Analysis
-
max time kernel
92s -
max time network
153s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
28-06-2024 19:24
Behavioral task
behavioral1
Sample
bfaa1a2e64a91e8d1cc56bc9ac7d906b135b41d5b155c43af147e6590c596cd6.exe
Resource
win10v2004-20240508-en
General
-
Target
bfaa1a2e64a91e8d1cc56bc9ac7d906b135b41d5b155c43af147e6590c596cd6.exe
-
Size
73KB
-
MD5
338cee4d2b3e4d1a0ce18dd982eefbcd
-
SHA1
183d34238bf60cf1b0261efcce4ce8deb3852d60
-
SHA256
bfaa1a2e64a91e8d1cc56bc9ac7d906b135b41d5b155c43af147e6590c596cd6
-
SHA512
6325b74c2ec4fd8429822766e08f29750cdb2968560ffe719bef866f0147b0e246d309240339035c500aac6db66a81ec9c3e16a5199d7f58589debff2cd29f6c
-
SSDEEP
1536:CSUEkcxNYungvHZDJ/SkXizIqksbLvPMwS2n6g3dHKH1blbTFxXbwzUQbVclN:CSUxcxNYungPZDJ/SkXizIqks/vPMwSP
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.2
Default
45.88.91.103:4545
rhnwhvnnkyidnvwavvp
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
bfaa1a2e64a91e8d1cc56bc9ac7d906b135b41d5b155c43af147e6590c596cd6.exepid process 1540 bfaa1a2e64a91e8d1cc56bc9ac7d906b135b41d5b155c43af147e6590c596cd6.exe 1540 bfaa1a2e64a91e8d1cc56bc9ac7d906b135b41d5b155c43af147e6590c596cd6.exe 1540 bfaa1a2e64a91e8d1cc56bc9ac7d906b135b41d5b155c43af147e6590c596cd6.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
bfaa1a2e64a91e8d1cc56bc9ac7d906b135b41d5b155c43af147e6590c596cd6.exedescription pid process Token: SeDebugPrivilege 1540 bfaa1a2e64a91e8d1cc56bc9ac7d906b135b41d5b155c43af147e6590c596cd6.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
bfaa1a2e64a91e8d1cc56bc9ac7d906b135b41d5b155c43af147e6590c596cd6.exepid process 1540 bfaa1a2e64a91e8d1cc56bc9ac7d906b135b41d5b155c43af147e6590c596cd6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfaa1a2e64a91e8d1cc56bc9ac7d906b135b41d5b155c43af147e6590c596cd6.exe"C:\Users\Admin\AppData\Local\Temp\bfaa1a2e64a91e8d1cc56bc9ac7d906b135b41d5b155c43af147e6590c596cd6.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1540