Analysis
-
max time kernel
139s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
16/08/2023, 12:33
Static task
static1
1 signatures
General
-
Target
8817a1e8ad3bacc4b983ea52a54fe54b595a75986978ff60e331f8a134aafbd6.exe
-
Size
7.5MB
-
MD5
64023657cca817495e94afe5f8887be2
-
SHA1
d55e3d9b41c4cee294cce54964f7e7d7d8788d01
-
SHA256
8817a1e8ad3bacc4b983ea52a54fe54b595a75986978ff60e331f8a134aafbd6
-
SHA512
c59bd6edf885ca94b0b023746c514566f0f9546a7171476bdd82926cc0caac4710f0a787da0fc8a4fb27601eed9fec1f123680d135f8d5141358d00b2eaa50cb
-
SSDEEP
98304:ax3zJiOlgXb/hT3y9eLAOk2stoG6isn5MsXSlmxetu1SPbgMp30ac5A8O7KaIBtd:akF3mesOJGX6d4EegATDT8cGZkYg2qp
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.1
Botnet
Default
C2
185.106.94.122:4449
Mutex
nrasbnbyxirll
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/memory/3744-144-0x0000000000400000-0x0000000000418000-memory.dmp asyncrat -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1736 set thread context of 3744 1736 8817a1e8ad3bacc4b983ea52a54fe54b595a75986978ff60e331f8a134aafbd6.exe 87 -
Program crash 1 IoCs
pid pid_target Process procid_target 1252 3744 WerFault.exe 87 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1736 8817a1e8ad3bacc4b983ea52a54fe54b595a75986978ff60e331f8a134aafbd6.exe 1736 8817a1e8ad3bacc4b983ea52a54fe54b595a75986978ff60e331f8a134aafbd6.exe 1736 8817a1e8ad3bacc4b983ea52a54fe54b595a75986978ff60e331f8a134aafbd6.exe 3744 InstallUtil.exe 3744 InstallUtil.exe 3744 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1736 8817a1e8ad3bacc4b983ea52a54fe54b595a75986978ff60e331f8a134aafbd6.exe Token: SeDebugPrivilege 3744 InstallUtil.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3744 InstallUtil.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1736 wrote to memory of 3744 1736 8817a1e8ad3bacc4b983ea52a54fe54b595a75986978ff60e331f8a134aafbd6.exe 87 PID 1736 wrote to memory of 3744 1736 8817a1e8ad3bacc4b983ea52a54fe54b595a75986978ff60e331f8a134aafbd6.exe 87 PID 1736 wrote to memory of 3744 1736 8817a1e8ad3bacc4b983ea52a54fe54b595a75986978ff60e331f8a134aafbd6.exe 87 PID 1736 wrote to memory of 3744 1736 8817a1e8ad3bacc4b983ea52a54fe54b595a75986978ff60e331f8a134aafbd6.exe 87 PID 1736 wrote to memory of 3744 1736 8817a1e8ad3bacc4b983ea52a54fe54b595a75986978ff60e331f8a134aafbd6.exe 87 PID 1736 wrote to memory of 3744 1736 8817a1e8ad3bacc4b983ea52a54fe54b595a75986978ff60e331f8a134aafbd6.exe 87 PID 1736 wrote to memory of 3744 1736 8817a1e8ad3bacc4b983ea52a54fe54b595a75986978ff60e331f8a134aafbd6.exe 87 PID 1736 wrote to memory of 3744 1736 8817a1e8ad3bacc4b983ea52a54fe54b595a75986978ff60e331f8a134aafbd6.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\8817a1e8ad3bacc4b983ea52a54fe54b595a75986978ff60e331f8a134aafbd6.exe"C:\Users\Admin\AppData\Local\Temp\8817a1e8ad3bacc4b983ea52a54fe54b595a75986978ff60e331f8a134aafbd6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3744 -s 26483⤵
- Program crash
PID:1252
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 3744 -ip 37441⤵PID:1520