Analysis
-
max time kernel
1531s -
max time network
1516s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
19-04-2024 20:32
Behavioral task
behavioral1
Sample
C11Bootstrapper/Properties/C11Setup.exe
Resource
win11-20240412-en
Behavioral task
behavioral2
Sample
C11Bootstrapper/Properties/GuiLoader.exe
Resource
win11-20240412-en
Behavioral task
behavioral3
Sample
C11Bootstrapper/Properties/IndependenciesInstallation.bat
Resource
win11-20240412-en
Behavioral task
behavioral4
Sample
C11Bootstrapper/Properties/PageEditor.exe
Resource
win11-20240412-en
Behavioral task
behavioral5
Sample
C11Bootstrapper/Properties/msgbox.vbs
Resource
win11-20240412-en
General
-
Target
C11Bootstrapper/Properties/PageEditor.exe
-
Size
74KB
-
MD5
442510aa0ce41f62d8c30c76a1d1f96f
-
SHA1
9d5dec9eba0d5d32750b9c891ce4697893883a1e
-
SHA256
27f935d3417a40c871572f8bdfe5168b8caa1dc603dd6d4cf466d2a943a73083
-
SHA512
25f20691094c9c0d5fd868a04451039407c442d05e8c43659465fe36d24ba618d1912296f57ce3ae64a168e03809716c2d95376a90acf561c12035254efb2d62
-
SSDEEP
1536:jU9kcx5v/5CxSPMV7jCBevPIaH1b8/vuytQzc51VclN:jU2cx5vx2SPMV3CCrH1b83uAQsXY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
127.0.0.1:4449
127.0.0.1:6555
127.0.0.1:0
127.0.0.1:4040
dowbwdoafxuykiui
-
delay
1
-
install
true
-
install_file
PageEditor.exe
-
install_folder
%Temp%
Signatures
-
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeDebugPrivilege 3412 PageEditor.exe Token: SeIncreaseQuotaPrivilege 3412 PageEditor.exe Token: SeSecurityPrivilege 3412 PageEditor.exe Token: SeTakeOwnershipPrivilege 3412 PageEditor.exe Token: SeLoadDriverPrivilege 3412 PageEditor.exe Token: SeSystemProfilePrivilege 3412 PageEditor.exe Token: SeSystemtimePrivilege 3412 PageEditor.exe Token: SeProfSingleProcessPrivilege 3412 PageEditor.exe Token: SeIncBasePriorityPrivilege 3412 PageEditor.exe Token: SeCreatePagefilePrivilege 3412 PageEditor.exe Token: SeBackupPrivilege 3412 PageEditor.exe Token: SeRestorePrivilege 3412 PageEditor.exe Token: SeShutdownPrivilege 3412 PageEditor.exe Token: SeDebugPrivilege 3412 PageEditor.exe Token: SeSystemEnvironmentPrivilege 3412 PageEditor.exe Token: SeRemoteShutdownPrivilege 3412 PageEditor.exe Token: SeUndockPrivilege 3412 PageEditor.exe Token: SeManageVolumePrivilege 3412 PageEditor.exe Token: 33 3412 PageEditor.exe Token: 34 3412 PageEditor.exe Token: 35 3412 PageEditor.exe Token: 36 3412 PageEditor.exe Token: SeIncreaseQuotaPrivilege 3412 PageEditor.exe Token: SeSecurityPrivilege 3412 PageEditor.exe Token: SeTakeOwnershipPrivilege 3412 PageEditor.exe Token: SeLoadDriverPrivilege 3412 PageEditor.exe Token: SeSystemProfilePrivilege 3412 PageEditor.exe Token: SeSystemtimePrivilege 3412 PageEditor.exe Token: SeProfSingleProcessPrivilege 3412 PageEditor.exe Token: SeIncBasePriorityPrivilege 3412 PageEditor.exe Token: SeCreatePagefilePrivilege 3412 PageEditor.exe Token: SeBackupPrivilege 3412 PageEditor.exe Token: SeRestorePrivilege 3412 PageEditor.exe Token: SeShutdownPrivilege 3412 PageEditor.exe Token: SeDebugPrivilege 3412 PageEditor.exe Token: SeSystemEnvironmentPrivilege 3412 PageEditor.exe Token: SeRemoteShutdownPrivilege 3412 PageEditor.exe Token: SeUndockPrivilege 3412 PageEditor.exe Token: SeManageVolumePrivilege 3412 PageEditor.exe Token: 33 3412 PageEditor.exe Token: 34 3412 PageEditor.exe Token: 35 3412 PageEditor.exe Token: 36 3412 PageEditor.exe