Analysis
-
max time kernel
1200s -
max time network
1200s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
18-07-2023 10:49
Behavioral task
behavioral1
Sample
JKKHJKHJKHJ.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
JKKHJKHJKHJ.exe
Resource
win10v2004-20230703-en
General
-
Target
JKKHJKHJKHJ.exe
-
Size
63KB
-
MD5
36a2e6b4dea8833ac9642279cc0f2f51
-
SHA1
c646179ba316daabb09406d3705a4f4248b5e0a9
-
SHA256
870a1845baec61018280036e11dc9bdea8de069760fe0a713395c6258a496e61
-
SHA512
27eb6c352ccb66de04a45b1961e872a6c4a1e88faedd8480c81e319bc8c9c63ff48849b8fbba05efc21d64d1b79f761442f5a765b2e40fe5b28c1c860fe16602
-
SSDEEP
768:Ns02C46poI3iPgqUiz9JmoAk25GV6iB1+E0Smv7mqb2ntpwH1obC9johPGKDpqKX:nEIoRp2erBlibbwwAGKDpqKmY7
Malware Config
Extracted
asyncrat
5.0.5
Venom Clients
wasted9sss1-57562.portmap.host:57562
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
true
-
install_file
BBN BNMBN.exe
-
install_folder
%AppData%
Extracted
arrowrat
VenomHVNC
wasted9sss1-57562.portmap.host:57562
uSzDNutNI.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, C:\\Users\\Admin\\AppData\\Roaming\\LbJIPffl\\LbJIPffl" ClientH.exe -
Async RAT payload 6 IoCs
resource yara_rule behavioral1/memory/2148-55-0x0000000000840000-0x0000000000856000-memory.dmp asyncrat behavioral1/files/0x000a00000001227c-70.dat asyncrat behavioral1/files/0x000a00000001227c-71.dat asyncrat behavioral1/memory/2320-72-0x0000000000F90000-0x0000000000FA6000-memory.dmp asyncrat behavioral1/memory/2320-94-0x0000000000B30000-0x0000000000B3E000-memory.dmp asyncrat behavioral1/memory/2320-147-0x0000000000B50000-0x0000000000B60000-memory.dmp asyncrat -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Executes dropped EXE 2 IoCs
pid Process 2320 BBN BNMBN.exe 1976 ClientH.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: BBN BNMBN.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1976 set thread context of 1416 1976 ClientH.exe 43 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1528 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 916 timeout.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2148 JKKHJKHJKHJ.exe 2148 JKKHJKHJKHJ.exe 2148 JKKHJKHJKHJ.exe 2148 JKKHJKHJKHJ.exe 2148 JKKHJKHJKHJ.exe 2148 JKKHJKHJKHJ.exe 2148 JKKHJKHJKHJ.exe 2148 JKKHJKHJKHJ.exe 2148 JKKHJKHJKHJ.exe 2148 JKKHJKHJKHJ.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeDebugPrivilege 2148 JKKHJKHJKHJ.exe Token: SeDebugPrivilege 2320 BBN BNMBN.exe Token: SeDebugPrivilege 2016 powershell.exe Token: SeDebugPrivilege 1976 ClientH.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: 33 1900 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1900 AUDIODG.EXE Token: 33 1900 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1900 AUDIODG.EXE Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe -
Suspicious use of FindShellTrayWindow 31 IoCs
pid Process 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe -
Suspicious use of SendNotifyMessage 21 IoCs
pid Process 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 2148 wrote to memory of 1080 2148 JKKHJKHJKHJ.exe 30 PID 2148 wrote to memory of 1080 2148 JKKHJKHJKHJ.exe 30 PID 2148 wrote to memory of 1080 2148 JKKHJKHJKHJ.exe 30 PID 2148 wrote to memory of 2652 2148 JKKHJKHJKHJ.exe 31 PID 2148 wrote to memory of 2652 2148 JKKHJKHJKHJ.exe 31 PID 2148 wrote to memory of 2652 2148 JKKHJKHJKHJ.exe 31 PID 1080 wrote to memory of 1528 1080 cmd.exe 34 PID 1080 wrote to memory of 1528 1080 cmd.exe 34 PID 1080 wrote to memory of 1528 1080 cmd.exe 34 PID 2652 wrote to memory of 916 2652 cmd.exe 35 PID 2652 wrote to memory of 916 2652 cmd.exe 35 PID 2652 wrote to memory of 916 2652 cmd.exe 35 PID 2652 wrote to memory of 2320 2652 cmd.exe 36 PID 2652 wrote to memory of 2320 2652 cmd.exe 36 PID 2652 wrote to memory of 2320 2652 cmd.exe 36 PID 2320 wrote to memory of 1160 2320 BBN BNMBN.exe 38 PID 2320 wrote to memory of 1160 2320 BBN BNMBN.exe 38 PID 2320 wrote to memory of 1160 2320 BBN BNMBN.exe 38 PID 1160 wrote to memory of 2016 1160 cmd.exe 40 PID 1160 wrote to memory of 2016 1160 cmd.exe 40 PID 1160 wrote to memory of 2016 1160 cmd.exe 40 PID 2016 wrote to memory of 1976 2016 powershell.exe 41 PID 