Overview
overview
10Static
static
10VenomRAT-V...NC.rar
windows11-21h2-x64
3VenomRAT-V...to.dll
windows11-21h2-x64
1VenomRAT-V...I2.dll
windows11-21h2-x64
1VenomRAT-V...on.dll
windows11-21h2-x64
1VenomRAT-V...or.dll
windows11-21h2-x64
1VenomRAT-V...er.exe
windows11-21h2-x64
1VenomRAT-V...on.dll
windows11-21h2-x64
1VenomRAT-V...io.dll
windows11-21h2-x64
1VenomRAT-V...at.dll
windows11-21h2-x64
1VenomRAT-V...rd.dll
windows11-21h2-x64
1VenomRAT-V...ra.dll
windows11-21h2-x64
1VenomRAT-V...er.dll
windows11-21h2-x64
1VenomRAT-V...er.dll
windows11-21h2-x64
1VenomRAT-V...un.dll
windows11-21h2-x64
1VenomRAT-V...on.dll
windows11-21h2-x64
1VenomRAT-V...er.exe
windows11-21h2-x64
1VenomRAT-V...er.dll
windows11-21h2-x64
1VenomRAT-V...ib.dll
windows11-21h2-x64
1VenomRAT-V...us.dll
windows11-21h2-x64
1VenomRAT-V...at.dll
windows11-21h2-x64
1VenomRAT-V...ns.dll
windows11-21h2-x64
1VenomRAT-V...er.dll
windows11-21h2-x64
1VenomRAT-V...ry.dll
windows11-21h2-x64
1VenomRAT-V...it.dll
windows11-21h2-x64
1VenomRAT-V...ra.dll
windows11-21h2-x64
1VenomRAT-V...op.dll
windows11-21h2-x64
1VenomRAT-V...xy.dll
windows11-21h2-x64
1VenomRAT-V...ion.db
windows11-21h2-x64
3VenomRAT-V...te.p12
windows11-21h2-x64
5VenomRAT-V...nt.pdb
windows11-21h2-x64
3VenomRAT-V...config
windows11-21h2-x64
3VenomRAT-V...icense
windows11-21h2-x64
3Analysis
-
max time kernel
0s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
02-06-2024 21:09
Behavioral task
behavioral1
Sample
VenomRAT-V5.6-HVNC.rar
Resource
win11-20240426-en
Behavioral task
behavioral2
Sample
VenomRAT-V5.6-HVNC/BouncyCastle.Crypto.dll
Resource
win11-20240426-en
Behavioral task
behavioral3
Sample
VenomRAT-V5.6-HVNC/Guna.UI2.dll
Resource
win11-20240508-en
Behavioral task
behavioral4
Sample
VenomRAT-V5.6-HVNC/IP2Region.dll
Resource
win11-20240508-en
Behavioral task
behavioral5
Sample
VenomRAT-V5.6-HVNC/IconExtractor.dll
Resource
win11-20240508-en
Behavioral task
behavioral6
Sample
VenomRAT-V5.6-HVNC/Keylogger.exe
Resource
win11-20240508-en
Behavioral task
behavioral7
Sample
VenomRAT-V5.6-HVNC/Newtonsoft.Json.dll
Resource
win11-20240419-en
Behavioral task
behavioral8
Sample
VenomRAT-V5.6-HVNC/Plugins/Audio.dll
Resource
win11-20240426-en
Behavioral task
behavioral9
Sample
VenomRAT-V5.6-HVNC/Plugins/Chat.dll
Resource
win11-20240508-en
Behavioral task
behavioral10
Sample
VenomRAT-V5.6-HVNC/Plugins/Discord.dll
Resource
win11-20240426-en
Behavioral task
behavioral11
Sample
VenomRAT-V5.6-HVNC/Plugins/Extra.dll
Resource
win11-20240426-en
Behavioral task
behavioral12
Sample
VenomRAT-V5.6-HVNC/Plugins/FileManager.dll
Resource
win11-20240426-en
Behavioral task
behavioral13
Sample
VenomRAT-V5.6-HVNC/Plugins/FileSearcher.dll
Resource
win11-20240508-en
Behavioral task
behavioral14
Sample
VenomRAT-V5.6-HVNC/Plugins/Fun.dll
Resource
win11-20240508-en
Behavioral task
behavioral15
Sample
VenomRAT-V5.6-HVNC/Plugins/Information.dll
Resource
win11-20240419-en
Behavioral task
behavioral16
Sample
VenomRAT-V5.6-HVNC/Plugins/Keylogger.exe
Resource
win11-20240426-en
Behavioral task
behavioral17
Sample
VenomRAT-V5.6-HVNC/Plugins/Logger.dll
