Overview
overview
10Static
static
10System.Xml...nt.dll
windows10-1703-x64
1System.Xml...nt.dll
windows10-2004-x64
1VenomRAT_HVNC.exe
windows10-1703-x64
1VenomRAT_HVNC.exe
windows10-2004-x64
10VenomRAT_HVNC.exe.xml
windows10-1703-x64
1VenomRAT_HVNC.exe.xml
windows10-2004-x64
1Vestris.Re...ib.dll
windows10-1703-x64
1Vestris.Re...ib.dll
windows10-2004-x64
1cGeoIp.dll
windows10-1703-x64
1cGeoIp.dll
windows10-2004-x64
1protobuf-net.dll
windows10-1703-x64
1protobuf-net.dll
windows10-2004-x64
1Analysis
-
max time kernel
50s -
max time network
63s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-02-2023 05:35
Behavioral task
behavioral1
Sample
System.Xml.XPath.XDocument.dll
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
System.Xml.XPath.XDocument.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral3
Sample
VenomRAT_HVNC.exe
Resource
win10-20230220-en
Behavioral task
behavioral4
Sample
VenomRAT_HVNC.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
VenomRAT_HVNC.exe.xml
Resource
win10-20230220-en
Behavioral task
behavioral6
Sample
VenomRAT_HVNC.exe.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
Vestris.ResourceLib.dll
Resource
win10-20230220-en
Behavioral task
behavioral8
Sample
Vestris.ResourceLib.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral9
Sample
cGeoIp.dll
Resource
win10-20230220-en
Behavioral task
behavioral10
Sample
cGeoIp.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
protobuf-net.dll
Resource
win10-20230220-en
Behavioral task
behavioral12
Sample
protobuf-net.dll
Resource
win10v2004-20230221-en
General
-
Target
VenomRAT_HVNC.exe.xml
-
Size
2KB
-
MD5
fa21c166232c3b29f8d2d14557490c9c
-
SHA1
2cb1a7d4a204fc03bd6bd15aa9f431f3445a08de
-
SHA256
5c939c46f9d81cb75180c897feb5044176ed44cd0d51e076149bd82425e4ef44
-
SHA512
cca1dd276a093b62845e5a7652e778d07200b7158cb05a2b44e11e69ce8bc78020eeeb29d55a87a6b87a3fcc25b2883175850467002388a811abfe9945d58fd9
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "832546017" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008a702c863227b745aefca3d2bb9571e800000000020000000000106600000001000020000000076819421342ee80ae21944022204fe1d1d9d0f063f74b3ae036ff050c27e345000000000e80000000020000200000002a3d64679cd33f64f39f7358e2d1925896fc9ceee7c80fe72e378daf09c14daa2000000084bfa917e54188152361377fdd22f6b6b8ab1d84beea3d25c452fb556dbcd18840000000bb04a7fd40d5ab3d46646967f351a6820d513d8dd30e166efde10aae3245c6fc8bebe05624bd3040e20b208d8defebd859eef52e025ffb2db9b491daecca60ee iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "832546017" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008a702c863227b745aefca3d2bb9571e800000000020000000000106600000001000020000000bfecfa6ec5dd5128d472c9cf8b985538183e4b7237b3da7eadc817b70ad97463000000000e8000000002000020000000b53a87596d7b39fadd124c089ccbe825359677e1f9d89137c3f14463615483c320000000453d6fe57c1435c215ffc0fee8d4405edb2e061918cc2c65782e7e4884836da640000000306d1208a98574b4a4914f99cda5e6763547e4e2879db409409a8fe95052c932ed30b00bfd2012a2907785e21eea83627731cea82483e7c673720720432e6803 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40c22d333f4bd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31017791" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31017791" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31017791" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5CC60AD4-B732-11ED-8E3B-5260AB3644B7} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10d540333f4bd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "843326896" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 992 iexplore.exe 992 iexplore.exe 4420 IEXPLORE.EXE 4420 IEXPLORE.EXE 4420 IEXPLORE.EXE 4420 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 5044 wrote to memory of 992 5044 MSOXMLED.EXE 66 PID 5044 wrote to memory of 992 5044 MSOXMLED.EXE 66 PID 992 wrote to memory of 4420 992 iexplore.exe 68 PID 992 wrote to memory of 4420 992 iexplore.exe 68 PID 992 wrote to memory of 4420 992 iexplore.exe 68
Processes
-
C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE"C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\VenomRAT_HVNC.exe.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\VenomRAT_HVNC.exe.xml2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:992 CREDAT:82945 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4420
-
-