Analysis

  • max time kernel
    1336s
  • max time network
    1164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-07-2023 15:13

General

  • Target

    Venom5-HVNC-Rat.rar

  • Size

    29.4MB

  • MD5

    9c750cfbe1dbd4f4d87dcfc145d06237

  • SHA1

    67b5ca12ee20e6a1cdbf273d5a1736522fcdf649

  • SHA256

    9e3cde7a6f4c114daf5627a39a5999918f894489c922d82008cb21771f761d45

  • SHA512

    d0dc5ef150228d3dfe3583576f1cd16a25bda020e1a80ac19b708cd8c1ae661e3c96f96622ab10ecc00029fb9dfabeda3194c9f7fbf0e6d32bfecc45b5d2d65f

  • SSDEEP

    786432:QlrWp1qT/Jj8hGTGm1qH9ymV5l4BbulMulv9ymiIBjVul8B6ul7WP985iSGIfXN7:QlrWp+p8hsGmifB4BbpwfiejVlB6u89c

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 11 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 3 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 25 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Venom5-HVNC-Rat.rar
    1⤵
    • Modifies registry class
    PID:3236
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:392
  • C:\Program Files\Mozilla Firefox\firefox.exe
    "C:\Program Files\Mozilla Firefox\firefox.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3692
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe"
      2⤵
      • Checks processor information in registry
      • Modifies registry class
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:632
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="632.0.702205284\1627350758" -parentBuildID 20221007134813 -prefsHandle 1872 -prefMapHandle 1864 -prefsLen 20938 -prefMapSize 232675 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6a7af5d8-3083-4000-949d-ceddce632739} 632 "\\.\pipe\gecko-crash-server-pipe.632" 1964 217fc9d7e58 gpu
        3⤵
          PID:1952
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="632.1.796314485\928441741" -parentBuildID 20221007134813 -prefsHandle 2352 -prefMapHandle 2340 -prefsLen 20974 -prefMapSize 232675 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f4d16ddc-7d59-4474-8464-20ba99760638} 632 "\\.\pipe\gecko-crash-server-pipe.632" 2364 217eff70758 socket
          3⤵
          • Checks processor information in registry
          PID:2824
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="632.2.92558939\183765849" -childID 1 -isForBrowser -prefsHandle 3308 -prefMapHandle 3136 -prefsLen 21077 -prefMapSize 232675 -jsInitHandle 1380 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0805fcd3-055f-4b2d-887c-cc678d13c32a} 632 "\\.\pipe\gecko-crash-server-pipe.632" 2880 217822b6b58 tab
          3⤵
            PID:1544
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="632.3.1704918279\1324480748" -childID 2 -isForBrowser -prefsHandle 3568 -prefMapHandle 3564 -prefsLen 26437 -prefMapSize 232675 -jsInitHandle 1380 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6a18836e-0eef-4ea3-9b22-998fea712193} 632 "\\.\pipe\gecko-crash-server-pipe.632" 3580 217830ee058 tab
            3⤵
              PID:1388
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="632.4.1552367329\440832949" -childID 3 -isForBrowser -prefsHandle 4608 -prefMapHandle 4604 -prefsLen 26496 -prefMapSize 232675 -jsInitHandle 1380 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bc4d2344-238a-47ec-82cd-cd9e2aad79e3} 632 "\\.\pipe\gecko-crash-server-pipe.632" 4620 21783fbf158 tab
              3⤵
                PID:960
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="632.7.1117865421\506756882" -childID 6 -isForBrowser -prefsHandle 5040 -prefMapHandle 5140 -prefsLen 26656 -prefMapSize 232675 -jsInitHandle 1380 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bf4dabda-2c77-494e-ba6d-d2391d5ccc93} 632 "\\.\pipe\gecko-crash-server-pipe.632" 5008 2178582ca58 tab
                3⤵
                  PID:5676
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="632.6.564232606\2048252047" -childID 5 -isForBrowser -prefsHandle 5436 -prefMapHandle 5440 -prefsLen 26656 -prefMapSize 232675 -jsInitHandle 1380 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c79e3f21-6171-4a25-8273-91b9186c606a} 632 "\\.\pipe\gecko-crash-server-pipe.632" 5428 2178582c458 tab
                  3⤵
                    PID:5660
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="632.5.2015809654\556257803" -childID 4 -isForBrowser -prefsHandle 5304 -prefMapHandle 5312 -prefsLen 26656 -prefMapSize 232675 -jsInitHandle 1380 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a28474a5-c0fb-4e90-87c8-5d831b9d3de2} 632 "\\.\pipe\gecko-crash-server-pipe.632" 5028 21784b40058 tab
                    3⤵
                      PID:5652
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="632.8.50306029\827203966" -childID 7 -isForBrowser -prefsHandle 5872 -prefMapHandle 5884 -prefsLen 26831 -prefMapSize 232675 -jsInitHandle 1380 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cf88a4cc-57c4-44ea-b636-45903b685278} 632 "\\.\pipe\gecko-crash-server-pipe.632" 5800 2178638a558 tab
                      3⤵
                        PID:5240
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="632.9.389482194\408567147" -childID 8 -isForBrowser -prefsHandle 4644 -prefMapHandle 5324 -prefsLen 26831 -prefMapSize 232675 -jsInitHandle 1380 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e08632cc-6f58-447b-87ba-e8f113d899ab} 632 "\\.\pipe\gecko-crash-server-pipe.632" 5820 21786a4da58 tab
                        3⤵
                          PID:5412
                        • C:\Users\Admin\Downloads\winrar-x64-622.exe
                          "C:\Users\Admin\Downloads\winrar-x64-622.exe"
                          3⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:2496
                    • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
                      "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\RepairLimit.csv"
                      1⤵
                      • Checks processor information in registry
                      • Enumerates system info in registry
                      • Suspicious behavior: AddClipboardFormatListener
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SetWindowsHookEx
                      PID:4580
                    • C:\Windows\system32\werfault.exe
                      werfault.exe /h /shared Global\33f3c6673ba34f858207848c8e55e0ec /t 3968 /p 2496
                      1⤵
                        PID:380
                      • C:\Windows\System32\rundll32.exe
                        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                        1⤵
                          PID:4212
                        • C:\Users\Admin\Downloads\winrar-x64-622.exe
                          "C:\Users\Admin\Downloads\winrar-x64-622.exe"
                          1⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:3048

