Overview
overview
10Static
static
10Venom Crac...me.dll
windows7-x64
1Venom Crac...me.dll
windows10-2004-x64
1Venom Crac...to.dll
windows7-x64
1Venom Crac...to.dll
windows10-2004-x64
1Venom Crac...er.exe
windows7-x64
10Venom Crac...er.exe
windows10-2004-x64
10Venom Crac...ms.dll
windows7-x64
1Venom Crac...ms.dll
windows10-2004-x64
1Venom Crac...ck.dll
windows7-x64
1Venom Crac...ck.dll
windows10-2004-x64
1Venom Crac...ng.dll
windows7-x64
1Venom Crac...ng.dll
windows10-2004-x64
1Venom Crac....3.dll
windows7-x64
1Venom Crac....3.dll
windows10-2004-x64
1Venom Crac...on.dll
windows7-x64
1Venom Crac...on.dll
windows10-2004-x64
1Venom Crac...ox.dll
windows7-x64
1Venom Crac...ox.dll
windows10-2004-x64
1Venom Crac...ss.dll
windows7-x64
1Venom Crac...ss.dll
windows10-2004-x64
1Venom Crac...on.dll
windows7-x64
1Venom Crac...on.dll
windows10-2004-x64
1Venom Crac...ew.dll
windows7-x64
1Venom Crac...ew.dll
windows10-2004-x64
1Venom Crac...er.dll
windows7-x64
1Venom Crac...er.dll
windows10-2004-x64
1Venom Crac...wn.dll
windows7-x64
1Venom Crac...wn.dll
windows10-2004-x64
1Venom Crac...ck.dll
windows7-x64
1Venom Crac...ck.dll
windows10-2004-x64
1Venom Crac...ge.dll
windows7-x64
1Venom Crac...ge.dll
windows10-2004-x64
1Analysis
-
max time kernel
26s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
17-02-2023 10:32
Behavioral task
behavioral1
Sample
Venom Cracked 2.7.0.0/AntiRE.Runtime.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Venom Cracked 2.7.0.0/AntiRE.Runtime.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Venom Cracked 2.7.0.0/BouncyCastle.Crypto.dll
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
Venom Cracked 2.7.0.0/BouncyCastle.Crypto.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
Venom Cracked 2.7.0.0/Builder.exe
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
Venom Cracked 2.7.0.0/Builder.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
Venom Cracked 2.7.0.0/Bunifu.Dataviz.WinForms.dll
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
Venom Cracked 2.7.0.0/Bunifu.Dataviz.WinForms.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral9
Sample
Venom Cracked 2.7.0.0/Bunifu.Licensing back.dll
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
Venom Cracked 2.7.0.0/Bunifu.Licensing back.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral11
Sample
Venom Cracked 2.7.0.0/Bunifu.Licensing.dll
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
Venom Cracked 2.7.0.0/Bunifu.Licensing.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral13
Sample
Venom Cracked 2.7.0.0/Bunifu.UI.WinForms.1.5.3.dll
Resource
win7-20221111-en
Behavioral task
behavioral14
Sample
Venom Cracked 2.7.0.0/Bunifu.UI.WinForms.1.5.3.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
Venom Cracked 2.7.0.0/Bunifu.UI.WinForms.BunifuButton.dll
Resource
win7-20220901-en
Behavioral task
behavioral16
Sample
Venom Cracked 2.7.0.0/Bunifu.UI.WinForms.BunifuButton.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral17
Sample
Venom Cracked 2.7.0.0/Bunifu.UI.WinForms.BunifuCheckBox.dll
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
Venom Cracked 2.7.0.0/Bunifu.UI.WinForms.BunifuCheckBox.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral19
Sample
Venom Cracked 2.7.0.0/Bunifu.UI.WinForms.BunifuCircleProgress.dll
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
