Overview
overview
10Static
static
10Venom-Rat-...0.html
windows7-x64
1Venom-Rat-...0.html
windows10-2004-x64
1Venom-Rat-...0.html
windows7-x64
1Venom-Rat-...0.html
windows10-2004-x64
1Venom-Rat-...il.dll
windows7-x64
1Venom-Rat-...il.dll
windows10-2004-x64
1Venom-Rat-...at.dll
windows7-x64
1Venom-Rat-...at.dll
windows10-2004-x64
1Venom-Rat-...me.dll
windows7-x64
1Venom-Rat-...me.dll
windows10-2004-x64
1Venom-Rat-...ed.exe
windows7-x64
8Venom-Rat-...ed.exe
windows10-2004-x64
8Majid Z Hacker.exe
windows7-x64
8Majid Z Hacker.exe
windows10-2004-x64
8Majid Z Hacker.exe
windows7-x64
10Majid Z Hacker.exe
windows10-2004-x64
10Windows Program.exe
windows7-x64
7Windows Program.exe
windows10-2004-x64
7script.vbs
windows7-x64
10script.vbs
windows10-2004-x64
10windows registry.exe
windows7-x64
10windows registry.exe
windows10-2004-x64
10firewall.exe
windows7-x64
8firewall.exe
windows10-2004-x64
Venom Cracked.exe
windows7-x64
1Venom Cracked.exe
windows10-2004-x64
1Venom-Rat-...er.exe
windows7-x64
1Venom-Rat-...er.exe
windows10-2004-x64
1Venom-Rat-...ed.exe
windows7-x64
10Venom-Rat-...ed.exe
windows10-2004-x64
10Majid Z Ha...te.exe
windows7-x64
10Majid Z Ha...te.exe
windows10-2004-x64
10Analysis
-
max time kernel
80s -
max time network
80s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31-05-2024 12:30
Behavioral task
behavioral1
Sample
Venom-Rat-Cracked--main/Clients/Morpheus@DESKTOP-ALON1A1_367DDFD/Logs/10-31-2020.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Venom-Rat-Cracked--main/Clients/Morpheus@DESKTOP-ALON1A1_367DDFD/Logs/10-31-2020.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Venom-Rat-Cracked--main/Clients/Sam@DESKTOP-1HP3JNB_440CF1F/Logs/05-17-2020.html
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Venom-Rat-Cracked--main/Clients/Sam@DESKTOP-1HP3JNB_440CF1F/Logs/05-17-2020.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
Venom-Rat-Cracked--main/Mono.Cecil.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Venom-Rat-Cracked--main/Mono.Cecil.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
Venom-Rat-Cracked--main/Mono.Nat.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Venom-Rat-Cracked--main/Mono.Nat.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
Venom-Rat-Cracked--main/VelyseTheme.dll
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
Venom-Rat-Cracked--main/VelyseTheme.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
Venom-Rat-Cracked--main/Venom Activated Cracked.exe
Resource
win7-20240215-en
Behavioral task
behavioral12
Sample
Venom-Rat-Cracked--main/Venom Activated Cracked.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
Majid Z Hacker.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
Majid Z Hacker.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
Majid Z Hacker.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
Majid Z Hacker.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
Windows Program.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
Windows Program.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
script.vbs
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
script.vbs
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
windows registry.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
windows registry.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
firewall.exe
Resource
win7-20240419-en
Behavioral task
behavioral24
Sample
firewall.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
Venom Cracked.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
Venom Cracked.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral27
Sample
Venom-Rat-Cracked--main/Venom Binder.exe
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
Venom-Rat-Cracked--main/Venom Binder.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
Venom-Rat-Cracked--main/Venom Software RAT Activated Cracked.exe
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
Venom-Rat-Cracked--main/Venom Software RAT Activated Cracked.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral31
Sample
Majid Z Hacker Website.exe
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
Majid Z Hacker Website.exe
Resource
win10v2004-20240508-en
Errors
General
-
Target
firewall.exe
-
Size
40KB
-
MD5
085242fc50844dc41d1966e620d3e121
-
SHA1
5e9a343256313938468d5d4fb92e39c5ef6f8c91
-
SHA256
180b8e0169f2c89d3b4f34d3ee5b26f5578211068be74cf9c2fd194d8cda9b3d
-
SHA512
3341c74802aa98ce2bd7b15d2921d3082110c62ee6d82df784cb610c1594d905c82c6ae79cf43d76f98db7a8a4951686898ba1dddeb9615fca6480ac6bb7887b
-
SSDEEP
768:6LY4BORYOvIqY4EoURZW/CtjZ7wPda7+WoSKD4+:6qIfoU/W/Ctt7w1mo
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 2612 netsh.exe -
Drops startup file 2 IoCs
Processes:
firewall.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe firewall.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe firewall.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
firewall.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe -
Drops autorun.inf file 1 TTPs 8 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
firewall.exedescription ioc process File opened for modification C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File created C:\Users\Admin\Documents\OneNote Notebooks\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\OneNote Notebooks\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Pictures\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Pictures\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
firewall.exepid process 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe 5800 firewall.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
firewall.exedescription pid process Token: SeDebugPrivilege 5800 firewall.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
firewall.exedescription pid process target process PID 5800 wrote to memory of 2612 5800 firewall.exe netsh.exe PID 5800 wrote to memory of 2612 5800 firewall.exe netsh.exe PID 5800 wrote to memory of 2612 5800 firewall.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\firewall.exe"C:\Users\Admin\AppData\Local\Temp\firewall.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops autorun.inf file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exe"netsh.exe" firewall set opmode disable2⤵
- Modifies Windows Firewall
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Music\firewall.exeFilesize
40KB
MD5085242fc50844dc41d1966e620d3e121
SHA15e9a343256313938468d5d4fb92e39c5ef6f8c91
SHA256180b8e0169f2c89d3b4f34d3ee5b26f5578211068be74cf9c2fd194d8cda9b3d
SHA5123341c74802aa98ce2bd7b15d2921d3082110c62ee6d82df784cb610c1594d905c82c6ae79cf43d76f98db7a8a4951686898ba1dddeb9615fca6480ac6bb7887b
-
memory/5800-0-0x00000000752C2000-0x00000000752C3000-memory.dmpFilesize
4KB
-
memory/5800-1-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-2-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-26-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-27-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-28-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-29-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-30-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-31-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-32-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-33-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-34-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-35-0x00000000752C2000-0x00000000752C3000-memory.dmpFilesize
4KB
-
memory/5800-36-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-37-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-38-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-39-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-40-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-42-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-41-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-43-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-44-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-46-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-45-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-47-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-48-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-49-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-50-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-51-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-52-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-54-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-53-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-55-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-56-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-58-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-57-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-59-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-60-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-62-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-61-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-63-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-64-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-66-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-65-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-67-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-68-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-70-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-69-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-72-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-71-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-74-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-73-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-76-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-75-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-78-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-77-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-79-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-80-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-82-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-81-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-84-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-83-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-85-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-86-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-88-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-87-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-90-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-89-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-92-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-91-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-94-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-93-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-96-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-95-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-97-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-99-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-98-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-101-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-100-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-102-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-103-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-105-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-104-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-106-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-107-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-109-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-108-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-111-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-110-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-112-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-114-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-113-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-115-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-117-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-116-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB
-
memory/5800-118-0x00000000752C0000-0x0000000075871000-memory.dmpFilesize
5.7MB