Analysis
-
max time kernel
187s -
max time network
202s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
24-05-2024 19:25
Behavioral task
behavioral1
Sample
Client.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Client.exe
Resource
win10v2004-20240426-en
General
-
Target
Client.exe
-
Size
63KB
-
MD5
68a978592c6c5cc22da0b7dde87b2d44
-
SHA1
a0d7dd10bb29f769b68d6e7333dda1913b049250
-
SHA256
e13360fe12492ad8b6f72d8cbd0969cfab0003e9898d13afe1c5de7bbb143b1f
-
SHA512
b2a9963d7ddf8047a74d71aec720df1c3edec0dd0d17b7e6734addbe57b324bce103b322fdc174da979586f83856a75dc489d240e29114ff09d4ed50647054e5
-
SSDEEP
1536:QhB5LrUwk4XO01V5eeiIVrGbbXwUNeGODpqKmY7:QhB5LrUwk4XVVseXGbbX/NQgz
Malware Config
Extracted
asyncrat
5.0.5
Client
uk2.localto.net:3793
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall 2 TTPs 2 IoCs
Processes:
netsh.exenetsh.exepid process 1188 netsh.exe 2360 netsh.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 1432 sc.exe -
Collects information from the system 1 TTPs 1 IoCs
Uses WMIC.exe to find detailed system information.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1528 timeout.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exeNETSTAT.EXEpid process 3680 ipconfig.exe 4428 NETSTAT.EXE -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Client.exepid process 3468 Client.exe 3468 Client.exe 3468 Client.exe 3468 Client.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Client.exeWMIC.exeWMIC.exedescription pid process Token: SeDebugPrivilege 3468 Client.exe Token: SeIncreaseQuotaPrivilege 3936 WMIC.exe Token: SeSecurityPrivilege 3936 WMIC.exe Token: SeTakeOwnershipPrivilege 3936 WMIC.exe Token: SeLoadDriverPrivilege 3936 WMIC.exe Token: SeSystemProfilePrivilege 3936 WMIC.exe Token: SeSystemtimePrivilege 3936 WMIC.exe Token: SeProfSingleProcessPrivilege 3936 WMIC.exe Token: SeIncBasePriorityPrivilege 3936 WMIC.exe Token: SeCreatePagefilePrivilege 3936 WMIC.exe Token: SeBackupPrivilege 3936 WMIC.exe Token: SeRestorePrivilege 3936 WMIC.exe Token: SeShutdownPrivilege 3936 WMIC.exe Token: SeDebugPrivilege 3936 WMIC.exe Token: SeSystemEnvironmentPrivilege 3936 WMIC.exe Token: SeRemoteShutdownPrivilege 3936 WMIC.exe Token: SeUndockPrivilege 3936 WMIC.exe Token: SeManageVolumePrivilege 3936 WMIC.exe Token: 33 3936 WMIC.exe Token: 34 3936 WMIC.exe Token: 35 3936 WMIC.exe Token: 36 3936 WMIC.exe Token: SeIncreaseQuotaPrivilege 3936 WMIC.exe Token: SeSecurityPrivilege 3936 WMIC.exe Token: SeTakeOwnershipPrivilege 3936 WMIC.exe Token: SeLoadDriverPrivilege 3936 WMIC.exe Token: SeSystemProfilePrivilege 3936 WMIC.exe Token: SeSystemtimePrivilege 3936 WMIC.exe Token: SeProfSingleProcessPrivilege 3936 WMIC.exe Token: SeIncBasePriorityPrivilege 3936 WMIC.exe Token: SeCreatePagefilePrivilege 3936 WMIC.exe Token: SeBackupPrivilege 3936 WMIC.exe Token: SeRestorePrivilege 3936 WMIC.exe Token: SeShutdownPrivilege 3936 WMIC.exe Token: SeDebugPrivilege 3936 WMIC.exe Token: SeSystemEnvironmentPrivilege 3936 WMIC.exe Token: SeRemoteShutdownPrivilege 3936 WMIC.exe Token: SeUndockPrivilege 3936 WMIC.exe Token: SeManageVolumePrivilege 3936 WMIC.exe Token: 33 3936 WMIC.exe Token: 34 3936 WMIC.exe Token: 35 3936 WMIC.exe Token: 36 3936 WMIC.exe Token: SeIncreaseQuotaPrivilege 3320 WMIC.exe Token: SeSecurityPrivilege 3320 WMIC.exe Token: SeTakeOwnershipPrivilege 3320 WMIC.exe Token: SeLoadDriverPrivilege 3320 WMIC.exe Token: SeSystemProfilePrivilege 3320 WMIC.exe Token: SeSystemtimePrivilege 3320 WMIC.exe Token: SeProfSingleProcessPrivilege 3320 WMIC.exe Token: SeIncBasePriorityPrivilege 3320 WMIC.exe Token: SeCreatePagefilePrivilege 3320 WMIC.exe Token: SeBackupPrivilege 3320 WMIC.exe Token: SeRestorePrivilege 3320 WMIC.exe Token: SeShutdownPrivilege 3320 WMIC.exe Token: SeDebugPrivilege 3320 WMIC.exe Token: SeSystemEnvironmentPrivilege 3320 WMIC.exe Token: SeRemoteShutdownPrivilege 3320 WMIC.exe Token: SeUndockPrivilege 3320 WMIC.exe Token: SeManageVolumePrivilege 3320 WMIC.exe Token: 33 3320 WMIC.exe Token: 34 3320 WMIC.exe Token: 35 3320 WMIC.exe Token: 36 3320 WMIC.exe -
