Analysis

  • max time kernel
    506s
  • max time network
    442s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    08-02-2024 02:27

General

  • Target

    $77-Venom.exe

  • Size

    534KB

  • MD5

    ac2e0dc8d409951c34e10105738c0819

  • SHA1

    644f9ecf7dd774bcf0ebd551344866f3311b4ddb

  • SHA256

    f2d6e1e9007b693c4ef5b7a8ee56c4bf24594620a43c16d752fe79dc60132270

  • SHA512

    a0c2c24375db71dd7617f52c24824f760a80a9a2e77fe0f3bcc1518fbf0cefc11e41aa9af65231e9bb1d1d91a0653aefb1bb650e701922152fc8844f0b56535a

  • SSDEEP

    12288:0kxfIayFM+jJ2vemr+mf7B+yVkzFBtFET:0wPyFMyEr+mFzyFs

Malware Config

Extracted

Family

quasar

Version

2.1.0.0

Botnet

mariojudah

C2

127.0.0.1:4782

Mutex

VNM_MUTEX_a2Jk7sW9n0PjTmaEMn

Attributes
  • encryption_key

    1zzvalSEUSRsWGZTAdB5

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Venom Client Startup

  • subdirectory

    SubDir

Signatures

  • Contains code to disable Windows Defender 4 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 4 IoCs
  • VenomRAT

    VenomRAT is a modified version of QuasarRAT with some added features, such as rootkit and stealer capabilites.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe
    "C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe"
    1⤵
    • Modifies Windows Defender Real-time Protection settings
    • Loads dropped DLL
    • Windows security modification
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1392
    • C:\Windows\SysWOW64\schtasks.exe
      "schtasks" /create /tn "Venom Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:3028
    • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
      "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2256
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /create /tn "Venom Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
        3⤵
        • Creates scheduled task(s)
        PID:1192
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell" Get-MpPreference -verbose
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2632
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2824
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*
        3⤵
          PID:2752
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\DojabuDuWTYs.bat" "
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:756
        • C:\Windows\SysWOW64\chcp.com
          chcp 65001
          3⤵
            PID:848
          • C:\Windows\SysWOW64\PING.EXE
            ping -n 10 localhost
            3⤵
            • Runs ping.exe
            PID:2056
          • C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe
            "C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe"
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2220
      • C:\Windows\explorer.exe
        "C:\Windows\explorer.exe"
        1⤵
          PID:2920
        • C:\Windows\system32\AUDIODG.EXE
          C:\Windows\system32\AUDIODG.EXE 0x550
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:832

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          1KB

          MD5

          a266bb7dcc38a562631361bbf61dd11b

          SHA1

          3b1efd3a66ea28b16697394703a72ca340a05bd5

          SHA256

          df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

          SHA512

          0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          242B

          MD5

          020e0bce2e402dd1dc02d6ebc4ca52e3

          SHA1

          ecb25005189dfb0cfb17636d3c4588e6ab2c341c

          SHA256

          a6b2efd2f41aaee26421709dfa488892f7e71f71eb7fa4e9dc35b8ab12f60268

          SHA512

          4c694a462968390dbe67d6bdd4fc87e312b4dbba8f81d7de6f162facc523d67532ff60e7e0e83211bfd971c7a870d173498d354272eae17f3be067dd87cbf1ea

        • C:\Users\Admin\AppData\Local\Temp\DojabuDuWTYs.bat

          Filesize

          206B

          MD5

          fdd26239c7e395552fa0e38733e08ebc

          SHA1

          9e1424212b748c98bfc6af0dc534faa12a4519d7

          SHA256

          f4da4742cbb7344a466082377808f6a69bfe2160ab05fc0d6cd571f5d75f6f6d

          SHA512

          959181835fc85e22476ffa862170599d89328880dd56444459e82aa7c6b65a9a464ef0f1fdb1be7b25531e5fe955a203a216b360c415321edbdcedb0e9e34f53

        • C:\Users\Admin\AppData\Local\Temp\Tar2773.tmp

          Filesize

          171KB

          MD5

          9c0c641c06238516f27941aa1166d427

          SHA1

          64cd549fb8cf014fcd9312aa7a5b023847b6c977

          SHA256

          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

          SHA512

          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

        • \Users\Admin\AppData\Roaming\SubDir\Client.exe

          Filesize

          534KB

          MD5

          ac2e0dc8d409951c34e10105738c0819

          SHA1

          644f9ecf7dd774bcf0ebd551344866f3311b4ddb

          SHA256

          f2d6e1e9007b693c4ef5b7a8ee56c4bf24594620a43c16d752fe79dc60132270

          SHA512

          a0c2c24375db71dd7617f52c24824f760a80a9a2e77fe0f3bcc1518fbf0cefc11e41aa9af65231e9bb1d1d91a0653aefb1bb650e701922152fc8844f0b56535a

        • memory/1392-88-0x00000000749F0000-0x00000000750DE000-memory.dmp

          Filesize

          6.9MB

        • memory/1392-0-0x0000000000B20000-0x0000000000BAC000-memory.dmp

          Filesize

          560KB

        • memory/1392-2-0x00000000049C0000-0x0000000004A00000-memory.dmp

          Filesize

          256KB

        • memory/1392-1-0x00000000749F0000-0x00000000750DE000-memory.dmp

          Filesize

          6.9MB

        • memory/2220-90-0x00000000749F0000-0x00000000750DE000-memory.dmp

          Filesize

          6.9MB

        • memory/2220-89-0x0000000000250000-0x00000000002DC000-memory.dmp

          Filesize

          560KB

        • memory/2220-93-0x00000000749F0000-0x00000000750DE000-memory.dmp

          Filesize

          6.9MB

        • memory/2220-94-0x0000000004AF0000-0x0000000004B30000-memory.dmp

          Filesize

          256KB

        • memory/2256-10-0x00000000749F0000-0x00000000750DE000-memory.dmp

          Filesize

          6.9MB

        • memory/2256-91-0x00000000749F0000-0x00000000750DE000-memory.dmp

          Filesize

          6.9MB

        • memory/2256-92-0x0000000004AE0000-0x0000000004B20000-memory.dmp

          Filesize

          256KB

        • memory/2256-11-0x0000000004AE0000-0x0000000004B20000-memory.dmp

          Filesize

          256KB

        • memory/2256-9-0x0000000000970000-0x00000000009FC000-memory.dmp

          Filesize

          560KB

        • memory/2632-17-0x000000006F150000-0x000000006F6FB000-memory.dmp

          Filesize

          5.7MB

        • memory/2632-16-0x000000006F150000-0x000000006F6FB000-memory.dmp

          Filesize

          5.7MB

        • memory/2632-15-0x0000000002CB0000-0x0000000002CF0000-memory.dmp

          Filesize

          256KB

        • memory/2632-14-0x000000006F150000-0x000000006F6FB000-memory.dmp

          Filesize

          5.7MB