Venom Cracked 2.7.0.0/Bunifu.UI.WinForms.BunifuCircleProgress.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral21
Sample
Venom Cracked 2.7.0.0/Bunifu.UI.WinForms.BunifuColorTransition.dll
Resource
win7-20220901-en
Behavioral task
behavioral22
Sample
Venom Cracked 2.7.0.0/Bunifu.UI.WinForms.BunifuColorTransition.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
Venom Cracked 2.7.0.0/Bunifu.UI.WinForms.BunifuDataGridView.dll
Resource
win7-20221111-en
Behavioral task
behavioral24
Sample
Venom Cracked 2.7.0.0/Bunifu.UI.WinForms.BunifuDataGridView.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral25
Sample
Venom Cracked 2.7.0.0/Bunifu.UI.WinForms.BunifuDatePicker.dll
Resource
win7-20220812-en
Behavioral task
behavioral26
Sample
Venom Cracked 2.7.0.0/Bunifu.UI.WinForms.BunifuDatePicker.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral27
Sample
Venom Cracked 2.7.0.0/Bunifu.UI.WinForms.BunifuDropdown.dll
Resource
win7-20220812-en
Behavioral task
behavioral28
Sample
Venom Cracked 2.7.0.0/Bunifu.UI.WinForms.BunifuDropdown.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral29
Sample
Venom Cracked 2.7.0.0/Bunifu.UI.WinForms.BunifuFormDock.dll
Resource
win7-20221111-en
Behavioral task
behavioral30
Sample
Venom Cracked 2.7.0.0/Bunifu.UI.WinForms.BunifuFormDock.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral31
Sample
Venom Cracked 2.7.0.0/Bunifu.UI.WinForms.BunifuGauge.dll
Resource
win7-20220812-en
Behavioral task
behavioral32
Sample
Venom Cracked 2.7.0.0/Bunifu.UI.WinForms.BunifuGauge.dll
Resource
win10v2004-20221111-en
General
-
Target
Venom Cracked 2.7.0.0/Builder.exe
-
Size
3.5MB
-
MD5
15a33df64cba23643fa9e4585c7b036f
-
SHA1
8f0f7b11935d97738af92ea14bc568fe8aa81350
-
SHA256
30fa591984d03b20f66ae6392d96c69d5861dbf1813c5230204310a93aea5c78
-
SHA512
8eb5221844147882019dae094979b4e43f17cb256c9f689c64b337a4f83ef8325e9d9d9cb948bf5a88beda2b71a1688b87af5fe318240a394d15a6be2d2adfe8
-
SSDEEP
98304:2WBZRr5nJ9NnqrcTOMSAdnLOOY6cy+XFjbpkiZ3k:2WBZR9n5ulMSmnaOLmXpbpLi
Malware Config
Extracted
lucastealer
https://api.telegram.org/bot5798214226:AAEtDAC9RFjL7TuqpdnFECmBJAay7aTl2tc
Signatures
-
Luca Stealer
Info stealer written in Rust first seen in July 2022.
-
Executes dropped EXE 3 IoCs
Processes:
System.exeBuilder.exepid Process 1496 System.exe 1320 Builder.exe 1244 -
Loads dropped DLL 3 IoCs
Processes:
Builder.exepid Process 852 Builder.exe 852 Builder.exe 852 Builder.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
System.exepid Process 1496 System.exe 1496 System.exe 1496 System.exe 1496 System.exe 1496 System.exe 1496 System.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
System.exedescription pid Process Token: SeShutdownPrivilege 1496 System.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Builder.exeSystem.execmd.exedescription pid Process procid_target PID 852 wrote to memory of 1496 852 Builder.exe 28 PID 852 wrote to memory of 1496 852 Builder.exe 28 PID 852 wrote to memory of 1496 852 Builder.exe 28 PID 852 wrote to memory of 1320 852 Builder.exe 29 PID 852 wrote to memory of 1320 852 Builder.exe 29 PID 852 wrote to memory of 1320 852 Builder.exe 29 PID 1496 wrote to memory of 1088 1496 System.exe 31 PID 1496 wrote to memory of 1088 1496 System.exe 31 PID 1496 wrote to memory of 1088 1496 System.exe 31 PID 1088 wrote to memory of 1676 1088 cmd.exe 33 PID 1088 wrote to memory of 1676 1088 cmd.exe 33 PID 1088 wrote to memory of 1676 1088 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\Venom Cracked 2.7.0.0\Builder.exe"C:\Users\Admin\AppData\Local\Temp\Venom Cracked 2.7.0.0\Builder.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\AppData\Roaming\Local\Programs\System.exe"C:\Users\Admin\AppData\Roaming\Local\Programs\System.exe" /silent2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\system32\cmd.exe"cmd.exe" /c "schtasks /Create /TR C:\Users\Admin\AppData\Roaming\svchost.exe /SC ONLOGON /TN RecordArchive /IT"3⤵
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\system32\schtasks.exeschtasks /Create /TR C:\Users\Admin\AppData\Roaming\svchost.exe /SC ONLOGON /TN RecordArchive /IT4⤵
- Creates scheduled task(s)
PID:1676
-
-
-
-
C:\Users\Admin\AppData\Roaming\Local\Programs\Builder.exe"C:\Users\Admin\AppData\Roaming\Local\Programs\Builder.exe" /silent2⤵
- Executes dropped EXE
PID:1320
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD538791f0aa86973d6c674bc7ea7e08fea
SHA127e3999c2fc4e2b145ad5d4e0d17f38b7b032101
SHA256e05e6fe9e454c132a68db6a76a4413250cbdb98b2b9a956353c90f60ac6fa422
SHA51235fbf43c12f18d15291cf1dbc9d8439369d955f1c2e2f7874cce5a38a1918e03ae253af847de10e80376f0318ec89ede2bef054c652c2071d689af232089ea02
-
Filesize
3.1MB
MD538791f0aa86973d6c674bc7ea7e08fea
SHA127e3999c2fc4e2b145ad5d4e0d17f38b7b032101
SHA256e05e6fe9e454c132a68db6a76a4413250cbdb98b2b9a956353c90f60ac6fa422
SHA51235fbf43c12f18d15291cf1dbc9d8439369d955f1c2e2f7874cce5a38a1918e03ae253af847de10e80376f0318ec89ede2bef054c652c2071d689af232089ea02
-
Filesize
6.0MB
MD5e1d93c10865bb4228c0d4d780fb5ac88
SHA1233b4cb7cef41898eda51a869ff445c3db529ae4
SHA2564de0b946d9cf0122688c715d808ebc5cec6f16b1001ed70a0dc7de3745d0a65a
SHA512de355a07ee2a54d24c8b78a022a95d2021719fd6988057630ab903d6032029095cd8b4fab9318fe07f5571dc7464f128398afb22f02850b582e5e50623b1f84e
-
Filesize
6.0MB
MD5e1d93c10865bb4228c0d4d780fb5ac88
SHA1233b4cb7cef41898eda51a869ff445c3db529ae4
SHA2564de0b946d9cf0122688c715d808ebc5cec6f16b1001ed70a0dc7de3745d0a65a
SHA512de355a07ee2a54d24c8b78a022a95d2021719fd6988057630ab903d6032029095cd8b4fab9318fe07f5571dc7464f128398afb22f02850b582e5e50623b1f84e
-
Filesize
3.1MB
MD538791f0aa86973d6c674bc7ea7e08fea
SHA127e3999c2fc4e2b145ad5d4e0d17f38b7b032101
SHA256e05e6fe9e454c132a68db6a76a4413250cbdb98b2b9a956353c90f60ac6fa422
SHA51235fbf43c12f18d15291cf1dbc9d8439369d955f1c2e2f7874cce5a38a1918e03ae253af847de10e80376f0318ec89ede2bef054c652c2071d689af232089ea02
-
Filesize
3.1MB
MD538791f0aa86973d6c674bc7ea7e08fea
SHA127e3999c2fc4e2b145ad5d4e0d17f38b7b032101
SHA256e05e6fe9e454c132a68db6a76a4413250cbdb98b2b9a956353c90f60ac6fa422
SHA51235fbf43c12f18d15291cf1dbc9d8439369d955f1c2e2f7874cce5a38a1918e03ae253af847de10e80376f0318ec89ede2bef054c652c2071d689af232089ea02
-
Filesize
6.0MB
MD5e1d93c10865bb4228c0d4d780fb5ac88
SHA1233b4cb7cef41898eda51a869ff445c3db529ae4
SHA2564de0b946d9cf0122688c715d808ebc5cec6f16b1001ed70a0dc7de3745d0a65a
SHA512de355a07ee2a54d24c8b78a022a95d2021719fd6988057630ab903d6032029095cd8b4fab9318fe07f5571dc7464f128398afb22f02850b582e5e50623b1f84e
-
Filesize
6.0MB
MD5e1d93c10865bb4228c0d4d780fb5ac88
SHA1233b4cb7cef41898eda51a869ff445c3db529ae4
SHA2564de0b946d9cf0122688c715d808ebc5cec6f16b1001ed70a0dc7de3745d0a65a
SHA512de355a07ee2a54d24c8b78a022a95d2021719fd6988057630ab903d6032029095cd8b4fab9318fe07f5571dc7464f128398afb22f02850b582e5e50623b1f84e