Suspicious use of WriteProcessMemory 56 IoCs
Processes:
Client.execmd.exenet.exequery.exenet.exenet.exenet.exenet.execmd.exedescription pid process target process PID 3468 wrote to memory of 2560 3468 Client.exe cmd.exe PID 3468 wrote to memory of 2560 3468 Client.exe cmd.exe PID 3468 wrote to memory of 4236 3468 Client.exe cmd.exe PID 3468 wrote to memory of 4236 3468 Client.exe cmd.exe PID 4236 wrote to memory of 3776 4236 cmd.exe systeminfo.exe PID 4236 wrote to memory of 3776 4236 cmd.exe systeminfo.exe PID 4236 wrote to memory of 4968 4236 cmd.exe HOSTNAME.EXE PID 4236 wrote to memory of 4968 4236 cmd.exe HOSTNAME.EXE PID 4236 wrote to memory of 3936 4236 cmd.exe WMIC.exe PID 4236 wrote to memory of 3936 4236 cmd.exe WMIC.exe PID 4236 wrote to memory of 4576 4236 cmd.exe net.exe PID 4236 wrote to memory of 4576 4236 cmd.exe net.exe PID 4576 wrote to memory of 4040 4576 net.exe net1.exe PID 4576 wrote to memory of 4040 4576 net.exe net1.exe PID 4236 wrote to memory of 3884 4236 cmd.exe query.exe PID 4236 wrote to memory of 3884 4236 cmd.exe query.exe PID 3884 wrote to memory of 3552 3884 query.exe quser.exe PID 3884 wrote to memory of 3552 3884 query.exe quser.exe PID 4236 wrote to memory of 2388 4236 cmd.exe net.exe PID 4236 wrote to memory of 2388 4236 cmd.exe net.exe PID 2388 wrote to memory of 3368 2388 net.exe net1.exe PID 2388 wrote to memory of 3368 2388 net.exe net1.exe PID 4236 wrote to memory of 2680 4236 cmd.exe net.exe PID 4236 wrote to memory of 2680 4236 cmd.exe net.exe PID 2680 wrote to memory of 2184 2680 net.exe net1.exe PID 2680 wrote to memory of 2184 2680 net.exe net1.exe PID 4236 wrote to memory of 404 4236 cmd.exe net.exe PID 4236 wrote to memory of 404 4236 cmd.exe net.exe PID 404 wrote to memory of 1916 404 net.exe net1.exe PID 404 wrote to memory of 1916 404 net.exe net1.exe PID 4236 wrote to memory of 748 4236 cmd.exe net.exe PID 4236 wrote to memory of 748 4236 cmd.exe net.exe PID 748 wrote to memory of 5020 748 net.exe net1.exe PID 748 wrote to memory of 5020 748 net.exe net1.exe PID 4236 wrote to memory of 3320 4236 cmd.exe WMIC.exe PID 4236 wrote to memory of 3320 4236 cmd.exe WMIC.exe PID 4236 wrote to memory of 5004 4236 cmd.exe tasklist.exe PID 4236 wrote to memory of 5004 4236 cmd.exe tasklist.exe PID 4236 wrote to memory of 3680 4236 cmd.exe ipconfig.exe PID 4236 wrote to memory of 3680 4236 cmd.exe ipconfig.exe PID 4236 wrote to memory of 2656 4236 cmd.exe ROUTE.EXE PID 4236 wrote to memory of 2656 4236 cmd.exe ROUTE.EXE PID 4236 wrote to memory of 2688 4236 cmd.exe ARP.EXE PID 4236 wrote to memory of 2688 4236 cmd.exe ARP.EXE PID 4236 wrote to memory of 4428 4236 cmd.exe NETSTAT.EXE PID 4236 wrote to memory of 4428 4236 cmd.exe NETSTAT.EXE PID 4236 wrote to memory of 1432 4236 cmd.exe sc.exe PID 4236 wrote to memory of 1432 4236 cmd.exe sc.exe PID 4236 wrote to memory of 1188 4236 cmd.exe netsh.exe PID 4236 wrote to memory of 1188 4236 cmd.exe netsh.exe PID 4236 wrote to memory of 2360 4236 cmd.exe netsh.exe PID 4236 wrote to memory of 2360 4236 cmd.exe netsh.exe PID 3468 wrote to memory of 2344 3468 Client.exe cmd.exe PID 3468 wrote to memory of 2344 3468 Client.exe cmd.exe PID 2344 wrote to memory of 1528 2344 cmd.exe timeout.exe PID 2344 wrote to memory of 1528 2344 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\SYSTEM32\cmd.exe"cmd"2⤵PID:2560
