Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 12:29
Behavioral task
behavioral1
Sample
fd55ca4d01f8d4ed70e0fa3e3cbac24d.exe
Resource
win7-20240221-en
General
-
Target
fd55ca4d01f8d4ed70e0fa3e3cbac24d.exe
-
Size
73KB
-
MD5
fd55ca4d01f8d4ed70e0fa3e3cbac24d
-
SHA1
79045e88da157d53a541d831ad65909d99c0ccbe
-
SHA256
5da346ba54f3af86096bb94eb0de7704011122cdeeb02380c586c8701407c2a9
-
SHA512
3513943f8bd2b2b41db2e3a498e378fd7cc6f6a9657f790b5158a9ada050d29336092b8f110bedbb46566155b0efee7bb0ae7dc4d96dc720fd75e5b47d615a6b
-
SSDEEP
1536:2SUEkcxNYungvHZDJ/SkXizIqksbLvPMwSDHZYI3XpRdYuH1bVbwLm2C6wzU8bVS:2SUxcxNYungPZDJ/SkXizIqks/vPMw4m
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.2
Default
80.76.49.162:4545
mttbjzderapvylgmlbs
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 34 IoCs
Processes:
fd55ca4d01f8d4ed70e0fa3e3cbac24d.exepid process 2452 fd55ca4d01f8d4ed70e0fa3e3cbac24d.exe 2452 fd55ca4d01f8d4ed70e0fa3e3cbac24d.exe 2452 fd55ca4d01f8d4ed70e0fa3e3cbac24d.exe 2452 fd55ca4d01f8d4ed70e0fa3e3cbac24d.exe 2452 fd55ca4d01f8d4ed70e0fa3e3cbac24d.exe 2452 fd55ca4d01f8d4ed70e0fa3e3cbac24d.exe 2452 fd55ca4d01f8d4ed70e0fa3e3cbac24d.exe 2452 fd55ca4d01f8d4ed70e0fa3e3cbac24d.exe 2452 fd55ca4d01f8d4ed70e0fa3e3cbac24d.exe 2452 fd55ca4d01f8d4ed70e0fa3e3cbac24d.exe 2452 fd55ca4d01f8d4ed70e0fa3e3cbac24d.exe 2452 fd55ca4d01f8d4ed70e0fa3e3cbac24d.exe 2452 fd55ca4d01f8d4ed70e0fa3e3cbac24d.exe 2452 fd55ca4d01f8d4ed70e0fa3e3cbac24d.exe 2452 fd55ca4d01f8d4ed70e0fa3e3cbac24d.exe 2452 fd55ca4d01f8d4ed70e0fa3e3cbac24d.exe 2452 fd55ca4d01f8d4ed70e0fa3e3cbac24d.exe 2452 fd55ca4d01f8d4ed70e0fa3e3cbac24d.exe 2452 fd55ca4d01f8d4ed70e0fa3e3cbac24d.exe 2452 fd55ca4d01f8d4ed70e0fa3e3cbac24d.exe 2452 fd55ca4d01f8d4ed70e0fa3e3cbac24d.exe 2452 fd55ca4d01f8d4ed70e0fa3e3cbac24d.exe 2452 fd55ca4d01f8d4ed70e0fa3e3cbac24d.exe 2452 fd55ca4d01f8d4ed70e0fa3e3cbac24d.exe 2452 fd55ca4d01f8d4ed70e0fa3e3cbac24d.exe 2452 fd55ca4d01f8d4ed70e0fa3e3cbac24d.exe 2452 fd55ca4d01f8d4ed70e0fa3e3cbac24d.exe 2452 fd55ca4d01f8d4ed70e0fa3e3cbac24d.exe 2452 fd55ca4d01f8d4ed70e0fa3e3cbac24d.exe 2452 fd55ca4d01f8d4ed70e0fa3e3cbac24d.exe 2452 fd55ca4d01f8d4ed70e0fa3e3cbac24d.exe 2452 fd55ca4d01f8d4ed70e0fa3e3cbac24d.exe 2452 fd55ca4d01f8d4ed70e0fa3e3cbac24d.exe 2452 fd55ca4d01f8d4ed70e0fa3e3cbac24d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
fd55ca4d01f8d4ed70e0fa3e3cbac24d.exedescription pid process Token: SeDebugPrivilege 2452 fd55ca4d01f8d4ed70e0fa3e3cbac24d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
fd55ca4d01f8d4ed70e0fa3e3cbac24d.exepid process 2452 fd55ca4d01f8d4ed70e0fa3e3cbac24d.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a