Overview
overview
10Static
static
10Venom Imag...config
windows7-x64
3Venom Imag...config
windows10-2004-x64
3Venom Imag...om.exe
windows7-x64
10Venom Imag...om.exe
windows10-2004-x64
10Venom Imag...in.exe
windows7-x64
7Venom Imag...in.exe
windows10-2004-x64
7Venom Imag...fig.py
windows7-x64
3Venom Imag...fig.py
windows10-2004-x64
3Analysis
-
max time kernel
25s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
07-04-2024 06:46
Behavioral task
behavioral1
Sample
Venom Image Logger v3.1/Venom-main/.editorconfig
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
Venom Image Logger v3.1/Venom-main/.editorconfig
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Venom Image Logger v3.1/Venom-main/Venom.exe
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
Venom Image Logger v3.1/Venom-main/Venom.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Venom Image Logger v3.1/Venom-main/dist/main.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Venom Image Logger v3.1/Venom-main/dist/main.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
Venom Image Logger v3.1/Venom-main/src/config.py
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
Venom Image Logger v3.1/Venom-main/src/config.py
Resource
win10v2004-20240226-en
General
-
Target
Venom Image Logger v3.1/Venom-main/Venom.exe
-
Size
17.8MB
-
MD5
184d5385057d79ef13d899df4bd19a77
-
SHA1
fb5d34444109e9c7a6c87b7361f4a05fa9fb7643
-
SHA256
a6ca738e8be3671c8bd98a967c997e9f14c2fc35a148ecaecb4a3ffb89b895b9
-
SHA512
36cd4c45e9e5679cb38be18c8556bac30f53a9b50c75147379a58daaded41d93b3511cba77d89d2f10a31ece448268c29e223ab36ff2220fd29944f09bd866e6
-
SSDEEP
393216:EqPnLFXlrSQ8DOETgsvfGFngYGvEt9T7Gq:lPLFXNSQhEE7f/7
Malware Config
Extracted
discordrat
-
discord_token
MTIxODU0OTg5NjI3ODE3OTg0MA.Gth7Ad._9yVHP6c6O1_Ou788tvd-6Y6nGBkJoenuGkkls
-
server_id
1218545788821438475
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Executes dropped EXE 4 IoCs
pid Process 2352 Commet Image Logger.exe 3012 main.exe 2704 blx image logger.exe 2152 main.exe -
Loads dropped DLL 12 IoCs
pid Process 2172 Venom.exe 2352 Commet Image Logger.exe 2352 Commet Image Logger.exe 3012 main.exe 2152 main.exe 2764 WerFault.exe 2764 WerFault.exe 2764 WerFault.exe 2764 WerFault.exe 2764 WerFault.exe 1196 Process not Found 1196 Process not Found -
resource yara_rule behavioral3/files/0x0005000000019608-141.dat upx behavioral3/memory/2152-144-0x000007FEF4430000-0x000007FEF489E000-memory.dmp upx -
Detects Pyinstaller 2 IoCs
resource yara_rule behavioral3/files/0x000c00000001225d-5.dat pyinstaller behavioral3/files/0x000b000000013417-13.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2352 2172 Venom.exe 28 PID 2172 wrote to memory of 2352 2172 Venom.exe 28 PID 2172 wrote to memory of 2352 2172 Venom.exe 28 PID 2172 wrote to memory of 2352 2172 Venom.exe 28 PID 2352 wrote to memory of 3012 2352 Commet Image Logger.exe 29 PID 2352 wrote to memory of 3012 2352 Commet Image Logger.exe 29 PID 2352 wrote to memory of 3012 2352 Commet Image Logger.exe 29 PID 2352 wrote to memory of 3012 2352 Commet Image Logger.exe 29 PID 2352 wrote to memory of 2704 2352 Commet Image Logger.exe 30 PID 2352 wrote to memory of 2704 2352 Commet Image Logger.exe 30 PID 2352 wrote to memory of 2704 2352 Commet Image Logger.exe 30 PID 2352 wrote to memory of 2704 2352 Commet Image Logger.exe 30 PID 3012 wrote to memory of 2152 3012 main.exe 31 PID 3012 wrote to memory of 2152 3012 main.exe 31 PID 3012 wrote to memory of 2152 3012 main.exe 31 PID 2704 wrote to memory of 2764 2704 blx image logger.exe 32 PID 2704 wrote to memory of 2764 2704 blx image logger.exe 32 PID 2704 wrote to memory of 2764 2704 blx image logger.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\Venom Image Logger v3.1\Venom-main\Venom.exe"C:\Users\Admin\AppData\Local\Temp\Venom Image Logger v3.1\Venom-main\Venom.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Roaming\Commet Image Logger.exe"C:\Users\Admin\AppData\Roaming\Commet Image Logger.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Roaming\main.exe"C:\Users\Admin\AppData\Roaming\main.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Roaming\main.exe"C:\Users\Admin\AppData\Roaming\main.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2152
-
-
-
C:\Users\Admin\AppData\Roaming\blx image logger.exe"C:\Users\Admin\AppData\Roaming\blx image logger.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2704 -s 6004⤵
- Loads dropped DLL
PID:2764
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD569d4f13fbaeee9b551c2d9a4a94d4458
SHA169540d8dfc0ee299a7ff6585018c7db0662aa629
SHA256801317463bd116e603878c7c106093ba7db2bece11e691793e93065223fc7046
SHA5128e632f141daf44bc470f8ee677c6f0fdcbcacbfce1472d928576bf7b9f91d6b76639d18e386d5e1c97e538a8fe19dd2d22ea47ae1acf138a0925e3c6dd156378
-
Filesize
17.8MB
MD5a0cd7e9738e86dfa8084757a01668cc9
SHA1541dfc75737dfe4cd9bfae07636df85ce57692a1
SHA2561a4bbdad996cc7e3e62c2376a82e2a1a87a5cafffff8bb3941b80dacf1f8d4bf
SHA512bbef170dc8b6dd8b710372cc980977b9cb1c57fd4e6135d042636b66636ef119343b5ece189e5aaf6f47b43a111eabf753c65d148bbd51e7ad74e614e098ae77
-
Filesize
78KB
MD5d371e3e18e5f67fcd5048836ba77a591
SHA1534ad06b58738e96fd63a807104943dcced838e1
SHA25656fbafc5f45eaa548a93ceb7a0a07f479ff1b93077a9922a42fef5707886cc58
SHA512cca449737b33479588a0e51af3f0c685c3582cba33bd4f91da3d7ace4176147edf94cd5ab43cec6c9b3c81338081a6bc7548ab64df394867754aa73f0ee1c4ee
-
Filesize
17.7MB
MD5230758495042a4a9fa8babf332440386
SHA13eeb7dd97b2369803ac7badebc9a88698850bebc
SHA256ef5024e4f0920bd936c3e2a9fae11ddde4cef76e646831a98e1a5281c45f30bd
SHA5124cd1c6f60a293a57bfe8ca900cd8152359e73691e1b10a08d5fd9a8312bac1eb401828d8ccfee50f6b41d2bed4c563c35b1d6d3dfdfdde9b4f6b4e135954c34c