2016 wrote to memory of 1976 2016 powershell.exe 41 PID 2016 wrote to memory of 1976 2016 powershell.exe 41 PID 2016 wrote to memory of 1976 2016 powershell.exe 41 PID 1976 wrote to memory of 1800 1976 ClientH.exe 42 PID 1976 wrote to memory of 1800 1976 ClientH.exe 42 PID 1976 wrote to memory of 1800 1976 ClientH.exe 42 PID 1976 wrote to memory of 1800 1976 ClientH.exe 42 PID 1976 wrote to memory of 1416 1976 ClientH.exe 43 PID 1976 wrote to memory of 1416 1976 ClientH.exe 43 PID 1976 wrote to memory of 1416 1976 ClientH.exe 43 PID 1976 wrote to memory of 1416 1976 ClientH.exe 43 PID 1976 wrote to memory of 1416 1976 ClientH.exe 43 PID 1976 wrote to memory of 1416 1976 ClientH.exe 43 PID 1976 wrote to memory of 1416 1976 ClientH.exe 43 PID 1976 wrote to memory of 1416 1976 ClientH.exe 43 PID 1976 wrote to memory of 1416 1976 ClientH.exe 43 PID 1800 wrote to memory of 824 1800 explorer.exe 45 PID 1800 wrote to memory of 824 1800 explorer.exe 45 PID 1800 wrote to memory of 824 1800 explorer.exe 45 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JKKHJKHJKHJ.exe"C:\Users\Admin\AppData\Local\Temp\JKKHJKHJKHJ.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "BBN BNMBN" /tr '"C:\Users\Admin\AppData\Roaming\BBN BNMBN.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "BBN BNMBN" /tr '"C:\Users\Admin\AppData\Roaming\BBN BNMBN.exe"'3⤵
- Creates scheduled task(s)
PID:1528
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpF872.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:916
-
-
C:\Users\Admin\AppData\Roaming\BBN BNMBN.exe"C:\Users\Admin\AppData\Roaming\BBN BNMBN.exe"3⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\ClientH.exe"' & exit4⤵
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\ClientH.exe"'5⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\ClientH.exe"C:\Users\Admin\AppData\Local\Temp\ClientH.exe"6⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"7⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\system32\ctfmon.exectfmon.exe8⤵PID:824
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" VenomHVNC wasted9sss1-57562.portmap.host 57562 uSzDNutNI.exe7⤵PID:1416
-
-
-
-
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4541⤵
- Suspicious use of AdjustPrivilegeToken
PID:1900
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
90KB
MD55ac5cf4a09a5c6dfd82669a0e24f675d
SHA14f0993bfd2245da594000bb7c2d2bd7d02b60d53
SHA2566136b0b9b28b52962f090cdf34ac650c4b184f3a65e863e2051cdc1219aff051
SHA512e0317cf9a5a495f5e90a88f4a96517626a30c016b7374db41bc79a8bcb0920fcf7691ca3cf48c712b8bc2db075d734ca7cacc771e8f604297600187afe314d3f
-
Filesize
90KB
MD55ac5cf4a09a5c6dfd82669a0e24f675d
SHA14f0993bfd2245da594000bb7c2d2bd7d02b60d53
SHA2566136b0b9b28b52962f090cdf34ac650c4b184f3a65e863e2051cdc1219aff051
SHA512e0317cf9a5a495f5e90a88f4a96517626a30c016b7374db41bc79a8bcb0920fcf7691ca3cf48c712b8bc2db075d734ca7cacc771e8f604297600187afe314d3f
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
153B
MD5f16e4923376d2a6db951cf5d08196cb0
SHA1a533dad57c6ba36422beafc7e3037e6dc231dd07
SHA2567608e2c6380afc029085b0397c92e6901c1955bec0cc027c20194887a556d314
SHA512e5fa0059ad5fded6e99ea8266bad68da1db3273c7cb06410bf477bd4572ed83073bf89b7e09317c07d1f8d8ff837180089aa07abde3623e59381d2f8ee251646
-
Filesize
153B
MD5f16e4923376d2a6db951cf5d08196cb0
SHA1a533dad57c6ba36422beafc7e3037e6dc231dd07
SHA2567608e2c6380afc029085b0397c92e6901c1955bec0cc027c20194887a556d314
SHA512e5fa0059ad5fded6e99ea8266bad68da1db3273c7cb06410bf477bd4572ed83073bf89b7e09317c07d1f8d8ff837180089aa07abde3623e59381d2f8ee251646
-
Filesize
63KB
MD536a2e6b4dea8833ac9642279cc0f2f51
SHA1c646179ba316daabb09406d3705a4f4248b5e0a9
SHA256870a1845baec61018280036e11dc9bdea8de069760fe0a713395c6258a496e61
SHA51227eb6c352ccb66de04a45b1961e872a6c4a1e88faedd8480c81e319bc8c9c63ff48849b8fbba05efc21d64d1b79f761442f5a765b2e40fe5b28c1c860fe16602
-
Filesize
63KB
MD536a2e6b4dea8833ac9642279cc0f2f51
SHA1c646179ba316daabb09406d3705a4f4248b5e0a9
SHA256870a1845baec61018280036e11dc9bdea8de069760fe0a713395c6258a496e61
SHA51227eb6c352ccb66de04a45b1961e872a6c4a1e88faedd8480c81e319bc8c9c63ff48849b8fbba05efc21d64d1b79f761442f5a765b2e40fe5b28c1c860fe16602