Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18-03-2023 11:00
Behavioral task
behavioral1
Sample
Venom_RAT_5.6_[tombstone3#3883]/Venom_RAT_COMPILED/Venom RAT + HVNC.exe
Resource
win10-20230220-en
General
-
Target
Venom_RAT_5.6_[tombstone3#3883]/Venom_RAT_COMPILED/Venom RAT + HVNC.exe
-
Size
15.5MB
-
MD5
dc7afff0e35d307b937803c0c9ce9950
-
SHA1
25763c899b1e0f1d7073f287513338c2f52fd560
-
SHA256
91fd819114314284f960159ca85b160ff39a025c55cf51960bb5262878db97f5
-
SHA512
68e86c1e7b72c7592e3d6a911cfbc1339f9b638312ef59ae6b81bf733676813c3a6512f5d79c685e324cb0be7ae1ffafd72dd75a45116fb7c3762d78f797698b
-
SSDEEP
196608:UA5PPrnA5PPr3lAA5PPrJSe6PC7aIahLkNPFCZZwiJl1NLIsPA8fxvuIMzd/95Un:PebljNd60T7P+Zw6NLIsFfskh1BmXG
Malware Config
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4544-133-0x00000285318D0000-0x0000028532862000-memory.dmp asyncrat -
Loads dropped DLL 1 IoCs
Processes:
Venom RAT + HVNC.exepid process 4544 Venom RAT + HVNC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Venom RAT + HVNC.exedescription pid process Token: SeDebugPrivilege 4544 Venom RAT + HVNC.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
Venom RAT + HVNC.exepid process 4544 Venom RAT + HVNC.exe 4544 Venom RAT + HVNC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Venom_RAT_5.6_[tombstone3#3883]\Venom_RAT_COMPILED\Venom RAT + HVNC.exe"C:\Users\Admin\AppData\Local\Temp\Venom_RAT_5.6_[tombstone3#3883]\Venom_RAT_COMPILED\Venom RAT + HVNC.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\2e467f22-fd46-4a8b-b54a-a1ebefcab704\SiticoneDotNetRT64.dllFilesize
75KB
MD542b2c266e49a3acd346b91e3b0e638c0
SHA12bc52134f03fcc51cb4e0f6c7cf70646b4df7dd1
SHA256adeed015f06efa363d504a18acb671b1db4b20b23664a55c9bc28aef3283ca29
SHA512770822fd681a1d98afe03f6fbe5f116321b54c8e2989fb07491811fd29fca5b666f1adf4c6900823af1271e342cacc9293e9db307c4eef852d1a253b00347a81
-
C:\Users\Admin\AppData\Local\Temp\2e467f22-fd46-4a8b-b54a-a1ebefcab704\SiticoneDotNetRT64.dllFilesize
75KB
MD542b2c266e49a3acd346b91e3b0e638c0
SHA12bc52134f03fcc51cb4e0f6c7cf70646b4df7dd1
SHA256adeed015f06efa363d504a18acb671b1db4b20b23664a55c9bc28aef3283ca29
SHA512770822fd681a1d98afe03f6fbe5f116321b54c8e2989fb07491811fd29fca5b666f1adf4c6900823af1271e342cacc9293e9db307c4eef852d1a253b00347a81
-
memory/4544-145-0x000002854E210000-0x000002854E220000-memory.dmpFilesize
64KB
-
memory/4544-146-0x000002854E210000-0x000002854E220000-memory.dmpFilesize
64KB
-
memory/4544-134-0x0000028532BD0000-0x0000028532BE2000-memory.dmpFilesize
72KB
-
memory/4544-142-0x00007FFBAB480000-0x00007FFBAB5CE000-memory.dmpFilesize
1.3MB
-
memory/4544-143-0x000002854E210000-0x000002854E220000-memory.dmpFilesize
64KB
-
memory/4544-144-0x000002854E210000-0x000002854E220000-memory.dmpFilesize
64KB
-
memory/4544-133-0x00000285318D0000-0x0000028532862000-memory.dmpFilesize
15.6MB
-
memory/4544-135-0x000002854E490000-0x000002854E6F8000-memory.dmpFilesize
2.4MB
-
memory/4544-147-0x000002854F100000-0x000002854F13C000-memory.dmpFilesize
240KB
-
memory/4544-149-0x000002854E210000-0x000002854E220000-memory.dmpFilesize
64KB
-
memory/4544-148-0x000002854E210000-0x000002854E220000-memory.dmpFilesize
64KB
-
memory/4544-150-0x000002854E210000-0x000002854E220000-memory.dmpFilesize
64KB
-
memory/4544-151-0x000002854E210000-0x000002854E220000-memory.dmpFilesize
64KB
-
memory/4544-152-0x000002854E210000-0x000002854E220000-memory.dmpFilesize
64KB