Overview
overview
10Static
static
10Venom Imag...config
windows7-x64
3Venom Imag...config
windows10-2004-x64
3Venom Imag...om.exe
windows7-x64
10Venom Imag...om.exe
windows10-2004-x64
10Venom Imag...in.exe
windows7-x64
7Venom Imag...in.exe
windows10-2004-x64
7Venom Imag...fig.py
windows7-x64
3Venom Imag...fig.py
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-04-2024 06:46
Behavioral task
behavioral1
Sample
Venom Image Logger v3.1/Venom-main/.editorconfig
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
Venom Image Logger v3.1/Venom-main/.editorconfig
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Venom Image Logger v3.1/Venom-main/Venom.exe
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
Venom Image Logger v3.1/Venom-main/Venom.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Venom Image Logger v3.1/Venom-main/dist/main.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Venom Image Logger v3.1/Venom-main/dist/main.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
Venom Image Logger v3.1/Venom-main/src/config.py
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
Venom Image Logger v3.1/Venom-main/src/config.py
Resource
win10v2004-20240226-en
General
-
Target
Venom Image Logger v3.1/Venom-main/dist/main.exe
-
Size
17.7MB
-
MD5
230758495042a4a9fa8babf332440386
-
SHA1
3eeb7dd97b2369803ac7badebc9a88698850bebc
-
SHA256
ef5024e4f0920bd936c3e2a9fae11ddde4cef76e646831a98e1a5281c45f30bd
-
SHA512
4cd1c6f60a293a57bfe8ca900cd8152359e73691e1b10a08d5fd9a8312bac1eb401828d8ccfee50f6b41d2bed4c563c35b1d6d3dfdfdde9b4f6b4e135954c34c
-
SSDEEP
393216:iqPnLFXlrSQ8DOETgsvfGFngYGvEt9T7Gq:nPLFXNSQhEE7f/7
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1160 main.exe -
resource yara_rule behavioral5/files/0x000500000001959c-111.dat upx behavioral5/memory/1160-113-0x000007FEF6500000-0x000007FEF696E000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2696 wrote to memory of 1160 2696 main.exe 28 PID 2696 wrote to memory of 1160 2696 main.exe 28 PID 2696 wrote to memory of 1160 2696 main.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Venom Image Logger v3.1\Venom-main\dist\main.exe"C:\Users\Admin\AppData\Local\Temp\Venom Image Logger v3.1\Venom-main\dist\main.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\Venom Image Logger v3.1\Venom-main\dist\main.exe"C:\Users\Admin\AppData\Local\Temp\Venom Image Logger v3.1\Venom-main\dist\main.exe"2⤵
- Loads dropped DLL
PID:1160
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD569d4f13fbaeee9b551c2d9a4a94d4458
SHA169540d8dfc0ee299a7ff6585018c7db0662aa629
SHA256801317463bd116e603878c7c106093ba7db2bece11e691793e93065223fc7046
SHA5128e632f141daf44bc470f8ee677c6f0fdcbcacbfce1472d928576bf7b9f91d6b76639d18e386d5e1c97e538a8fe19dd2d22ea47ae1acf138a0925e3c6dd156378