Analysis Overview
SHA256
bace996d520f87342bf7ed61cef02607efcda1139d887de18306458eee56d4f8
Threat Level: Known bad
The file Venom 2.8 FINAL.zip was found to be: Known bad.
Malicious Activity Summary
Quasar payload
Quasar family
Loads dropped DLL
Obfuscated with Agile.Net obfuscator
Unsigned PE
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2024-04-04 12:07
Signatures
Quasar family
Quasar payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Obfuscated with Agile.Net obfuscator
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-04-04 12:07
Reported
2024-04-04 12:38
Platform
win11-20240221-en
Max time kernel
443s
Max time network
1175s
Command Line
Signatures
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Venom 2.8 CRACKED - FINAL\VenomRemote_Cracked.exe | N/A |
Obfuscated with Agile.Net obfuscator
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Venom 2.8 CRACKED - FINAL\VenomRemote_Cracked.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\Venom 2.8 CRACKED - FINAL\VenomRemote_Cracked.exe | N/A |
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Venom 2.8 CRACKED - FINAL\VenomRemote_Cracked.exe | N/A |
Suspicious use of SendNotifyMessage
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Venom 2.8 CRACKED - FINAL\VenomRemote_Cracked.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\Venom 2.8 CRACKED - FINAL\VenomRemote_Cracked.exe
"C:\Users\Admin\AppData\Local\Temp\Venom 2.8 CRACKED - FINAL\VenomRemote_Cracked.exe"
C:\Windows\SysWOW64\werfault.exe
werfault.exe /h /shared Global\5f505f3739ff4d4c8a961f0682501d52 /t 4788 /p 4180
Network
| Country | Destination | Domain | Proto |
| N/A | 10.127.0.1:5351 | udp |
Files
memory/4180-0-0x0000000074730000-0x0000000074EE1000-memory.dmp
memory/4180-1-0x0000000000AB0000-0x0000000003140000-memory.dmp
memory/4180-2-0x00000000081E0000-0x0000000008786000-memory.dmp
memory/4180-3-0x0000000007C30000-0x0000000007CC2000-memory.dmp
memory/4180-4-0x0000000007C20000-0x0000000007C30000-memory.dmp
memory/4180-5-0x0000000007C10000-0x0000000007C1A000-memory.dmp
memory/4180-6-0x0000000007F80000-0x00000000080CE000-memory.dmp
memory/4180-7-0x00000000080F0000-0x0000000008104000-memory.dmp
memory/4180-8-0x0000000007C20000-0x0000000007C30000-memory.dmp
memory/4180-9-0x000000000B330000-0x000000000B38A000-memory.dmp
memory/4180-10-0x000000000CFD0000-0x000000000D0EA000-memory.dmp
memory/4180-11-0x000000000D0F0000-0x000000000D156000-memory.dmp
memory/4180-12-0x000000000D1F0000-0x000000000D28C000-memory.dmp
memory/4180-13-0x000000000AE80000-0x000000000AE96000-memory.dmp
memory/4180-14-0x000000000D150000-0x000000000D1BE000-memory.dmp
memory/4180-15-0x000000000D1D0000-0x000000000D1DE000-memory.dmp
memory/4180-16-0x000000000DAD0000-0x000000000DADE000-memory.dmp
memory/4180-17-0x000000000DB90000-0x000000000DC84000-memory.dmp
memory/4180-18-0x0000000007C20000-0x0000000007C30000-memory.dmp
memory/4180-19-0x000000000DB30000-0x000000000DB36000-memory.dmp
memory/4180-22-0x0000000011DE0000-0x0000000011DF0000-memory.dmp
memory/4180-23-0x0000000074730000-0x0000000074EE1000-memory.dmp
memory/4180-24-0x0000000007C20000-0x0000000007C30000-memory.dmp
memory/4180-25-0x0000000007C20000-0x0000000007C30000-memory.dmp
memory/4180-26-0x0000000007C20000-0x0000000007C30000-memory.dmp
memory/4180-27-0x0000000011F60000-0x0000000012148000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\3088aa38-89fa-4724-b305-b602622698ff\GunaDotNetRT.dll
| MD5 | 9af5eb006bb0bab7f226272d82c896c7 |
| SHA1 | c2a5bb42a5f08f4dc821be374b700652262308f0 |
| SHA256 | 77dc05a6bda90757f66552ee3f469b09f1e00732b4edca0f542872fb591ed9db |
| SHA512 | 7badd41be4c1039302fda9bba19d374ec9446ce24b7db33b66bee4ef38180d1abcd666d2aea468e7e452aa1e1565eedfefed582bf1c2fe477a4171d99d48772a |
memory/4180-33-0x000000006DCA0000-0x000000006DCD7000-memory.dmp
memory/4180-37-0x0000000011F60000-0x0000000012144000-memory.dmp
memory/4180-38-0x0000000011F60000-0x0000000012144000-memory.dmp
memory/4180-36-0x0000000073130000-0x00000000731BA000-memory.dmp
memory/4180-40-0x0000000011F60000-0x0000000012144000-memory.dmp
memory/4180-42-0x0000000011F60000-0x0000000012144000-memory.dmp
memory/4180-44-0x0000000011F60000-0x0000000012144000-memory.dmp
memory/4180-46-0x0000000011F60000-0x0000000012144000-memory.dmp
memory/4180-48-0x0000000011F60000-0x0000000012144000-memory.dmp
memory/4180-50-0x0000000011F60000-0x0000000012144000-memory.dmp
memory/4180-52-0x0000000011F60000-0x0000000012144000-memory.dmp
memory/4180-54-0x0000000011F60000-0x0000000012144000-memory.dmp
memory/4180-56-0x0000000011F60000-0x0000000012144000-memory.dmp
memory/4180-58-0x0000000011F60000-0x0000000012144000-memory.dmp
memory/4180-60-0x0000000011F60000-0x0000000012144000-memory.dmp
memory/4180-62-0x0000000011F60000-0x0000000012144000-memory.dmp
memory/4180-64-0x0000000011F60000-0x0000000012144000-memory.dmp
memory/4180-66-0x0000000011F60000-0x0000000012144000-memory.dmp
memory/4180-68-0x0000000011F60000-0x0000000012144000-memory.dmp
memory/4180-70-0x0000000011F60000-0x0000000012144000-memory.dmp
memory/4180-72-0x0000000011F60000-0x0000000012144000-memory.dmp
memory/4180-74-0x0000000011F60000-0x0000000012144000-memory.dmp
memory/4180-76-0x0000000011F60000-0x0000000012144000-memory.dmp
memory/4180-78-0x0000000011F60000-0x0000000012144000-memory.dmp
memory/4180-80-0x0000000011F60000-0x0000000012144000-memory.dmp
memory/4180-82-0x0000000011F60000-0x0000000012144000-memory.dmp
memory/4180-84-0x0000000011F60000-0x0000000012144000-memory.dmp
memory/4180-86-0x0000000011F60000-0x0000000012144000-memory.dmp
memory/4180-88-0x0000000011F60000-0x0000000012144000-memory.dmp
memory/4180-90-0x0000000011F60000-0x0000000012144000-memory.dmp
memory/4180-92-0x0000000011F60000-0x0000000012144000-memory.dmp
memory/4180-94-0x0000000011F60000-0x0000000012144000-memory.dmp
memory/4180-96-0x0000000011F60000-0x0000000012144000-memory.dmp
memory/4180-98-0x0000000011F60000-0x0000000012144000-memory.dmp
memory/4180-1196-0x0000000074730000-0x0000000074EE1000-memory.dmp
memory/4180-1197-0x000000006DCA0000-0x000000006DCD7000-memory.dmp