Analysis
-
max time kernel
117s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-09-2022 19:24
Static task
static1
Behavioral task
behavioral1
Sample
copy.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
copy.exe
Resource
win10v2004-20220812-en
General
-
Target
copy.exe
-
Size
300.0MB
-
MD5
3bfc4f5d058aac39f3cd1cc7771fb376
-
SHA1
4f400860ad6e90f17b6abe3f925de5fe47dac4ba
-
SHA256
05af19f88159fdc48e4039627198ddffacceb086e67a5fe0a76379a490be75a6
-
SHA512
263be832f00990f423febb1be6f7871841c695c876f051a6f0906dfa9cb577f00b5a6a610fdf36a8c5d3323d2e8b5e171d78fe2e42b4bf6114d6c76476fa236e
-
SSDEEP
6144:duoCmQdnCJGib1C5mb67X3UIAPaQxgm5LqGZAoyT24sc+n9fiibGd2HzZ:duL8JGib05b7XE2Q4+4Y
Malware Config
Extracted
asyncrat
5.0.5
Venom Clients
venom12345.duckdns.org:4449
venomunverified.duckdns.org:4449
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 8 IoCs
Processes:
resource yara_rule behavioral1/memory/940-59-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat behavioral1/memory/940-60-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat behavioral1/memory/940-61-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat behavioral1/memory/940-62-0x0000000000410A1E-mapping.dmp asyncrat behavioral1/memory/940-64-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat behavioral1/memory/940-66-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat behavioral1/memory/1484-83-0x0000000000410A1E-mapping.dmp asyncrat behavioral1/memory/892-103-0x0000000000410A1E-mapping.dmp asyncrat -
Executes dropped EXE 2 IoCs
Processes:
msdtc.exemsdtc.exepid process 608 msdtc.exe 1020 msdtc.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
copy.exemsdtc.exemsdtc.exedescription pid process target process PID 1460 set thread context of 940 1460 copy.exe RegAsm.exe PID 608 set thread context of 1484 608 msdtc.exe RegAsm.exe PID 1020 set thread context of 892 1020 msdtc.exe RegAsm.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 1064 schtasks.exe 1984 schtasks.exe 1916 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
copy.exeRegAsm.exemsdtc.exeRegAsm.exemsdtc.exeRegAsm.exedescription pid process Token: SeDebugPrivilege 1460 copy.exe Token: SeDebugPrivilege 940 RegAsm.exe Token: SeDebugPrivilege 608 msdtc.exe Token: SeDebugPrivilege 1484 RegAsm.exe Token: SeDebugPrivilege 1020 msdtc.exe Token: SeDebugPrivilege 892 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
copy.execmd.exetaskeng.exemsdtc.execmd.exedescription pid process target process PID 1460 wrote to memory of 940 1460 copy.exe RegAsm.exe PID 1460 wrote to memory of 940 1460 copy.exe RegAsm.exe PID 1460 wrote to memory of 940 1460 copy.exe RegAsm.exe PID 1460 wrote to memory of 940 1460 copy.exe RegAsm.exe PID 1460 wrote to memory of 940 1460 copy.exe RegAsm.exe PID 1460 wrote to memory of 940 1460 copy.exe RegAsm.exe PID 1460 wrote to memory of 940 1460 copy.exe RegAsm.exe PID 1460 wrote to memory of 940 1460 copy.exe RegAsm.exe PID 1460 wrote to memory of 940 1460 copy.exe RegAsm.exe PID 1460 wrote to memory of 940 1460 copy.exe RegAsm.exe PID 1460 wrote to memory of 940 1460 copy.exe RegAsm.exe PID 1460 wrote to memory of 940 1460 copy.exe RegAsm.exe PID 1460 wrote to memory of 2032 1460 copy.exe cmd.exe PID 1460 wrote to memory of 2032 1460 copy.exe cmd.exe PID 1460 wrote to memory of 2032 1460 copy.exe cmd.exe PID 1460 wrote to memory of 2032 1460 copy.exe