121 PID 4928 wrote to memory of 3468 4928 VenomRootKit_cracked.exe 121 PID 3976 wrote to memory of 3536 3976 InstallerVenom.exe 122 PID 3976 wrote to memory of 3536 3976 InstallerVenom.exe 122 PID 3976 wrote to memory of 3536 3976 InstallerVenom.exe 122 PID 3976 wrote to memory of 3536 3976 InstallerVenom.exe 122 PID 3976 wrote to memory of 3536 3976 InstallerVenom.exe 122 PID 3976 wrote to memory of 3536 3976 InstallerVenom.exe 122 PID 3976 wrote to memory of 3536 3976 InstallerVenom.exe 122 PID 3976 wrote to memory of 3536 3976 InstallerVenom.exe 122 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\a6790b94598f37630241e6cd5727f4e1ba0b90dce40bb6302a6e4b52839077cc.rar1⤵
- Modifies registry class
PID:4896
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4604
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4952
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\a6790b94598f37630241e6cd5727f4e1ba0b90dce40bb6302a6e4b52839077cc\" -spe -an -ai#7zMap17318:208:7zEvent282631⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3932
-
C:\Users\Admin\AppData\Local\Temp\a6790b94598f37630241e6cd5727f4e1ba0b90dce40bb6302a6e4b52839077cc\CRACKED Venom Rootkit\VenomRootKit_cracked.exe"C:\Users\Admin\AppData\Local\Temp\a6790b94598f37630241e6cd5727f4e1ba0b90dce40bb6302a6e4b52839077cc\CRACKED Venom Rootkit\VenomRootKit_cracked.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Executes dropped EXE
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\a6790b94598f37630241e6cd5727f4e1ba0b90dce40bb6302a6e4b52839077cc\CRACKED Venom Rootkit\VenomRootKit_cracked.exe"{path}"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:2264 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All4⤵
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\SysWOW64\chcp.comchcp 650015⤵PID:3212
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile5⤵PID:4832
-
-
C:\Windows\SysWOW64\findstr.exefindstr All5⤵PID:768
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C tasklist /FO TABLE > "C:\Users\Admin\AppData\Local\Temp\3873d8888a3836bc92341667cb978e5e\0f79cba149a8da92ce38d8b34e9b0240\processes.txt"4⤵
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\tasklist.exetasklist /FO TABLE5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2436
-
-
-
C:\Users\Admin\AppData\Local\Temp\CommandCam.exe"C:\Users\Admin\AppData\Local\Temp\CommandCam.exe" /filename "C:\Users\Admin\AppData\Local\Temp\3873d8888a3836bc92341667cb978e5e\0f79cba149a8da92ce38d8b34e9b0240\cam.jpg" /devnum 14⤵
- Executes dropped EXE
PID:460
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\ctfmom.exe"C:\Users\Admin\AppData\Roaming\Microsoft\ctfmom.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
PID:3468
-
-
-
C:\Users\Admin\AppData\Local\Temp\a6790b94598f37630241e6cd5727f4e1ba0b90dce40bb6302a6e4b52839077cc\CRACKED Venom Rootkit\InstallerVenom.exe"C:\Users\Admin\AppData\Local\Temp\a6790b94598f37630241e6cd5727f4e1ba0b90dce40bb6302a6e4b52839077cc\CRACKED Venom Rootkit\InstallerVenom.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\a6790b94598f37630241e6cd5727f4e1ba0b90dce40bb6302a6e4b52839077cc\CRACKED Venom Rootkit\InstallerVenom.exe"{path}"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3536 -s 15843⤵
- Program crash
PID:5080
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3536 -ip 35361⤵PID:1968
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3
-
Filesize
1KB
MD5e08f822522c617a40840c62e4b0fb45e
SHA1ae516dca4da5234be6676d3f234c19ec55725be7
SHA256bd9d5e9f7fe6fcff17d873555d4077d15f7d6cdda1183e7f7d278b735ffe1fd7
SHA512894a7fb7bbc18ac6ba13378f58a7db80ad00d6080be9a66b01cae8e23e41d9d2d4cd53c1e20669356b73590c8a3ebfda4bdda3258f81240db56c4a81b7313fe4
-
C:\Users\Admin\AppData\Local\Temp\3873d8888a3836bc92341667cb978e5e\0f79cba149a8da92ce38d8b34e9b0240\processes.txt
Filesize7KB
MD55893355d05fa3a2cf12d875dc4ad0bb8
SHA1e06c2622e827055b93443cf4e1df51f7b152a415
SHA256c32da42b58712db430e14f20a7cabfb3449cc340a4f746ca46f8242e6bf6017d
