Overview
overview
10Static
static
3g2m.dll
windows7-x64
3g2m.dll
windows10-1703-x64
3g2m.dll
windows10-2004-x64
3g2m.dll
windows11-21h2-x64
3runvm.bat
windows7-x64
1runvm.bat
windows10-1703-x64
10runvm.bat
windows10-2004-x64
10runvm.bat
windows11-21h2-x64
10vm.exe
windows7-x64
1vm.exe
windows10-1703-x64
10vm.exe
windows10-2004-x64
10vm.exe
windows11-21h2-x64
10Analysis
-
max time kernel
295s -
max time network
304s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 13:26
Static task
static1
Behavioral task
behavioral1
Sample
g2m.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
g2m.dll
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
g2m.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral4
Sample
g2m.dll
Resource
win11-20240709-en
Behavioral task
behavioral5
Sample
runvm.bat
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
runvm.bat
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
runvm.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral8
Sample
runvm.bat
Resource
win11-20240709-en
Behavioral task
behavioral9
Sample
vm.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
vm.exe
Resource
win10-20240611-en
Behavioral task
behavioral11
Sample
vm.exe
Resource
win10v2004-20240709-en
General
-
Target
vm.exe
-
Size
39KB
-
MD5
f1b14f71252de9ac763dbfbfbfc8c2dc
-
SHA1
dcc2dcb26c1649887f1d5ae557a000b5fe34bb98
-
SHA256
796ea1d27ed5825e300c3c9505a87b2445886623235f3e41258de90ba1604cd5
-
SHA512
636a32fb8a88a542783aa57fe047b6bca47b2bd23b41b3902671c4e9036c6dbb97576be27fd2395a988653e6b63714277873e077519b4a06cdc5f63d3c4224e0
-
SSDEEP
768:YRQnUhG5bZDOTpkdD82YbQkRFokFWIILPUh:FWObZDOTpk5T6zqAh
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.2
Default
94.156.79.190:4449
193.222.96.24:4449
aqswvfsywrpgi
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral11/memory/1572-2-0x0000000002910000-0x0000000002928000-memory.dmp family_asyncrat -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vm.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1572 vm.exe 1572 vm.exe 1572 vm.exe 1572 vm.exe 1572 vm.exe 1572 vm.exe 1572 vm.exe 1572 vm.exe 1572 vm.exe 1572 vm.exe 1572 vm.exe 1572 vm.exe 1572 vm.exe 1572 vm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1572 vm.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1572 vm.exe