Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 18:32
Behavioral task
behavioral1
Sample
2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe
Resource
win7-20240705-en
windows7-x64
3 signatures
150 seconds
General
-
Target
2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe
-
Size
74KB
-
MD5
52798305f5af009c6463de065b7720ac
-
SHA1
f333debd12556179da79787230edd74ac0595a35
-
SHA256
2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35
-
SHA512
9ca907c52cdcde217c69cdf45c52cec01035fd04de520b7b15a9496379a7c59020e8f9738b5ed850929373339700b5cdc1dd5e17757950a12d47e6843c6d5ce3
-
SSDEEP
1536:cyXUyccx4m3Cmv6PMVqmD7a3ISM1bh/gpEQzcWLVclN:cyXUjcx4qB6PMVa7M1bhopEQvBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
plaka
Mutex
xgdhkdlzdpzntmowf
Attributes
-
delay
1
-
install
false
-
install_file
plaka
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.ai/raw/eydfn79gkq
aes.plain
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2020-1-0x0000000000EF0000-0x0000000000F08000-memory.dmp VenomRAT -
Suspicious use of AdjustPrivilegeToken 43 IoCs
Processes:
2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exedescription pid process Token: SeDebugPrivilege 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeIncreaseQuotaPrivilege 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeSecurityPrivilege 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeTakeOwnershipPrivilege 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeLoadDriverPrivilege 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeSystemProfilePrivilege 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeSystemtimePrivilege 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeProfSingleProcessPrivilege 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeIncBasePriorityPrivilege 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeCreatePagefilePrivilege 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeBackupPrivilege 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeRestorePrivilege 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeShutdownPrivilege 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeDebugPrivilege 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeSystemEnvironmentPrivilege 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeRemoteShutdownPrivilege 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeUndockPrivilege 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeManageVolumePrivilege 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: 33 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: 34 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: 35 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: 36 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeIncreaseQuotaPrivilege 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeSecurityPrivilege 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeTakeOwnershipPrivilege 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeLoadDriverPrivilege 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeSystemProfilePrivilege 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeSystemtimePrivilege 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeProfSingleProcessPrivilege 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeIncBasePriorityPrivilege 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeCreatePagefilePrivilege 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeBackupPrivilege 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeRestorePrivilege 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeShutdownPrivilege 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeDebugPrivilege 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeSystemEnvironmentPrivilege 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeRemoteShutdownPrivilege 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeUndockPrivilege 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeManageVolumePrivilege 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: 33 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: 34 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: 35 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: 36 2020 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe