Analysis
-
max time kernel
190s -
max time network
300s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
09-07-2024 21:36
Behavioral task
behavioral1
Sample
svchost.exe
Resource
win10-20240611-en
2 signatures
300 seconds
Behavioral task
behavioral2
Sample
svchost.exe
Resource
win10v2004-20240709-en
2 signatures
300 seconds
General
-
Target
svchost.exe
-
Size
74KB
-
MD5
448cbe8cec4c7d504c610b5ca27abd8e
-
SHA1
a09cc4e4356409b5046d93aa5fdc5027dfa1a3a8
-
SHA256
901a229ea78c23e31b3b020651b48f3b8f8bbe52ebe7a97d0de91d14fb6b0271
-
SHA512
5721ad606fdcfdd5629e67aeba2a912d70c916d43c2931348dd03fcf77fa91653c845aa4899c3bc512ce89c110abb454e588aebde902cc1918ed7e79d15ed968
-
SSDEEP
1536:OUKkcx9pXCTyPMV3IrEI1H1bw/Rs9+QzcOLVclN:OUDcx958yPMV3IzH1bwpsAQHBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
147.185.221.20:49485
Mutex
RANDOM-SHIT
Attributes
-
delay
3
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
aes.plain
Signatures
-
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeDebugPrivilege 4152 svchost.exe Token: SeIncreaseQuotaPrivilege 4152 svchost.exe Token: SeSecurityPrivilege 4152 svchost.exe Token: SeTakeOwnershipPrivilege 4152 svchost.exe Token: SeLoadDriverPrivilege 4152 svchost.exe Token: SeSystemProfilePrivilege 4152 svchost.exe Token: SeSystemtimePrivilege 4152 svchost.exe Token: SeProfSingleProcessPrivilege 4152 svchost.exe Token: SeIncBasePriorityPrivilege 4152 svchost.exe Token: SeCreatePagefilePrivilege 4152 svchost.exe Token: SeBackupPrivilege 4152 svchost.exe Token: SeRestorePrivilege 4152 svchost.exe Token: SeShutdownPrivilege 4152 svchost.exe Token: SeDebugPrivilege 4152 svchost.exe Token: SeSystemEnvironmentPrivilege 4152 svchost.exe Token: SeRemoteShutdownPrivilege 4152 svchost.exe Token: SeUndockPrivilege 4152 svchost.exe Token: SeManageVolumePrivilege 4152 svchost.exe Token: 33 4152 svchost.exe Token: 34 4152 svchost.exe Token: 35 4152 svchost.exe Token: 36 4152 svchost.exe Token: SeIncreaseQuotaPrivilege 4152 svchost.exe Token: SeSecurityPrivilege 4152 svchost.exe Token: SeTakeOwnershipPrivilege 4152 svchost.exe Token: SeLoadDriverPrivilege 4152 svchost.exe Token: SeSystemProfilePrivilege 4152 svchost.exe Token: SeSystemtimePrivilege 4152 svchost.exe Token: SeProfSingleProcessPrivilege 4152 svchost.exe Token: SeIncBasePriorityPrivilege 4152 svchost.exe Token: SeCreatePagefilePrivilege 4152 svchost.exe Token: SeBackupPrivilege 4152 svchost.exe Token: SeRestorePrivilege 4152 svchost.exe Token: SeShutdownPrivilege 4152 svchost.exe Token: SeDebugPrivilege 4152 svchost.exe Token: SeSystemEnvironmentPrivilege 4152 svchost.exe Token: SeRemoteShutdownPrivilege 4152 svchost.exe Token: SeUndockPrivilege 4152 svchost.exe Token: SeManageVolumePrivilege 4152 svchost.exe Token: 33 4152 svchost.exe Token: 34 4152 svchost.exe Token: 35 4152 svchost.exe Token: 36 4152 svchost.exe