SHA512a620cb9bbd54182210394256ab6cf1737f77dc19636dce74daa81e2cbfa32887855728a7fc3a5c28f5470121e1a337d9b450423eae9de4cb88ee6bd4d3d62a00
-
Filesize
63KB
MD51009e5b3884fffc9926a2e97ccdf8408
SHA115ef775adbddd1f9515860f322fcfdb1f81fbb49
SHA256e4e7f08d9a9a662b5615e8fcbb6cd3c711ecab6341a60562bbeff9ccca43f7e0
SHA5123a8b777ccca6f29c8bc350711f594e1951afdbce8eb78786d2b3d85f940051635c05ec414768eef956076e41f1e53195f4d6fc20941428f525fc7cbbecc67891
-
Filesize
63KB
MD51009e5b3884fffc9926a2e97ccdf8408
SHA115ef775adbddd1f9515860f322fcfdb1f81fbb49
SHA256e4e7f08d9a9a662b5615e8fcbb6cd3c711ecab6341a60562bbeff9ccca43f7e0
SHA5123a8b777ccca6f29c8bc350711f594e1951afdbce8eb78786d2b3d85f940051635c05ec414768eef956076e41f1e53195f4d6fc20941428f525fc7cbbecc67891
-
C:\Users\Admin\AppData\Local\Temp\a6790b94598f37630241e6cd5727f4e1ba0b90dce40bb6302a6e4b52839077cc\CRACKED Venom Rootkit\InstallerVenom.exe
Filesize4.8MB
MD5ccb8a36201fbd8a7b0d945a849d0d381
SHA12fe5465e6a974d0e51a7748d35518e33e01f32e7
SHA256c7b9c893fa6b625a0755001a5a881bd0f797ecec40bdd208ac2522985454e46e
SHA51284a3f83ef74830637192b81031614493281bff935f560441c006306925d6d6e8b3450e332bb6e6b15a043aa16e427a80899697a96fa140f1fd667a8d096472ba
-
C:\Users\Admin\AppData\Local\Temp\a6790b94598f37630241e6cd5727f4e1ba0b90dce40bb6302a6e4b52839077cc\CRACKED Venom Rootkit\InstallerVenom.exe
Filesize4.8MB
MD5ccb8a36201fbd8a7b0d945a849d0d381
SHA12fe5465e6a974d0e51a7748d35518e33e01f32e7
SHA256c7b9c893fa6b625a0755001a5a881bd0f797ecec40bdd208ac2522985454e46e
SHA51284a3f83ef74830637192b81031614493281bff935f560441c006306925d6d6e8b3450e332bb6e6b15a043aa16e427a80899697a96fa140f1fd667a8d096472ba
-
C:\Users\Admin\AppData\Local\Temp\a6790b94598f37630241e6cd5727f4e1ba0b90dce40bb6302a6e4b52839077cc\CRACKED Venom Rootkit\InstallerVenom.exe
Filesize4.8MB
MD5ccb8a36201fbd8a7b0d945a849d0d381
SHA12fe5465e6a974d0e51a7748d35518e33e01f32e7
SHA256c7b9c893fa6b625a0755001a5a881bd0f797ecec40bdd208ac2522985454e46e
SHA51284a3f83ef74830637192b81031614493281bff935f560441c006306925d6d6e8b3450e332bb6e6b15a043aa16e427a80899697a96fa140f1fd667a8d096472ba
-
C:\Users\Admin\AppData\Local\Temp\a6790b94598f37630241e6cd5727f4e1ba0b90dce40bb6302a6e4b52839077cc\CRACKED Venom Rootkit\VenomRootKit_cracked.exe
Filesize23.8MB
MD54ff2fd0ee55920b92e95302ef5644f51
SHA16a6cf34c224d41e11e17e62552254fef6e8a87a2
SHA256d794efea1a6ad5b3e590782ca066fa7166e0b1dd4f0fddde03a7539ca0b4ebe6
SHA51275667a16be2d33f9ac3bec9cb5ed76a11b97e1ef575c963e89f328a552f041baf41fe31f1948bddf97c07e659f1e18bdf3d64452441b7dacc3dde2531905daf4
-
C:\Users\Admin\AppData\Local\Temp\a6790b94598f37630241e6cd5727f4e1ba0b90dce40bb6302a6e4b52839077cc\CRACKED Venom Rootkit\VenomRootKit_cracked.exe
Filesize23.8MB
MD54ff2fd0ee55920b92e95302ef5644f51
SHA16a6cf34c224d41e11e17e62552254fef6e8a87a2
SHA256d794efea1a6ad5b3e590782ca066fa7166e0b1dd4f0fddde03a7539ca0b4ebe6
SHA51275667a16be2d33f9ac3bec9cb5ed76a11b97e1ef575c963e89f328a552f041baf41fe31f1948bddf97c07e659f1e18bdf3d64452441b7dacc3dde2531905daf4
-
C:\Users\Admin\AppData\Local\Temp\a6790b94598f37630241e6cd5727f4e1ba0b90dce40bb6302a6e4b52839077cc\CRACKED Venom Rootkit\VenomRootKit_cracked.exe
Filesize23.8MB
MD54ff2fd0ee55920b92e95302ef5644f51
SHA16a6cf34c224d41e11e17e62552254fef6e8a87a2
SHA256d794efea1a6ad5b3e590782ca066fa7166e0b1dd4f0fddde03a7539ca0b4ebe6
SHA51275667a16be2d33f9ac3bec9cb5ed76a11b97e1ef575c963e89f328a552f041baf41fe31f1948bddf97c07e659f1e18bdf3d64452441b7dacc3dde2531905daf4
-
Filesize
42KB
MD5998d4888b99734c60802f93fb2daf940
SHA1297a395d096ca67b885134dea1147c270b402c1a
SHA256d63c4166014d50c6321e82e1c6de7c1a2207b0e09f541d1275d0109aa1d191b5
SHA5122658aab48807606dc83c4b822438b5454a3df19f4db015d30b8b330baab6218a8a259bb33a2e57398e3c6823059ea49477b4d79df63fe383a9f4725359899190
-
Filesize
42KB
MD5998d4888b99734c60802f93fb2daf940
SHA1297a395d096ca67b885134dea1147c270b402c1a
SHA256d63c4166014d50c6321e82e1c6de7c1a2207b0e09f541d1275d0109aa1d191b5
SHA5122658aab48807606dc83c4b822438b5454a3df19f4db015d30b8b330baab6218a8a259bb33a2e57398e3c6823059ea49477b4d79df63fe383a9f4725359899190