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\system32\systeminfo.exesysteminfo3⤵
- Gathers system information
PID:3776 -
C:\Windows\system32\HOSTNAME.EXEhostname3⤵PID:4968
-
C:\Windows\System32\Wbem\WMIC.exewmic logicaldisk get caption,description,providername3⤵
- Collects information from the system
- Suspicious use of AdjustPrivilegeToken
PID:3936 -
C:\Windows\system32\net.exenet user3⤵
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user4⤵PID:4040
-
C:\Windows\system32\query.exequery user3⤵
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\system32\quser.exe"C:\Windows\system32\quser.exe"4⤵PID:3552
-
C:\Windows\system32\net.exenet localgroup3⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup4⤵PID:3368
-
C:\Windows\system32\net.exenet localgroup administrators3⤵
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup administrators4⤵PID:2184
-
C:\Windows\system32\net.exenet user guest3⤵
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user guest4⤵PID:1916
-
C:\Windows\system32\net.exenet user administrator3⤵
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user administrator4⤵PID:5020
-
C:\Windows\System32\Wbem\WMIC.exewmic startup get caption,command3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3320 -
C:\Windows\system32\tasklist.exetasklist /svc3⤵
- Enumerates processes with tasklist
PID:5004 -
C:\Windows\system32\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:3680 -
C:\Windows\system32\ROUTE.EXEroute print3⤵PID:2656
-
C:\Windows\system32\ARP.EXEarp -a3⤵PID:2688
-
C:\Windows\system32\NETSTAT.EXEnetstat -ano3⤵
- Gathers network information
PID:4428 -
C:\Windows\system32\sc.exesc query type= service state= all3⤵
- Launches sc.exe
PID:1432 -
C:\Windows\system32\netsh.exenetsh firewall show state3⤵
- Modifies Windows Firewall
PID:1188 -
C:\Windows\system32\netsh.exenetsh firewall show config3⤵
- Modifies Windows Firewall
PID:2360 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp3C20.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:1528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp3C20.tmp.batFilesize
158B
MD5d3aa54ce507f6fccf97d8993a4933dad
SHA138ecdedf3f188c40fb4896418176699dcd0784db
SHA2563b0d0d89ac3d0225248c866fbbee48c150cffff558fa5f7b3fee7bfa40b18afa
SHA512d189b4bf06f99a3e19a3a4e06ea27c00d691695d1dcd0664ba90dfbd83596673c694daa1eeb6c15ba80deeacebd7a95add7432d965246a403d40357397944b57
-
\??\PIPE\lsarpcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/3468-10-0x000000001D470000-0x000000001D48C000-memory.dmpFilesize
112KB
-
memory/3468-11-0x000000001D4B0000-0x000000001D4CE000-memory.dmpFilesize
120KB
-
memory/3468-6-0x00007FFA51183000-0x00007FFA51185000-memory.dmpFilesize
8KB
-
memory/3468-7-0x00007FFA51180000-0x00007FFA51C42000-memory.dmpFilesize
10.8MB
-
memory/3468-8-0x00007FFA51180000-0x00007FFA51C42000-memory.dmpFilesize
10.8MB
-
memory/3468-9-0x000000001D4F0000-0x000000001D566000-memory.dmpFilesize
472KB
-
memory/3468-0-0x00007FFA51183000-0x00007FFA51185000-memory.dmpFilesize
8KB
-
memory/3468-3-0x00007FFA51180000-0x00007FFA51C42000-memory.dmpFilesize
10.8MB
-
memory/3468-12-0x0000000000F60000-0x0000000000F70000-memory.dmpFilesize
64KB
-
memory/3468-13-0x0000000000F90000-0x0000000000FA0000-memory.dmpFilesize
64KB
-
memory/3468-14-0x0000000000FA0000-0x0000000000FAE000-memory.dmpFilesize
56KB
-
memory/3468-2-0x00007FFA51180000-0x00007FFA51C42000-memory.dmpFilesize
10.8MB
-
memory/3468-17-0x0000000000FB0000-0x0000000001014000-memory.dmpFilesize
400KB
-
memory/3468-1-0x0000000000790000-0x00000000007A6000-memory.dmpFilesize
88KB
-
memory/3468-22-0x00007FFA51180000-0x00007FFA51C42000-memory.dmpFilesize
10.8MB