Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02/06/2023, 14:11
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
General
-
Target
file.exe
-
Size
353KB
-
MD5
3a31f9c35ab9f26a2e9028c5b438780d
-
SHA1
62dbb580219968fa4e4fed20703fa00dbac78666
-
SHA256
15b5aace17bef2063e42f5956f066ee601b2dc15a657e9b3aaefb9588a7b83d7
-
SHA512
36a93e957267c14eaee560f00217f2e9104dad8e75475bd364ce041a7c7395445afa4032a72fb1056e222d37686f0ac0171d8a3403c1873e5f1281dc55fc46b5
-
SSDEEP
6144:Bj7y9GhvWNikQKsPDvKyG9Ih0oenrJYkcKp4ORIvY+pObV:9dcNHcvVh0oIrJfoORIvY+p+
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.1
V365
111.90.149.195:5111
111.90.149.195:7766
4ac24af1-9eb0-4f83-aa69-9a23a66ab177
-
delay
2
-
install
false
-
install_folder
%Temp%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/memory/460-143-0x0000000000400000-0x000000000041C000-memory.dmp asyncrat -
Looks for VirtualBox Guest Additions in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions file.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions svchost.exe -
Looks for VMWare Tools registry key 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools file.exe Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools svchost.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation file.exe -
Executes dropped EXE 1 IoCs
pid Process 3824 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" file.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum file.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3824 set thread context of 460 3824 svchost.exe 114 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4212 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 740 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3984 file.exe 3984 file.exe 3984 file.exe 3984 file.exe 3984 file.exe 3984 file.exe 3984 file.exe 3984 file.exe 3984 file.exe 3984 file.exe 3984 file.exe 3984 file.exe 3984 file.exe 3984 file.exe 3984 file.exe 3984 file.exe 3984 file.exe 3984 file.exe 3984 file.exe 3984 file.exe 3984 file.exe 3984 file.exe 3984 file.exe 3824 svchost.exe 3824 svchost.exe 3824 svchost.exe 3824 svchost.exe 3824 svchost.exe 3824 svchost.exe 3824 svchost.exe 3824 svchost.exe 3824 svchost.exe 3824 svchost.exe 3824 svchost.exe 3824 svchost.exe 3824 svchost.exe 3824 svchost.exe 3824 svchost.exe 3824 svchost.exe 3824 svchost.exe 3824 svchost.exe 3824 svchost.exe 3824 svchost.exe 3824 svchost.exe 3824 svchost.exe 3824 svchost.exe 3824 svchost.exe 3824 svchost.exe 3824 svchost.exe 3824 svchost.exe 3824 svchost.exe 3824 svchost.exe 3824 svchost.exe 3824 svchost.exe 3824 svchost.exe 3824 svchost.exe 3824 svchost.exe 3824 svchost.exe 3824 svchost.exe 3824 svchost.exe 3824 svchost.exe 3824 svchost.exe 3824 svchost.exe 3824 svchost.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3984 file.exe Token: SeDebugPrivilege 3824 svchost.exe Token: SeDebugPrivilege 460 jsc.exe Token: SeDebugPrivilege 460 jsc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 460 jsc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3984 wrote to memory of 4936 3984 file.exe 80 PID 3984 wrote to memory of 4936 3984 file.exe 80 PID 3984 wrote to memory of 4712 3984 file.exe 82 PID 3984 wrote to memory of 4712 3984 file.exe 82 PID 4936 wrote to memory of 4212 4936 cmd.exe 84 PID 4936 wrote to memory of 4212 4936 cmd.exe 84 PID 4712 wrote to memory of 740 4712 cmd.exe 85 PID 4712 wrote to memory of 740 4712 cmd.exe 85 PID 4712 wrote to memory of 3824 4712 cmd.exe 86 PID 4712 wrote to memory of 3824 4712 cmd.exe 86 PID 3824 wrote to memory of 2500 3824 svchost.exe 87 PID 3824 wrote to memory of 2500 3824 svchost.exe 87 PID 3824 wrote to memory of 4508 3824 svchost.exe 88 PID 3824 wrote to memory of 4508 3824 svchost.exe 88 PID 3824 wrote to memory of 2844 3824 svchost.exe 89 PID 3824 wrote to memory of 2844 3824 svchost.exe 89 PID 3824 wrote to memory of 4416 3824 svchost.exe 90 PID 3824 wrote to memory of 4416 3824 svchost.exe 90 PID 3824 wrote to memory of 4424 3824 svchost.exe 91 PID 3824 wrote to memory of 4424 3824 svchost.exe 91 PID 3824 wrote to memory of 4536 3824 svchost.exe 92 PID 3824 wrote to memory of 4536 3824 svchost.exe 92 PID 3824 wrote to memory of 1880 3824 svchost.exe 93 PID 3824 wrote to memory of 1880 3824 svchost.exe 93 PID 3824 wrote to memory of 5088 3824 svchost.exe 94 PID 3824 wrote to memory of 5088 3824 svchost.exe 94 PID 3824 wrote to memory of 4412 3824 svchost.exe 95 PID 3824 wrote to memory of 4412 3824 svchost.exe 95 PID 3824 wrote to memory of 4132 3824 svchost.exe 96 PID 3824 wrote to memory of 4132 3824 svchost.exe 96 PID 3824 wrote to memory of 4808 3824 svchost.exe 97 PID 3824 wrote to memory of 4808 3824 svchost.exe 97 PID 3824 wrote to memory of 4568 3824 svchost.exe 98 