cmd.exe PID 1460 wrote to memory of 1888 1460 copy.exe cmd.exe PID 1460 wrote to memory of 1888 1460 copy.exe cmd.exe PID 1460 wrote to memory of 1888 1460 copy.exe cmd.exe PID 1460 wrote to memory of 1888 1460 copy.exe cmd.exe PID 1460 wrote to memory of 892 1460 copy.exe cmd.exe PID 1460 wrote to memory of 892 1460 copy.exe cmd.exe PID 1460 wrote to memory of 892 1460 copy.exe cmd.exe PID 1460 wrote to memory of 892 1460 copy.exe cmd.exe PID 1888 wrote to memory of 1916 1888 cmd.exe schtasks.exe PID 1888 wrote to memory of 1916 1888 cmd.exe schtasks.exe PID 1888 wrote to memory of 1916 1888 cmd.exe schtasks.exe PID 1888 wrote to memory of 1916 1888 cmd.exe schtasks.exe PID 1936 wrote to memory of 608 1936 taskeng.exe msdtc.exe PID 1936 wrote to memory of 608 1936 taskeng.exe msdtc.exe PID 1936 wrote to memory of 608 1936 taskeng.exe msdtc.exe PID 1936 wrote to memory of 608 1936 taskeng.exe msdtc.exe PID 608 wrote to memory of 1484 608 msdtc.exe RegAsm.exe PID 608 wrote to memory of 1484 608 msdtc.exe RegAsm.exe PID 608 wrote to memory of 1484 608 msdtc.exe RegAsm.exe PID 608 wrote to memory of 1484 608 msdtc.exe RegAsm.exe PID 608 wrote to memory of 1484 608 msdtc.exe RegAsm.exe PID 608 wrote to memory of 1484 608 msdtc.exe RegAsm.exe PID 608 wrote to memory of 1484 608 msdtc.exe RegAsm.exe PID 608 wrote to memory of 1484 608 msdtc.exe RegAsm.exe PID 608 wrote to memory of 1484 608 msdtc.exe RegAsm.exe PID 608 wrote to memory of 1484 608 msdtc.exe RegAsm.exe PID 608 wrote to memory of 1484 608 msdtc.exe RegAsm.exe PID 608 wrote to memory of 1484 608 msdtc.exe RegAsm.exe PID 608 wrote to memory of 744 608 msdtc.exe cmd.exe PID 608 wrote to memory of 744 608 msdtc.exe cmd.exe PID 608 wrote to memory of 744 608 msdtc.exe cmd.exe PID 608 wrote to memory of 744 608 msdtc.exe cmd.exe PID 608 wrote to memory of 1604 608 msdtc.exe cmd.exe PID 608 wrote to memory of 1604 608 msdtc.exe cmd.exe PID 608 wrote to memory of 1604 608 msdtc.exe cmd.exe PID 608 wrote to memory of 1604 608 msdtc.exe cmd.exe PID 608 wrote to memory of 1080 608 msdtc.exe cmd.exe PID 608 wrote to memory of 1080 608 msdtc.exe cmd.exe PID 608 wrote to memory of 1080 608 msdtc.exe cmd.exe PID 608 wrote to memory of 1080 608 msdtc.exe cmd.exe PID 1604 wrote to memory of 1064 1604 cmd.exe schtasks.exe PID 1604 wrote to memory of 1064 1604 cmd.exe schtasks.exe PID 1604 wrote to memory of 1064 1604 cmd.exe schtasks.exe PID 1604 wrote to memory of 1064 1604 cmd.exe schtasks.exe PID 1936 wrote to memory of 1020 1936 taskeng.exe msdtc.exe PID 1936 wrote to memory of 1020 1936 taskeng.exe msdtc.exe PID 1936 wrote to memory of 1020 1936 taskeng.exe msdtc.exe PID 1936 wrote to memory of 1020 1936 taskeng.exe msdtc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\copy.exe"C:\Users\Admin\AppData\Local\Temp\copy.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\msdtc"2⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\msdtc\msdtc.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\msdtc\msdtc.exe'" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\copy.exe" "C:\Users\Admin\AppData\Roaming\msdtc\msdtc.exe"2⤵
-
