Analysis
-
max time kernel
1288s -
max time network
1272s -
platform
windows11-21h2_x64 -
resource
win11-20240214-en -
resource tags
arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system -
submitted
20-03-2024 17:22
Static task
static1
Behavioral task
behavioral1
Sample
S500 RAT Cracked + Source .rar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
S500 RAT Cracked + Source .rar
Resource
win10-20240221-en
Behavioral task
behavioral3
Sample
S500 RAT Cracked + Source .rar
Resource
win10v2004-20240226-en
General
-
Target
S500 RAT Cracked + Source .rar
-
Size
147.7MB
-
MD5
5a39139ce5f13297aea9c5839d1447c6
-
SHA1
90c68a4f451c2fe75c6325198693b6f52971d573
-
SHA256
54008e93bf228c29b7592f30f3f57cb6d8e419d6c9d2aa154c1a582160efbfff
-
SHA512
7a98ebd2ffb9dec789ddf5adf9fe2dad5a9527cb2e2c038933722012a9ead3fac98280dbf32f0ef5aaa4b6c57afe7768cdd2018e632fbe415c56925833e536b1
-
SSDEEP
3145728:Lp+2zwG6H0uXZ2nlHp75eJmivGPIpVQNQSsnyDZ5lc:Ls2cG1FlHp7ImqO8VIGyba
Malware Config
Extracted
asyncrat
Venom Pwn3rzs' Edtition v6.0.1
Default
oevtobrbpcmpahavl
-
delay
1
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/LwwcrLg4
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral4/files/0x0002000000025cbd-231.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 3796 KeyGenerator.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2567984660-2719943099-2683635618-1000_Classes\Local Settings cmd.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeRestorePrivilege 1436 7zFM.exe Token: 35 1436 7zFM.exe Token: SeSecurityPrivilege 1436 7zFM.exe Token: SeDebugPrivilege 3796 KeyGenerator.exe Token: SeIncreaseQuotaPrivilege 3796 KeyGenerator.exe Token: SeSecurityPrivilege 3796 KeyGenerator.exe Token: SeTakeOwnershipPrivilege 3796 KeyGenerator.exe Token: SeLoadDriverPrivilege 3796 KeyGenerator.exe Token: SeSystemProfilePrivilege 3796 KeyGenerator.exe Token: SeSystemtimePrivilege 3796 KeyGenerator.exe Token: SeProfSingleProcessPrivilege 3796 KeyGenerator.exe Token: SeIncBasePriorityPrivilege 3796 KeyGenerator.exe Token: SeCreatePagefilePrivilege 3796 KeyGenerator.exe Token: SeBackupPrivilege 3796 KeyGenerator.exe Token: SeRestorePrivilege 3796 KeyGenerator.exe Token: SeShutdownPrivilege 3796 KeyGenerator.exe Token: SeDebugPrivilege 3796 KeyGenerator.exe Token: SeSystemEnvironmentPrivilege 3796 KeyGenerator.exe Token: SeRemoteShutdownPrivilege 3796 KeyGenerator.exe Token: SeUndockPrivilege 3796 KeyGenerator.exe Token: SeManageVolumePrivilege 3796 KeyGenerator.exe Token: 33 3796 KeyGenerator.exe Token: 34 3796 KeyGenerator.exe Token: 35 3796 KeyGenerator.exe Token: 36 3796 KeyGenerator.exe Token: SeIncreaseQuotaPrivilege 3796 KeyGenerator.exe Token: SeSecurityPrivilege 3796 KeyGenerator.exe Token: SeTakeOwnershipPrivilege 3796 KeyGenerator.exe Token: SeLoadDriverPrivilege 3796 KeyGenerator.exe Token: SeSystemProfilePrivilege 3796 KeyGenerator.exe Token: SeSystemtimePrivilege 3796 KeyGenerator.exe Token: SeProfSingleProcessPrivilege 3796 KeyGenerator.exe Token: SeIncBasePriorityPrivilege 3796 KeyGenerator.exe Token: SeCreatePagefilePrivilege 3796 KeyGenerator.exe Token: SeBackupPrivilege 3796 KeyGenerator.exe Token: SeRestorePrivilege 3796 KeyGenerator.exe Token: SeShutdownPrivilege 3796 KeyGenerator.exe Token: SeDebugPrivilege 3796 KeyGenerator.exe Token: SeSystemEnvironmentPrivilege 3796 KeyGenerator.exe Token: SeRemoteShutdownPrivilege 3796 KeyGenerator.exe Token: SeUndockPrivilege 3796 KeyGenerator.exe Token: SeManageVolumePrivilege 3796 KeyGenerator.exe Token: 33 3796 KeyGenerator.exe Token: 34 3796 KeyGenerator.exe Token: 35 3796 KeyGenerator.exe Token: 36 3796 KeyGenerator.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1436 7zFM.exe 1436 7zFM.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3556 wrote to memory of 1436 3556 cmd.exe 78 PID 3556 wrote to memory of 1436 3556 cmd.exe 78
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\S500 RAT Cracked + Source .rar"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\S500 RAT Cracked + Source .rar"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1436
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1700
-
C:\Users\Admin\Desktop\S500 RAT Cracked\KeyGenerator.exe"C:\Users\Admin\Desktop\S500 RAT Cracked\KeyGenerator.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3796
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\S500 RAT Cracked\Login.txt1⤵PID:4496
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD587ca06f69c513f4fbbf67c5b4e366210
SHA17a0383ddd6f8ec2ec8624358ed0cd2ddc1a366aa
SHA25642b6ecf01da5fc49e5d12229a52ddeb9901b13d62ac00a846aa748adb083f8e5
SHA512286f3e8d46fe798b1e37823caea0e28811fb2e42a8e27669622a6477c353a7fe56f8e207ac9aa199df4ceac39ec9fd7bd77bdf01deac8ef448269916457d4acb
-
Filesize
70B
MD5d5b77dfb5f248f3aabc560d8300088c5
SHA1bbf7bb5f78051a59e725920cea3d54d1e7473cea
SHA256113a6f39d02edb55049baa38c50d26579247acb7427e7494805a91e415e21a55
SHA512180e45da4adc3643d40ded2ff526af67361f77b6c61f05d3739e10e41327614a5f57485148f32d047f6d9169230053a77c9cc6fe5e7ced2d2dc285a7b8269552