PID 3824 wrote to memory of 4568 3824 svchost.exe 98 PID 3824 wrote to memory of 3084 3824 svchost.exe 99 PID 3824 wrote to memory of 3084 3824 svchost.exe 99 PID 3824 wrote to memory of 4688 3824 svchost.exe 100 PID 3824 wrote to memory of 4688 3824 svchost.exe 100 PID 3824 wrote to memory of 4372 3824 svchost.exe 101 PID 3824 wrote to memory of 4372 3824 svchost.exe 101 PID 3824 wrote to memory of 4572 3824 svchost.exe 102 PID 3824 wrote to memory of 4572 3824 svchost.exe 102 PID 3824 wrote to memory of 4572 3824 svchost.exe 102 PID 3824 wrote to memory of 388 3824 svchost.exe 103 PID 3824 wrote to memory of 388 3824 svchost.exe 103 PID 3824 wrote to memory of 4620 3824 svchost.exe 104 PID 3824 wrote to memory of 4620 3824 svchost.exe 104 PID 3824 wrote to memory of 4604 3824 svchost.exe 105 PID 3824 wrote to memory of 4604 3824 svchost.exe 105 PID 3824 wrote to memory of 5084 3824 svchost.exe 106 PID 3824 wrote to memory of 5084 3824 svchost.exe 106 PID 3824 wrote to memory of 3436 3824 svchost.exe 107 PID 3824 wrote to memory of 3436 3824 svchost.exe 107 PID 3824 wrote to memory of 1620 3824 svchost.exe 108 PID 3824 wrote to memory of 1620 3824 svchost.exe 108 PID 3824 wrote to memory of 1312 3824 svchost.exe 109 PID 3824 wrote to memory of 1312 3824 svchost.exe 109 PID 3824 wrote to memory of 1240 3824 svchost.exe 110 PID 3824 wrote to memory of 1240 3824 svchost.exe 110 PID 3824 wrote to memory of 624 3824 svchost.exe 111 PID 3824 wrote to memory of 624 3824 svchost.exe 111 PID 3824 wrote to memory of 4228 3824 svchost.exe 112 PID 3824 wrote to memory of 4228 3824 svchost.exe 112 PID 3824 wrote to memory of 4908 3824 svchost.exe 113 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Checks computer location settings
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'3⤵
- Creates scheduled task(s)
PID:4212
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp93F8.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:740
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe"4⤵PID:2500
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe"4⤵PID:4508
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"4⤵PID:2844
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"4⤵PID:4416
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"4⤵PID:4424
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"4⤵PID:4536
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe"4⤵PID:1880
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"4⤵PID:5088
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"4⤵PID:4412
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"4⤵PID:4132
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"4⤵PID:4808
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"4⤵PID:4568
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"4⤵PID:3084
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"4⤵PID:4688
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"4⤵PID:4372
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"4⤵PID:4572
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"4⤵PID:388
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"4⤵PID:4620
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe"4⤵PID:4604
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"4⤵PID:5084
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"4⤵PID:3436
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe"4⤵PID:1620
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"4⤵PID:1312
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe"4⤵PID:1240
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"4⤵PID:624
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe"4⤵PID:4228
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"4⤵PID:4908
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:460
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD5793452e84fe8bfa798dcad4fedfd92fd
SHA1676a9da51f98164798c5d6938c261f5048a06fcd
SHA256a09911eb1982b4813b204b7ba92e15b3657d0a5480e867443d4aba8204827982
SHA512eb1d9942d44d5ed0860559d2df022b0fa8887822a6742721311537d7f94cdeae6e2b2368b560f7ef9d2deae1c14b042fd32c626416f8dee5d708d69d5d233fa0
-
Filesize
353KB
MD53a31f9c35ab9f26a2e9028c5b438780d
SHA162dbb580219968fa4e4fed20703fa00dbac78666
SHA25615b5aace17bef2063e42f5956f066ee601b2dc15a657e9b3aaefb9588a7b83d7
SHA51236a93e957267c14eaee560f00217f2e9104dad8e75475bd364ce041a7c7395445afa4032a72fb1056e222d37686f0ac0171d8a3403c1873e5f1281dc55fc46b5
-
Filesize
353KB
MD53a31f9c35ab9f26a2e9028c5b438780d
SHA162dbb580219968fa4e4fed20703fa00dbac78666
SHA25615b5aace17bef2063e42f5956f066ee601b2dc15a657e9b3aaefb9588a7b83d7
SHA51236a93e957267c14eaee560f00217f2e9104dad8e75475bd364ce041a7c7395445afa4032a72fb1056e222d37686f0ac0171d8a3403c1873e5f1281dc55fc46b5