Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
18-06-2024 17:44
Behavioral task
behavioral1
Sample
96fd436f2e19e2b73942d2020df62970.exe
Resource
win7-20240611-en
4 signatures
150 seconds
General
-
Target
96fd436f2e19e2b73942d2020df62970.exe
-
Size
73KB
-
MD5
96fd436f2e19e2b73942d2020df62970
-
SHA1
71baa79ab0180c70a3a1154da88a4b1a42ac497e
-
SHA256
4a165517f5415fc61d91c06d2d0d9d00b2c77a6a8419617eabe91c967f180fb5
-
SHA512
e110aed855d363637d8422e68f801f64d70f51dd243f5af486447d712a31f9a16dd638f0b1fb4a3a87b61200e2d771fcfcca228001ce31c64711951f531bf871
-
SSDEEP
1536:aKUUPcx9FbKHoPCdLR33s3qbQSM0ThEPMwS/eqmmRhdWVH1bfbJIpT4wzUobVclN:aKUmcx9FbKHo6dLR33s3qbQSM0NEPMwL
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.2
Botnet
Default
C2
193.222.96.13:4449
Mutex
wxaqjwggdev
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
96fd436f2e19e2b73942d2020df62970.exepid process 2040 96fd436f2e19e2b73942d2020df62970.exe 2040 96fd436f2e19e2b73942d2020df62970.exe 2040 96fd436f2e19e2b73942d2020df62970.exe 2040 96fd436f2e19e2b73942d2020df62970.exe 2040 96fd436f2e19e2b73942d2020df62970.exe 2040 96fd436f2e19e2b73942d2020df62970.exe 2040 96fd436f2e19e2b73942d2020df62970.exe 2040 96fd436f2e19e2b73942d2020df62970.exe 2040 96fd436f2e19e2b73942d2020df62970.exe 2040 96fd436f2e19e2b73942d2020df62970.exe 2040 96fd436f2e19e2b73942d2020df62970.exe 2040 96fd436f2e19e2b73942d2020df62970.exe 2040 96fd436f2e19e2b73942d2020df62970.exe 2040 96fd436f2e19e2b73942d2020df62970.exe 2040 96fd436f2e19e2b73942d2020df62970.exe 2040 96fd436f2e19e2b73942d2020df62970.exe 2040 96fd436f2e19e2b73942d2020df62970.exe 2040 96fd436f2e19e2b73942d2020df62970.exe 2040 96fd436f2e19e2b73942d2020df62970.exe 2040 96fd436f2e19e2b73942d2020df62970.exe 2040 96fd436f2e19e2b73942d2020df62970.exe 2040 96fd436f2e19e2b73942d2020df62970.exe 2040 96fd436f2e19e2b73942d2020df62970.exe 2040 96fd436f2e19e2b73942d2020df62970.exe 2040 96fd436f2e19e2b73942d2020df62970.exe 2040 96fd436f2e19e2b73942d2020df62970.exe 2040 96fd436f2e19e2b73942d2020df62970.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
96fd436f2e19e2b73942d2020df62970.exedescription pid process Token: SeDebugPrivilege 2040 96fd436f2e19e2b73942d2020df62970.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
96fd436f2e19e2b73942d2020df62970.exepid process 2040 96fd436f2e19e2b73942d2020df62970.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\96fd436f2e19e2b73942d2020df62970.exe"C:\Users\Admin\AppData\Local\Temp\96fd436f2e19e2b73942d2020df62970.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4204,i,6166776566165096562,4582328833313060853,262144 --variations-seed-version --mojo-platform-channel-handle=3468 /prefetch:81⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2040-0-0x00007FFF91313000-0x00007FFF91315000-memory.dmpFilesize
8KB
-
memory/2040-1-0x0000000000060000-0x0000000000078000-memory.dmpFilesize
96KB
-
memory/2040-3-0x00007FFF91310000-0x00007FFF91DD1000-memory.dmpFilesize
10.8MB
-
memory/2040-4-0x00007FFF91313000-0x00007FFF91315000-memory.dmpFilesize
8KB
-
memory/2040-5-0x00007FFF91310000-0x00007FFF91DD1000-memory.dmpFilesize
10.8MB