Analysis

  • max time kernel
    148s
  • max time network
    110s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-08-2024 18:30

General

  • Target

    1810cef88ce865e90eb6466a4b78d36bdee10114cf7936ca7b803bbcc1b33ac8.exe

  • Size

    384KB

  • MD5

    1b6662630f775bedc790e7290fe17371

  • SHA1

    f1acadf3681effcc5916323795ac38a4bc08d4ec

  • SHA256

    1810cef88ce865e90eb6466a4b78d36bdee10114cf7936ca7b803bbcc1b33ac8

  • SHA512

    7127a0a9fa20f369eb4732f9c601cabfb5ed4a4861117899d67694b5e55331f4488b532b7d6d7aa94e1c413f4ff35d0ee687136c816e99c7d0c4add59339d375

  • SSDEEP

    1536:AUUPcxVteCW7PMVimD7a3ISJ1bi/7yn5QzcOsHPQOd7Bd7QVclN:AUmcxV4x7PMVi7J1biTyn5QAQ4d7KY

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

prezent

C2

127.0.0.1:4449

Mutex

vrajamqoiwvqxx

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • VenomRAT 1 IoCs

    Detects VenomRAT.

  • Themida packer 1 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1810cef88ce865e90eb6466a4b78d36bdee10114cf7936ca7b803bbcc1b33ac8.exe
    "C:\Users\Admin\AppData\Local\Temp\1810cef88ce865e90eb6466a4b78d36bdee10114cf7936ca7b803bbcc1b33ac8.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:864

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/864-0-0x00007FFAA3FE3000-0x00007FFAA3FE5000-memory.dmp

    Filesize

    8KB

  • memory/864-1-0x00000000006D0000-0x000000000140A000-memory.dmp

    Filesize

    13.2MB

  • memory/864-3-0x00007FFAA3FE0000-0x00007FFAA4AA1000-memory.dmp

    Filesize

    10.8MB

  • memory/864-4-0x00007FFAA3FE3000-0x00007FFAA3FE5000-memory.dmp

    Filesize

    8KB

  • memory/864-5-0x00007FFAA3FE0000-0x00007FFAA4AA1000-memory.dmp

    Filesize

    10.8MB