Resubmissions

28-02-2023 04:33

230228-e6jwtahe77 10

28-02-2023 04:28

230228-e3nqlahe69 10

Analysis

  • max time kernel
    30s
  • max time network
    33s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-02-2023 04:33

General

  • Target

    VenomRAT_HVNC.exe

  • Size

    16.6MB

  • MD5

    5384c0396589430eeb3d1a2e05703e9a

  • SHA1

    20da44da7639bbef2f6b5bfc21df7474cd1109af

  • SHA256

    b4250aff983f1f588593baed1adb4797e6c1ab6225595ebd013b50348a57a459

  • SHA512

    9bf613ee62b0e56af500dd88f572b2221ad6df63b0b4c0dcb0ef763efcebeac633a95f10dfce90f6cff038df2810681dd55dcdd272eb9f907c670cc2e4f7363a

  • SSDEEP

    393216:Al9Yl7Elel7ElAlQleTl/l/l/l/l/lzlml/lqlZlHl/l/l/l/l/l/lIlAl+lUl2L:6TXT

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Detected potential entity reuse from brand microsoft.
  • Drops file in Windows directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VenomRAT_HVNC.exe
    "C:\Users\Admin\AppData\Local\Temp\VenomRAT_HVNC.exe"
    1⤵
    • Checks computer location settings
    PID:2008
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4204
  • C:\Windows\system32\browser_broker.exe
    C:\Windows\system32\browser_broker.exe -Embedding
    1⤵
    • Modifies Internet Explorer settings
    PID:4248
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4700
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:4632
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:2928

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\IFAV7SCG\dotnet.microsoft[1].xml

    Filesize

    13B

    MD5

    c1ddea3ef6bbef3e7060a1a9ad89e4c5

    SHA1

    35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

    SHA256

    b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

    SHA512

    6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\2458J4YX\favicon[1].ico

    Filesize

    16KB

    MD5

    12e3dac858061d088023b2bd48e2fa96

    SHA1

    e08ce1a144eceae0c3c2ea7a9d6fbc5658f24ce5

    SHA256

    90cdaf487716184e4034000935c605d1633926d348116d198f355a98b8c6cd21

    SHA512

    c5030c55a855e7a9e20e22f4c70bf1e0f3c558a9b7d501cfab6992ac2656ae5e41b050ccac541efa55f9603e0d349b247eb4912ee169d44044271789c719cd01

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\ImageStore\gs1zwr2\imagestore.dat

    Filesize

    17KB

    MD5

    99c06ac6b7658455752bcb63bd2de79c

    SHA1

    d7266f9750a88472f632fb1628bd5aea1fd48464

    SHA256

    6ae6f717b6ad4542be48c6573aba39a2f165cbd66d28a2a603dfd92fa5a82d59

    SHA512

    6beca714ff795ea0d9baf1472391109f513e8727382c601d3b4b29535c3857c4dbb0d54d85032be339c3c6a2e82831370433c7b2c54b8b9470bc76e6f306b958

  • memory/4204-121-0x00000226BB620000-0x00000226BB630000-memory.dmp

    Filesize

    64KB

  • memory/4204-137-0x00000226BBF00000-0x00000226BBF10000-memory.dmp

    Filesize

    64KB

  • memory/4204-158-0x00000226B8C90000-0x00000226B8C91000-memory.dmp

    Filesize

    4KB

  • memory/4204-160-0x00000226B8CD0000-0x00000226B8CD2000-memory.dmp

    Filesize

    8KB

  • memory/4204-162-0x00000226BBDC0000-0x00000226BBDC2000-memory.dmp

    Filesize

    8KB

  • memory/4204-163-0x00000226C0110000-0x00000226C0112000-memory.dmp

    Filesize

    8KB

  • memory/4204-352-0x00000226C1BA0000-0x00000226C1BA1000-memory.dmp

    Filesize

    4KB

  • memory/4204-350-0x00000226C1B90000-0x00000226C1B91000-memory.dmp

    Filesize

    4KB

  • memory/4632-289-0x000001C7C1B00000-0x000001C7C1B02000-memory.dmp

    Filesize

    8KB

  • memory/4632-349-0x000001C7C28D0000-0x000001C7C29D0000-memory.dmp

    Filesize

    1024KB

  • memory/4632-292-0x000001C7C1B20000-0x000001C7C1B22000-memory.dmp

    Filesize

    8KB

  • memory/4632-294-0x000001C7C1B30000-0x000001C7C1B32000-memory.dmp

    Filesize

    8KB

  • memory/4632-296-0x000001C7C1B40000-0x000001C7C1B42000-memory.dmp

    Filesize

    8KB

  • memory/4632-298-0x000001C7C1B60000-0x000001C7C1B62000-memory.dmp

    Filesize

    8KB

  • memory/4632-317-0x000001C7C20F0000-0x000001C7C20F2000-memory.dmp

    Filesize

    8KB

  • memory/4632-272-0x000001C7C18A0000-0x000001C7C18A2000-memory.dmp

    Filesize

    8KB

  • memory/4632-268-0x000001C7C1860000-0x000001C7C1862000-memory.dmp

    Filesize

    8KB

  • memory/4632-181-0x000001C7AB6A0000-0x000001C7AB6A2000-memory.dmp

    Filesize

    8KB

  • memory/4632-178-0x000001C7AB680000-0x000001C7AB682000-memory.dmp

    Filesize

    8KB

  • memory/4632-175-0x000001C7AB650000-0x000001C7AB652000-memory.dmp

    Filesize

    8KB

  • memory/4632-439-0x000001C7C1650000-0x000001C7C1670000-memory.dmp

    Filesize

    128KB

  • memory/4632-468-0x000001C7C33D0000-0x000001C7C34D0000-memory.dmp

    Filesize

    1024KB

  • memory/4632-495-0x000001C7C3B00000-0x000001C7C3C00000-memory.dmp

    Filesize

    1024KB