C:\Windows\system32\taskeng.exetaskeng.exe {3DFD2CF2-A816-4DE2-B8A8-450A973DAD27} S-1-5-21-3845472200-3839195424-595303356-1000:ZERMMMDR\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\msdtc\msdtc.exeC:\Users\Admin\AppData\Roaming\msdtc\msdtc.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\msdtc"3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\msdtc\msdtc.exe'" /f3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\msdtc\msdtc.exe'" /f4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\msdtc\msdtc.exe" "C:\Users\Admin\AppData\Roaming\msdtc\msdtc.exe"3⤵
-
C:\Users\Admin\AppData\Roaming\msdtc\msdtc.exeC:\Users\Admin\AppData\Roaming\msdtc\msdtc.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\msdtc"3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\msdtc\msdtc.exe'" /f3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\msdtc\msdtc.exe'" /f4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\msdtc\msdtc.exe" "C:\Users\Admin\AppData\Roaming\msdtc\msdtc.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\msdtc\msdtc.exeFilesize
300.0MB
MD53bfc4f5d058aac39f3cd1cc7771fb376
SHA14f400860ad6e90f17b6abe3f925de5fe47dac4ba
SHA25605af19f88159fdc48e4039627198ddffacceb086e67a5fe0a76379a490be75a6
SHA512263be832f00990f423febb1be6f7871841c695c876f051a6f0906dfa9cb577f00b5a6a610fdf36a8c5d3323d2e8b5e171d78fe2e42b4bf6114d6c76476fa236e
-
C:\Users\Admin\AppData\Roaming\msdtc\msdtc.exeFilesize
300.0MB
MD53bfc4f5d058aac39f3cd1cc7771fb376
SHA14f400860ad6e90f17b6abe3f925de5fe47dac4ba
SHA25605af19f88159fdc48e4039627198ddffacceb086e67a5fe0a76379a490be75a6
SHA512263be832f00990f423febb1be6f7871841c695c876f051a6f0906dfa9cb577f00b5a6a610fdf36a8c5d3323d2e8b5e171d78fe2e42b4bf6114d6c76476fa236e
-
C:\Users\Admin\AppData\Roaming\msdtc\msdtc.exeFilesize
300.0MB
MD53bfc4f5d058aac39f3cd1cc7771fb376
SHA14f400860ad6e90f17b6abe3f925de5fe47dac4ba
SHA25605af19f88159fdc48e4039627198ddffacceb086e67a5fe0a76379a490be75a6
SHA512263be832f00990f423febb1be6f7871841c695c876f051a6f0906dfa9cb577f00b5a6a610fdf36a8c5d3323d2e8b5e171d78fe2e42b4bf6114d6c76476fa236e
-
memory/608-75-0x0000000000A10000-0x0000000000A92000-memory.dmpFilesize
520KB
-
memory/608-73-0x0000000000000000-mapping.dmp
-
memory/616-109-0x0000000000000000-mapping.dmp
-
memory/744-84-0x0000000000000000-mapping.dmp
-
memory/892-70-0x0000000000000000-mapping.dmp
-
memory/892-103-0x0000000000410A1E-mapping.dmp
-
memory/940-62-0x0000000000410A1E-mapping.dmp
-
memory/940-56-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/940-66-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/940-64-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/940-57-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/940-61-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/940-60-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/940-59-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1020-95-0x0000000000BE0000-0x0000000000C62000-memory.dmpFilesize
520KB
-
memory/1020-93-0x0000000000000000-mapping.dmp
-
memory/1064-92-0x0000000000000000-mapping.dmp
-
memory/1080-91-0x0000000000000000-mapping.dmp
-
memory/1460-54-0x0000000000B30000-0x0000000000BB2000-memory.dmpFilesize
520KB
-
memory/1460-55-0x0000000075981000-0x0000000075983000-memory.dmpFilesize
8KB
-
memory/1484-83-0x0000000000410A1E-mapping.dmp
-
memory/1544-111-0x0000000000000000-mapping.dmp
-
memory/1604-90-0x0000000000000000-mapping.dmp
-
memory/1724-110-0x0000000000000000-mapping.dmp
-
memory/1888-69-0x0000000000000000-mapping.dmp
-
memory/1916-71-0x0000000000000000-mapping.dmp
-
memory/1984-112-0x0000000000000000-mapping.dmp
-
memory/2032-68-0x0000000000000000-mapping.dmp