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\suuk1m1w.default-release\activity-stream.discovery_stream.json.tmp

                          Filesize

                          148KB

                          MD5

                          949d3e9072b895083096a9b308aba31e

                          SHA1

                          c07a9f80fbf87b305dbcdf5365d632983e704920

                          SHA256

                          18e2bf8bf6c05fdf61ed6f9d8fc47d8c1c46e6de9aa22fafc1df306467c52a29

                          SHA512

                          d0db2a9b1d6c1de4537400afea5bf4dc7e514365a427d41be683de5c95b5b6c377b02ca585c863fb26a31453a309bf0041ff228df45b719da8af5f8e41a47500

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

                          Filesize

                          259B

                          MD5

                          cc37c8a0932f72c0ebd005853f99d37b

                          SHA1

                          bcbdbb189a4fec14b038a75c59a1a5f8c575ad5d

                          SHA256

                          918700b63a90b983fa886a3230c49d16ef109a8abe6fc239840acdaf8c102398

                          SHA512

                          70c5d3006ce41f2d451cef79f9a6a940f42a4299bd41af31e50cef8bc1729a611389ec80ace79f0e4f502e18d641d36f055cb6ee3c4d46e442f87d7ed25537af

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\suuk1m1w.default-release\prefs-1.js

                          Filesize

                          6KB

                          MD5

                          d0cb7ca5945667795341501480608de1

                          SHA1

                          858e28dff9632f6cbee0b3a3be3c6ae94b5854da

                          SHA256

                          96d6687d5042857f5ec4088e3986f5d1e8592224aef9e2cc6d061b64b1f81719

                          SHA512

                          ee38fca801cc68441cc938fb8d1b9f542ce0766784dd5714f2b50a2029678688d2cbe0b18c73584e2fffbc6ca1a6a121a3968ef05dac75e363f195aec725a901

