Analysis
-
max time kernel
208s -
max time network
210s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-01-2023 16:45
Behavioral task
behavioral1
Sample
Venus.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Venus.exe
Resource
win10v2004-20221111-en
General
-
Target
Venus.exe
-
Size
225KB
-
MD5
07f5fbcb96179acffab2638392d08fb8
-
SHA1
22d84ca8e620ef5fc0027b3e06876d1a04d10406
-
SHA256
4f92e2f752e4b0b30193d53375cd2fbd4beff02db9d6b3b6cadbf3b50e503498
-
SHA512
0ed902259cf218f0d1f6349ff4ee45b674f19f867cbbe7fee28cf80b7edf67e691738274df4b2c7be01aac60639c45e35717e2b9c59518bc6e1240a022acabf4
-
SSDEEP
6144:FQJmXLQwAhWUkJ0kfV50DEr2MxgTw7ozFD254W:FeeLQwAi07DWGcopfW
Malware Config
Signatures
-
Venus
Venus is a ransomware first seen in 2022.
-
Venus Ransomware 4 IoCs
resource yara_rule behavioral1/files/0x000c0000000054a8-56.dat family_venus behavioral1/memory/1944-59-0x0000000000400000-0x000000000043E000-memory.dmp family_venus behavioral1/memory/1380-66-0x0000000000400000-0x000000000043E000-memory.dmp family_venus behavioral1/memory/1380-67-0x0000000000400000-0x000000000043E000-memory.dmp family_venus -
Executes dropped EXE 1 IoCs
pid Process 1380 Venus.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1776 netsh.exe -
Deletes itself 1 IoCs
pid Process 1316 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Venus.exe = "C:\\Windows\\Venus.exe" Venus.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification \??\E:\$RECYCLE.BIN\S-1-5-21-3845472200-3839195424-595303356-1000\desktop.ini Venus.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: Venus.exe File opened (read-only) \??\E: Venus.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\34870686271972527219.png Venus.exe File created C:\Windows\Venus.exe Venus.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 556 taskkill.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.venus Venus.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.venus\DefaultIcon Venus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.venus\DefaultIcon\ = "C:\\Windows\\34870686271972527219.png" Venus.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1132 PING.EXE -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 1380 Venus.exe Token: SeTcbPrivilege 1380 Venus.exe Token: SeTakeOwnershipPrivilege 1380 Venus.exe Token: SeSecurityPrivilege 1380 Venus.exe Token: SeDebugPrivilege 556 taskkill.exe Token: 33 2336 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2336 AUDIODG.EXE Token: 33 2336 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2336 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1944 wrote to memory of 1380 1944 Venus.exe 27 PID 1944 wrote to memory of 1380 1944 Venus.exe 27 PID 1944 wrote to memory of 1380 1944 Venus.exe 27 PID 1944 wrote to memory of 1380 1944 Venus.exe 27 PID 1944 wrote to memory of 1316 1944 Venus.exe 28 PID 1944 wrote to memory of 1316 1944 Venus.exe 28 PID 1944 wrote to memory of 1316 1944 Venus.exe 28 PID 1944 wrote to memory of 1316 1944 Venus.exe 28 PID 1380 wrote to memory of 1716 1380 Venus.exe 30 PID 1380 wrote to memory of 1716 1380 Venus.exe 30 PID 1380 wrote to memory of 1716 1380 Venus.exe 30 PID 1380 wrote to memory of 1716 1380 Venus.exe 30 PID 1316 wrote to memory of 1132 1316 cmd.exe 32 PID 1316 wrote to memory of 1132 1316 cmd.exe 32 PID 1316 wrote to memory of 1132 1316 cmd.exe 32 PID 1380 wrote to memory of 896 1380 Venus.exe 34 PID 1380 wrote to memory of 896 1380 Venus.exe 34 PID 1380 wrote to memory of 896 1380 Venus.exe 34 PID 1380 wrote to memory of 896 1380 Venus.exe 34 PID 1716 wrote to memory of 1776 1716 cmd.exe 33 PID 1716 wrote to memory of 1776 1716 cmd.exe 33 PID 1716 wrote to memory of 1776 1716 cmd.exe 33 PID 896 wrote to memory of 556 896 cmd.exe 36 PID 896 wrote to memory of 556 896 cmd.exe 36 PID 896 wrote to memory of 556 896 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\Venus.exe"C:\Users\Admin\AppData\Local\Temp\Venus.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\Venus.exe"C:\Windows\Venus.exe" g g g o n e1232⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\System32\cmd.exe/C netsh advfirewall firewall set rule group="File and Printer Sharing" new enable=Yes3⤵
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall set rule group="File and Printer Sharing" new enable=Yes4⤵
- Modifies Windows Firewall
PID:1776
-
-
-
C:\Windows\System32\cmd.exe/C taskkill /F /IM msftesql.exe /IM sqlagent.exe /IM sqlbrowser.exe /IM sqlservr.exe /IM sqlwriter.exe /IM oracle.exe /IM ocssd.exe /IM dbsnmp.exe /IM synctime.exe /IM mydesktopqos.exe /IM agntsvc.exe /IM isqlplussvc.exe /IM xfssvccon.exe /IM mydesktopservice.exe /IM ocautoupds.exe /IM agntsvc.exe /IM agntsvc.exe /IM agntsvc.exe /IM encsvc.exe /IM firefoxconfig.exe /IM tbirdconfig.exe /IM ocomm.exe /IM mysqld.exe /IM mysqld-nt.exe /IM mysqld-opt.exe /IM dbeng50.exe /IM sqbcoreservice.exe /IM excel.exe /IM infopath.exe /IM msaccess.exe /IM mspub.exe /IM onenote.exe /IM outlook.exe /IM powerpnt.exe /IM sqlservr.exe /IM thebat64.exe /IM thunderbird.exe /IM winword.exe /IM wordpad.exe3⤵
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\system32\taskkill.exetaskkill /F /IM msftesql.exe /IM sqlagent.exe /IM sqlbrowser.exe /IM sqlservr.exe /IM sqlwriter.exe /IM oracle.exe /IM ocssd.exe /IM dbsnmp.exe /IM synctime.exe /IM mydesktopqos.exe /IM agntsvc.exe /IM isqlplussvc.exe /IM xfssvccon.exe /IM mydesktopservice.exe /IM ocautoupds.exe /IM agntsvc.exe /IM agntsvc.exe /IM agntsvc.exe /IM encsvc.exe /IM firefoxconfig.exe /IM tbirdconfig.exe /IM ocomm.exe /IM mysqld.exe /IM mysqld-nt.exe /IM mysqld-opt.exe /IM dbeng50.exe /IM sqbcoreservice.exe /IM excel.exe /IM infopath.exe /IM msaccess.exe /IM mspub.exe /IM onenote.exe /IM outlook.exe /IM powerpnt.exe /IM sqlservr.exe /IM thebat64.exe /IM thunderbird.exe /IM winword.exe /IM wordpad.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:556
-
-
-
-
C:\Windows\System32\cmd.exe/c ping localhost -n 3 > nul & del C:\Users\Admin\AppData\Local\Temp\Venus.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\system32\PING.EXEping localhost -n 33⤵
- Runs ping.exe
PID:1132
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4d01⤵
- Suspicious use of AdjustPrivilegeToken
PID:2336
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
225KB
MD507f5fbcb96179acffab2638392d08fb8
SHA122d84ca8e620ef5fc0027b3e06876d1a04d10406
SHA2564f92e2f752e4b0b30193d53375cd2fbd4beff02db9d6b3b6cadbf3b50e503498
SHA5120ed902259cf218f0d1f6349ff4ee45b674f19f867cbbe7fee28cf80b7edf67e691738274df4b2c7be01aac60639c45e35717e2b9c59518bc6e1240a022acabf4