C:\Users\Venix Developer\Desktop\2.9\RR\x64\Release\VeNIX.pdb
Static task
static1
Behavioral task
behavioral1
Sample
Rootkit.Win64.Agent.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Rootkit.Win64.Agent.exe
Resource
win10v2004-20240226-en
General
-
Target
Rootkit.Win64.Agent.bhc-2736ce4325abc117051d5cc7dd27ee2e2df2f4e81c30830930307d7397f96a3c
-
Size
9.1MB
-
MD5
912b6f0509340f7b8b7492a4a810322c
-
SHA1
a2338f358e49c663e30ae60ef485c11a1e828d51
-
SHA256
2736ce4325abc117051d5cc7dd27ee2e2df2f4e81c30830930307d7397f96a3c
-
SHA512
2ba9aed3c6e7e5e341ee8145f3f21f52ea05b7753c81f30d91e023955f7fd29c789a03b413cdd9f908b55c6170380d32e9c4fd3e414c29ae965dd3b6b28d624f
-
SSDEEP
196608:hUTwCMiKQtbIInbhcAti4h37TH0eMQetM/hxj7716:hPiKQtbIInbqAt37D0eM0x/7I
Malware Config
Signatures
-
Detects executables Discord URL observed in first stage droppers 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_DiscordURL -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Rootkit.Win64.Agent.bhc-2736ce4325abc117051d5cc7dd27ee2e2df2f4e81c30830930307d7397f96a3c
Files
-
Rootkit.Win64.Agent.bhc-2736ce4325abc117051d5cc7dd27ee2e2df2f4e81c30830930307d7397f96a3c.exe windows:6 windows x64 arch:x64
5672d560dc8a08b0c9e4ce2830f116c4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
ws2_32
send
socket
htonl
listen
ioctlsocket
closesocket
freeaddrinfo
ntohl
recvfrom
sendto
gethostname
accept
recv
WSACleanup
WSAStartup
WSAIoctl
setsockopt
ntohs
htons
getsockopt
shutdown
getsockname
getpeername
connect
bind
WSASetLastError
select
__WSAFDIsSet
inet_pton
getaddrinfo
getnameinfo
WSAGetLastError
wldap32
ord60
ord45
ord50
ord41
ord22
ord46
ord32
ord33
ord35
ord79
ord30
ord200
ord211
ord26
ord301
ord27
ord143
crypt32
CertGetNameStringA
CertAddCertificateContextToStore
CryptStringToBinaryA
CryptQueryObject
CertGetCertificateChain
CertFreeCertificateContext
CertFindCertificateInStore
CertGetCertificateContextProperty
CertDuplicateCertificateContext
CertFreeCertificateChain
CertCreateCertificateChainEngine
CertFreeCertificateChainEngine
CertOpenStore
CertCloseStore
CertEnumCertificatesInStore
kernel32
FreeLibraryAndExitThread
ReadProcessMemory
ReadFile
WriteFile
PeekNamedPipe
CreateFileW
GetLastError
CloseHandle
GetCurrentProcessId
WaitNamedPipeW
lstrlenW
GetModuleFileNameW
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
WriteProcessMemory
Sleep
VirtualProtectEx
HeapFree
GetCurrentProcess
InitializeCriticalSectionEx
HeapSize
HeapReAlloc
HeapAlloc
DecodePointer
HeapDestroy
LocalFree
DeleteCriticalSection
GetProcessHeap
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
LoadLibraryA
QueryPerformanceFrequency
GetProcAddress
VerSetConditionMask
FreeLibrary
QueryPerformanceCounter
SetConsoleTextAttribute
GetStdHandle
GetCurrentDirectoryA
OpenProcess
CreateFileA
DeleteFileA
CreateThread
GetConsoleWindow
SetConsoleTitleW
VirtualAllocEx
VirtualFreeEx
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
VirtualQueryEx
EnterCriticalSection
LeaveCriticalSection
WaitForSingleObject
GetExitCodeProcess
WriteConsoleW
FileTimeToSystemTime
FormatMessageA
GetSystemInfo
SleepEx
GetSystemDirectoryA
GetModuleHandleA
VerifyVersionInfoA
WaitForSingleObjectEx
ExpandEnvironmentStringsA
GetFileType
WaitForMultipleObjects
GetFileSizeEx
GetEnvironmentVariableW
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleExW
FormatMessageW
GetModuleHandleW
GetSystemTimeAsFileTime
RtlVirtualUnwind
SwitchToFiber
DeleteFiber
CreateFiber
LoadLibraryW
ConvertFiberToThread
ConvertThreadToFiber
FindClose
FindFirstFileW
FindNextFileW
GetSystemTime
SystemTimeToFileTime
SleepConditionVariableSRW
WakeAllConditionVariable
TryAcquireSRWLockExclusive
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
EncodePointer
ExitThread
LoadLibraryExW
SetLastError
RtlPcToFileHeader
GetLocaleInfoEx
LCMapStringEx
GetStringTypeW
CompareStringEx
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
OutputDebugStringW
RaiseException
RtlUnwindEx
InterlockedPushEntrySList
VirtualAlloc
SetFilePointerEx
SetConsoleCtrlHandler
GetCommandLineA
GetCommandLineW
VirtualProtect
VirtualQuery
GetDriveTypeW
GetFileInformationByHandle
GetTickCount
SystemTimeToTzSpecificLocalTime
GetConsoleOutputCP
FlushFileBuffers
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
CreateProcessW
GetFileAttributesExW
DeleteFileW
GetCurrentDirectoryW
GetFullPathNameW
SetStdHandle
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetEndOfFile
RtlUnwind
user32
SetForegroundWindow
PeekMessageW
DispatchMessageW
GetClassNameA
TranslateMessage
EnumWindows
IsIconic
GetWindowTextW
GetKeyState
ScreenToClient
GetCapture
ClientToScreen
IsChild
GetSystemMetrics
MessageBoxW
GetWindowLongW
keybd_event
GetProcessWindowStation
SetCapture
SetCursor
GetClientRect
ReleaseCapture
OpenClipboard
CloseClipboard
EmptyClipboard
GetClipboardData
SetClipboardData
SetWindowDisplayAffinity
MessageBoxA
GetCursorPos
DefWindowProcW
FindWindowExW
GetWindowRect
RegisterClassExW
ShowWindow
MoveWindow
CreateWindowExA
BringWindowToTop
LoadIconW
FindWindowW
LoadCursorW
SetWindowLongW
UpdateWindow
GetAsyncKeyState
SetCursorPos
SendInput
GetForegroundWindow
GetUserObjectInformationW
gdi32
DeleteObject
GetObjectW
advapi32
CryptGetUserKey
CryptSetHashParam
CryptDestroyKey
CryptAcquireContextW
ReportEventW
RegisterEventSourceW
DeregisterEventSource
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGenRandom
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextA
CreateServiceA
CloseServiceHandle
OpenSCManagerA
DeleteService
ChangeServiceConfigA
ControlService
StartServiceA
OpenServiceA
CopySid
IsValidSid
OpenProcessToken
ConvertSidToStringSidW
GetLengthSid
GetTokenInformation
RegCloseKey
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
CryptExportKey
CryptDecrypt
CryptSignHashW
CryptEnumProvidersW
CryptGetProvParam
shell32
ShellExecuteExA
ShellExecuteA
ShellExecuteW
ole32
CreateStreamOnHGlobal
dwmapi
DwmExtendFrameIntoClientArea
shlwapi
ord213
ord184
ord214
d3d9
Direct3DCreate9
d3dx9_43
D3DXCreateTextureFromFileInMemory
D3DXCreateFontW
bcrypt
BCryptGenRandom
rpcrt4
UuidCreate
UuidToStringA
RpcStringFreeA
userenv
UnloadUserProfile
imm32
ImmSetCompositionWindow
ImmGetContext
ImmReleaseContext
urlmon
URLDownloadToFileW
gdiplus
GdiplusStartup
GdiplusShutdown
GdipGetImageEncoders
GdipCreateBitmapFromScan0
GdipSaveImageToStream
GdipGetImageEncodersSize
GdipFree
GdipDisposeImage
GdipCreateBitmapFromHBITMAP
GdipAlloc
GdipCloneImage
Sections
.text Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2.5MB - Virtual size: 2.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 176KB - Virtual size: 176KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