Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
29-05-2024 15:15
General
-
Target
Client.exe
-
Size
74KB
-
MD5
c9e368cb65ed6c541e29b52aeb4c2af4
-
SHA1
b2fe42b7ee53d11cc6cac3e6a99a92f72ff9cc01
-
SHA256
255569d7156794ac033567269a847e93acdfc95126dbad54af5b8909bba4c553
-
SHA512
10ad380013e2efa9f85110e97ebb1187c22fadc2b43f6633af65aedb3b9ffc0355695a70858eef8a6d819423778552f17ebaeeb19ba3b521da2584a9f1e74b81
-
SSDEEP
1536:2UvNwcxKHXwzCtmPMV2e9VdQuDI6H1bf/OSQzcqLVclN:2UvicxK8WmPMV2e9VdQsH1bffQbBY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
147.185.221.19:38173
uuhaiushdishajkdhwuasudh
-
delay
1
-
install
true
-
install_file
svhost.exe
-
install_folder
%AppData%
Signatures
-
Processes:
svhost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\consentpromptbehavioradmin = "0" svhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\enablelua = "0" svhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\promptonsecuredesktop = "0" svhost.exe -
Async RAT payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\svhost.exe family_asyncrat -
Executes dropped EXE 1 IoCs
Processes:
svhost.exepid process 2380 svhost.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
svhost.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\enablelua svhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\enablelua = "0" svhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4976 timeout.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
Client.exesvhost.exepid process 2932 Client.exe 2932 Client.exe 2932 Client.exe 2932 Client.exe 2932 Client.exe 2932 Client.exe 2932 Client.exe 2932 Client.exe 2932 Client.exe 2932 Client.exe 2932 Client.exe 2932 Client.exe 2932 Client.exe 2932 Client.exe 2932 Client.exe 2932 Client.exe 2932 Client.exe 2380 svhost.exe 2380 svhost.exe 2380 svhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Client.exesvhost.exedescription pid process Token: SeDebugPrivilege 2932 Client.exe Token: SeDebugPrivilege 2380 svhost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
svhost.exepid process 2380 svhost.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
Client.execmd.execmd.exedescription pid process target process PID 2932 wrote to memory of 3180 2932 Client.exe cmd.exe PID 2932 wrote to memory of 3180 2932 Client.exe cmd.exe PID 2932 wrote to memory of 864 2932 Client.exe cmd.exe PID 2932 wrote to memory of 864 2932 Client.exe cmd.exe PID 3180 wrote to memory of 3184 3180 cmd.exe schtasks.exe PID 3180 wrote to memory of 3184 3180 cmd.exe schtasks.exe PID 864 wrote to memory of 4976 864 cmd.exe timeout.exe PID 864 wrote to memory of 4976 864 cmd.exe timeout.exe PID 864 wrote to memory of 2380 864 cmd.exe svhost.exe PID 864 wrote to memory of 2380 864 cmd.exe svhost.exe -
System policy modification 1 TTPs 3 IoCs
Processes:
svhost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\consentpromptbehavioradmin = "0" svhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\enablelua = "0" svhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\promptonsecuredesktop = "0" svhost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svhost" /tr '"C:\Users\Admin\AppData\Roaming\svhost.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svhost" /tr '"C:\Users\Admin\AppData\Roaming\svhost.exe"'3⤵
- Creates scheduled task(s)
PID:3184
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp5890.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:4976
-
-
C:\Users\Admin\AppData\Roaming\svhost.exe"C:\Users\Admin\AppData\Roaming\svhost.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2380
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150B
MD5f7679c9b58154c966a608df236405355
SHA176a3f24a12b89481494b02b99b6cd05d6be8eb1b
SHA256d7b76fd191fc72fa80f622ca930aae8cde57cf73ac992e5c00e36b16a183cd3a
SHA512fcb026b890f121dade6115a11bd448c9678df02a8250845e52813e1d2dca2de0a47f1bc061ac531e31f1528148c86b1c887449cbf5c82d98cddac249dc72d443
-
Filesize
8B
MD5cf759e4c5f14fe3eec41b87ed756cea8
SHA1c27c796bb3c2fac929359563676f4ba1ffada1f5
SHA256c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761
SHA512c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b
-
Filesize
74KB
MD5c9e368cb65ed6c541e29b52aeb4c2af4
SHA1b2fe42b7ee53d11cc6cac3e6a99a92f72ff9cc01
SHA256255569d7156794ac033567269a847e93acdfc95126dbad54af5b8909bba4c553
SHA51210ad380013e2efa9f85110e97ebb1187c22fadc2b43f6633af65aedb3b9ffc0355695a70858eef8a6d819423778552f17ebaeeb19ba3b521da2584a9f1e74b81