Analysis
-
max time kernel
126s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 18:24
Behavioral task
behavioral1
Sample
9c8f56b88018d130a953e6713bb1ac7eafa12f4a96b6a4a861d5aded3723ad5e.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
9c8f56b88018d130a953e6713bb1ac7eafa12f4a96b6a4a861d5aded3723ad5e.exe
Resource
win10v2004-20240802-en
General
-
Target
9c8f56b88018d130a953e6713bb1ac7eafa12f4a96b6a4a861d5aded3723ad5e.exe
-
Size
74KB
-
MD5
ce68fc27a056dee925517b474c48913c
-
SHA1
a02682df55e78ca901a817b9dfab0df60ab92d12
-
SHA256
9c8f56b88018d130a953e6713bb1ac7eafa12f4a96b6a4a861d5aded3723ad5e
-
SHA512
91e82acb9ef3a28bf5d11b553d8bb0793c31992000b55f54dacd11fd27be44d35d157395891233db4c1811844807ef994928be0854e73be70651917a6e8fd6ae
-
SSDEEP
1536:IUskcxVKpC6yPMVjVZIeIAH1bq/rKJ0AQzcOLVclN:IUZcxVENyPMVjVpH1bqrAQHBY
Malware Config
Extracted
asyncrat
Venom RAT v6.0.3 - Cracked By ReverseLabs
nexhub-fivem-cod-woofer
127.0.0.1:4449
127.0.0.1:4545
88.3.200.21:4449
88.3.200.21:4545
pvsytsyndwrufopxwd
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2000-1-0x0000000000180000-0x0000000000198000-memory.dmp VenomRAT -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
9c8f56b88018d130a953e6713bb1ac7eafa12f4a96b6a4a861d5aded3723ad5e.exepid Process 2000 9c8f56b88018d130a953e6713bb1ac7eafa12f4a96b6a4a861d5aded3723ad5e.exe 2000 9c8f56b88018d130a953e6713bb1ac7eafa12f4a96b6a4a861d5aded3723ad5e.exe 2000 9c8f56b88018d130a953e6713bb1ac7eafa12f4a96b6a4a861d5aded3723ad5e.exe 2000 9c8f56b88018d130a953e6713bb1ac7eafa12f4a96b6a4a861d5aded3723ad5e.exe 2000 9c8f56b88018d130a953e6713bb1ac7eafa12f4a96b6a4a861d5aded3723ad5e.exe 2000 9c8f56b88018d130a953e6713bb1ac7eafa12f4a96b6a4a861d5aded3723ad5e.exe 2000 9c8f56b88018d130a953e6713bb1ac7eafa12f4a96b6a4a861d5aded3723ad5e.exe 2000 9c8f56b88018d130a953e6713bb1ac7eafa12f4a96b6a4a861d5aded3723ad5e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
9c8f56b88018d130a953e6713bb1ac7eafa12f4a96b6a4a861d5aded3723ad5e.exedescription pid Process Token: SeDebugPrivilege 2000 9c8f56b88018d130a953e6713bb1ac7eafa12f4a96b6a4a861d5aded3723ad5e.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
9c8f56b88018d130a953e6713bb1ac7eafa12f4a96b6a4a861d5aded3723ad5e.exepid Process 2000 9c8f56b88018d130a953e6713bb1ac7eafa12f4a96b6a4a861d5aded3723ad5e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c8f56b88018d130a953e6713bb1ac7eafa12f4a96b6a4a861d5aded3723ad5e.exe"C:\Users\Admin\AppData\Local\Temp\9c8f56b88018d130a953e6713bb1ac7eafa12f4a96b6a4a861d5aded3723ad5e.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2000