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\suuk1m1w.default-release\prefs-1.js

                          Filesize

                          6KB

                          MD5

                          0bbaf059080289f29695a86a8e41b412

                          SHA1

                          f8b400a0fc531f65bf20fa1122ca02915c923a47

                          SHA256

                          479d8282c581d58453dcae7a3ae30538c92a689841991e8ca6a14b2df733769b

                          SHA512

                          5a9bcd04803bf88cc7b3079a1384be37c552c9063b96f01395a428ef4342b015686f0a07115652edc7e3bd6c0203a5e6e5acf97362c896520b4934524227211b

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\suuk1m1w.default-release\sessionstore-backups\recovery.jsonlz4

                          Filesize

                          3KB

                          MD5

                          166b0d398a0ef44fad4447ada8f1e164

                          SHA1

                          8c1a648bbbe67c4d9fd1dfa5dc7430d369da745e

                          SHA256

                          c1840bd14b07688049000507d470e3f2d5ddfcb73aad93c692713540dbfdb07a

                          SHA512

                          f42be0e84680408ac88c7721c050b1dfe23374c2ca16751194bbd97aa0d06eec7ce7197dbe8c2a7705fc134ba7e820adddcda8922ea61ff01fe532cbeffdf9e8

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\suuk1m1w.default-release\sessionstore.jsonlz4

                          Filesize

                          4KB

                          MD5

                          9287788e87f4eb2662f506e8e1718a09

                          SHA1

                          599ace3271ff6ce73b65a0a30f65b6c8fc088c59

                          SHA256

                          60146436caee395c4bbc49796b28cc0896279c31f33ed95111e6403256b17bcc

                          SHA512

                          ee31a432b8c4cae00c0d20a23344aea9fe7bce4c17c7bf0d611ace8f008547fc30ca7b292c9724f6d5f5c3c5e6a2c22dc570fb2bf9ebacb221ad4c76142bb0c8

                        • C:\Users\Admin\Downloads\winrar-x64-622.exe

                          Filesize

                          3.4MB

                          MD5

                          8a3faa499854ea7ff1a7ea5dbfdfccfb

                          SHA1

                          e0c4e5f7e08207319637c963c439e60735939dec

                          SHA256

                          e5e9f54a55ad4b936adaed4cca5b4d29bd6f308f1a0136a7e3c0f5fb234e7fff

                          SHA512

                          4c7474353dd64e1a1568b93e17be3f2f0eaf24b7d520339c033f46a517b0e048e88bda1b5d5bcfe62353930d8d76a7037ec6200882df8afc310322a5d5fceb25

                        • C:\Users\Admin\Downloads\winrar-x64-622.exe

                          Filesize

                          3.4MB

                          MD5

                          8a3faa499854ea7ff1a7ea5dbfdfccfb

                          SHA1

                          e0c4e5f7e08207319637c963c439e60735939dec

                          SHA256

                          e5e9f54a55ad4b936adaed4cca5b4d29bd6f308f1a0136a7e3c0f5fb234e7fff

                          SHA512

                          4c7474353dd64e1a1568b93e17be3f2f0eaf24b7d520339c033f46a517b0e048e88bda1b5d5bcfe62353930d8d76a7037ec6200882df8afc310322a5d5fceb25

                        • C:\Users\Admin\Downloads\winrar-x64-622.exe

                          Filesize

                          3.4MB

                          MD5

                          8a3faa499854ea7ff1a7ea5dbfdfccfb

                          SHA1

                          e0c4e5f7e08207319637c963c439e60735939dec

                          SHA256

                          e5e9f54a55ad4b936adaed4cca5b4d29bd6f308f1a0136a7e3c0f5fb234e7fff

                          SHA512

                          4c7474353dd64e1a1568b93e17be3f2f0eaf24b7d520339c033f46a517b0e048e88bda1b5d5bcfe62353930d8d76a7037ec6200882df8afc310322a5d5fceb25