Resource
win11-20240508-en
Behavioral task
behavioral18
Sample
VenomRAT-V5.6-HVNC/Plugins/MessagePackLib.dll
Resource
win11-20240426-en
Behavioral task
behavioral19
Sample
VenomRAT-V5.6-HVNC/Plugins/Miscellaneous.dll
Resource
win11-20240426-en
Behavioral task
behavioral20
Sample
VenomRAT-V5.6-HVNC/Plugins/Netstat.dll
Resource
win11-20240508-en
Behavioral task
behavioral21
Sample
VenomRAT-V5.6-HVNC/Plugins/Options.dll
Resource
win11-20240426-en
Behavioral task
behavioral22
Sample
VenomRAT-V5.6-HVNC/Plugins/ProcessManager.dll
Resource
win11-20240426-en
Behavioral task
behavioral23
Sample
VenomRAT-V5.6-HVNC/Plugins/Recovery.dll
Resource
win11-20240508-en
Behavioral task
behavioral24
Sample
VenomRAT-V5.6-HVNC/Plugins/Regedit.dll
Resource
win11-20240426-en
Behavioral task
behavioral25
Sample
VenomRAT-V5.6-HVNC/Plugins/RemoteCamera.dll
Resource
win11-20240508-en
Behavioral task
behavioral26
Sample
VenomRAT-V5.6-HVNC/Plugins/RemoteDesktop.dll
Resource
win11-20240426-en
Behavioral task
behavioral27
Sample
VenomRAT-V5.6-HVNC/Plugins/ReverseProxy.dll
Resource
win11-20240426-en
Behavioral task
behavioral28
Sample
VenomRAT-V5.6-HVNC/Plugins/ip2region.db
Resource
win11-20240508-en
Behavioral task
behavioral29
Sample
VenomRAT-V5.6-HVNC/ServerCertificate.p12
Resource
win11-20240508-en
Behavioral task
behavioral30
Sample
VenomRAT-V5.6-HVNC/Stub/Client.pdb
Resource
win11-20240426-en
Behavioral task
behavioral31
Sample
VenomRAT-V5.6-HVNC/Venom RAT + HVNC.exe.config
Resource
win11-20240426-en
Behavioral task
behavioral32
Sample
VenomRAT-V5.6-HVNC/Venom.license
Resource
win11-20240426-en
General
-
Target
VenomRAT-V5.6-HVNC/ServerCertificate.p12
-
Size
1KB
-
MD5
6ce85262afbc028314bdf6fe9aa718a5
-
SHA1
b59fe71c2ebd80df9e3ba5681ff6e36c90c2f0a8
-
SHA256
74eba079b36c835cd89af395cf53272c53351cd851efb140a8152410c4e2973e
-
SHA512
8ac1198de48c3acab03482958ccd5044561599373338f0bb9ff203c0d596b810143d420ebdcb20abd60a1383a08e70f7ddac6fa9b304a0a3a61aa06af030e6fb
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
mmc.exedescription ioc process File opened for modification C:\Windows\system32\certmgr.msc mmc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
mmc.exedescription pid process Token: 33 4376 mmc.exe Token: SeIncBasePriorityPrivilege 4376 mmc.exe Token: 33 4376 mmc.exe Token: SeIncBasePriorityPrivilege 4376 mmc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
mmc.exepid process 4376 mmc.exe 4376 mmc.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
rundll32.exedescription pid process target process PID 440 wrote to memory of 4376 440 rundll32.exe mmc.exe PID 440 wrote to memory of 4376 440 rundll32.exe mmc.exe
Processes
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe cryptext.dll,CryptExtOpenPFX C:\Users\Admin\AppData\Local\Temp\VenomRAT-V5.6-HVNC\ServerCertificate.p121⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\mmc.exe"C:\Windows\System32\mmc.exe" C:\Windows\system32\certmgr.msc /certmgr:FileName="C:\Users\Admin\AppData\Local\Temp\VenomRAT-V5.6-HVNC\ServerCertificate.p12"2⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx