Analysis

  • max time kernel
    844s
  • max time network
    889s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 19:48

General

  • Target

    http://mrpker9.com/Venom/VenomR4T_HVNC.bat

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 46 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://mrpker9.com/Venom/VenomR4T_HVNC.bat
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1396
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1396 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:240

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\82CB34DD3343FE727DF8890D352E0D8F

    Filesize

    7KB

    MD5

    64bd9a644bd182581368e3ce024dad9a

    SHA1

    1520bd16d65200bfa86d889eb88f4f62a65dd007

    SHA256

    5814095df174f580f08019718d2f8d05177276906620e36564588ba4b19ddfdb

    SHA512

    af1ec9959334ae377a1b199a44ec31a3cadc1273512f8a2644eb8b3b21f24d4afe1c0515a3bb685bd35a0856c2d6383504ee7e72ae67f87f3bda0a8ff91ec5db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F

    Filesize

    232B

    MD5

    79bb96f91d863875a064dc8e4125da8b

    SHA1

    8a94d40434b190f76a9da0850c462e1f5d046f5c

    SHA256

    0277f1fc18e4be7506c4b6f4be45374d49ebdcee72b382cb621b75c7abfd1267

    SHA512

    6e13aaa9a434ab9d5b7eb16127ffb7380b2dbf5efff763459b8ecabd093df4ba20e41a1f654e5994ec4986ef3c4cac42e4ee980492c7f276fa85a69ed7774d7a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0f59dee55dcde2b7f8db1632a7680d2e

    SHA1

    11145782d89addb982ef3add8b91360333f963fa

    SHA256

    26df8432f1ccd4aefff5296cf4b5cc08177ab2f26029182e97bbf8efd4b7fb49

    SHA512

    606e9ae782889bebaf2b77d7040d9c3cab79a51cb3cda503ce472b68f402480b7585832ec007309e0d45863d8543c55dc7b3bf9736f36c635aa8fe1410ed6e62

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\1XOYR8T1.txt

    Filesize

    608B

    MD5

    9c5db7899b6fe900af6fc6e5e1cf21a6

    SHA1

    6d7a95fbc994ee615d40ef003a9c4accca02142a

    SHA256

    82910ee07cbf09479b7fde71d66b2152f61dac1c288e9d2ff15261f578e83a19

    SHA512

    cee33bc2ba2bc61093b1f3bc1710533909aa476c0dcae2a6cc60aaa9420b150c425df734c8cf4ad99d679debda8f736601b2923df04b58c6733ce6ef32b25351