                        • C:\Users\Admin\Downloads\winrar-x64-622.iYQB1lLN.exe.part

                          Filesize

                          15KB

                          MD5

                          ae6c4b17db4068af4e2fcde84a1ef043

                          SHA1

                          397023b7f5cb7899ecb6eab3ca1f74c607d84b93

                          SHA256

                          caa18f2b98e8af2bc16cddf0ff06651e29a2005a3f9ed58097834d92eb3a477b

                          SHA512

                          3cf7f6b09ce6cdd9ab7580b1219ab14bdd0cff4af70de297fc57556059f1168a3ea8319662794f566390711ded5061e25ffa4e980518bed86f11d33b308abb51

                        • memory/4580-427-0x00007FF9AA350000-0x00007FF9AA360000-memory.dmp

                          Filesize

                          64KB

                        • memory/4580-432-0x00007FF9A7B20000-0x00007FF9A7B30000-memory.dmp

                          Filesize

                          64KB

                        • memory/4580-424-0x00007FF9EA2D0000-0x00007FF9EA4C5000-memory.dmp

                          Filesize

                          2.0MB

                        • memory/4580-425-0x00007FF9AA350000-0x00007FF9AA360000-memory.dmp

                          Filesize

                          64KB

                        • memory/4580-426-0x00007FF9EA2D0000-0x00007FF9EA4C5000-memory.dmp

                          Filesize

                          2.0MB

                        • memory/4580-421-0x00007FF9AA350000-0x00007FF9AA360000-memory.dmp

                          Filesize

                          64KB

                        • memory/4580-422-0x00007FF9AA350000-0x00007FF9AA360000-memory.dmp

                          Filesize

                          64KB

                        • memory/4580-428-0x00007FF9EA2D0000-0x00007FF9EA4C5000-memory.dmp

                          Filesize

                          2.0MB

                        • memory/4580-429-0x00007FF9EA2D0000-0x00007FF9EA4C5000-memory.dmp

                          Filesize

                          2.0MB

                        • memory/4580-430-0x00007FF9EA2D0000-0x00007FF9EA4C5000-memory.dmp

                          Filesize

                          2.0MB

                        • memory/4580-431-0x00007FF9EA2D0000-0x00007FF9EA4C5000-memory.dmp

                          Filesize

                          2.0MB

                        • memory/4580-423-0x00007FF9EA2D0000-0x00007FF9EA4C5000-memory.dmp

                          Filesize

                          2.0MB

                        • memory/4580-433-0x00007FF9EA2D0000-0x00007FF9EA4C5000-memory.dmp

                          Filesize

                          2.0MB

                        • memory/4580-434-0x00007FF9A7B20000-0x00007FF9A7B30000-memory.dmp

                          Filesize

                          64KB

                        • memory/4580-435-0x00007FF9EA2D0000-0x00007FF9EA4C5000-memory.dmp

                          Filesize

                          2.0MB

                        • memory/4580-420-0x00007FF9EA2D0000-0x00007FF9EA4C5000-memory.dmp

                          Filesize

                          2.0MB

                        • memory/4580-461-0x00007FF9AA350000-0x00007FF9AA360000-memory.dmp

                          Filesize

                          64KB

                        • memory/4580-463-0x00007FF9EA2D0000-0x00007FF9EA4C5000-memory.dmp

                          Filesize

                          2.0MB

                        • memory/4580-464-0x00007FF9AA350000-0x00007FF9AA360000-memory.dmp

                          Filesize

                          64KB

                        • memory/4580-462-0x00007FF9AA350000-0x00007FF9AA360000-memory.dmp

                          Filesize

                          64KB

                        • memory/4580-465-0x00007FF9AA350000-0x00007FF9AA360000-memory.dmp

                          Filesize

                          64KB

                        • memory/4580-466-0x00007FF9EA2D0000-0x00007FF9EA4C5000-memory.dmp

                          Filesize

                          2.0MB

                        • memory/4580-419-0x00007FF9AA350000-0x00007FF9AA360000-memory.dmp

                          Filesize

                          64KB