Analysis
-
max time kernel
79s -
max time network
87s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
31-05-2024 00:59
Behavioral task
behavioral1
Sample
Client.exe
Resource
win10v2004-20240508-en
Errors
General
-
Target
Client.exe
-
Size
63KB
-
MD5
37b8d84468f1ca2c57ed419be256476e
-
SHA1
8807c4d29a45acb69cd8851d07ed2eae3ef8a5a8
-
SHA256
9261f0bf10627dbe394d65266b9dd6d3150bbfdc83b279739a74f20979a4d4d7
-
SHA512
2fc7446fa7d9c3416c5818ba3eab72ed5d71ac2052a4227287531290bfa6c488da3674e9cca8584eea3fcfd67fc47094e231992eda6c9a9a67da5497d7e54a50
-
SSDEEP
1536:AhIBLTM3Ufc0cMdmeeiIVrGbbXwcwzWGGDpqKmY7:AhIBLTM3Ufc6d/eXGbbXkQgz
Malware Config
Extracted
asyncrat
5.0.5
Venom Clients
index-hon.gl.at.ply.gg:4610
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Client.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 15 IoCs
Processes:
LogonUI.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "95" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Client.exeshutdown.exedescription pid process Token: SeDebugPrivilege 4496 Client.exe Token: SeShutdownPrivilege 2856 shutdown.exe Token: SeRemoteShutdownPrivilege 2856 shutdown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
LogonUI.exepid process 964 LogonUI.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
Client.execmd.exedescription pid process target process PID 4496 wrote to memory of 1984 4496 Client.exe cmd.exe PID 4496 wrote to memory of 1984 4496 Client.exe cmd.exe PID 1984 wrote to memory of 2856 1984 cmd.exe shutdown.exe PID 1984 wrote to memory of 2856 1984 cmd.exe shutdown.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c Shutdown /s /f /t 002⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\system32\shutdown.exeShutdown /s /f /t 003⤵
- Suspicious use of AdjustPrivilegeToken
PID:2856
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa390c855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:964