Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 18:32
Behavioral task
behavioral1
Sample
1d8219f967ab56f527a176a07a91f447b7ee335103e5cbac73b1bacc03cbab4d.exe
Resource
win7-20240708-en
windows7-x64
5 signatures
150 seconds
General
-
Target
1d8219f967ab56f527a176a07a91f447b7ee335103e5cbac73b1bacc03cbab4d.exe
-
Size
74KB
-
MD5
9dabe66b91d1121c2e4ead7f006eb095
-
SHA1
8f9be3dcf0fe25aeb9b291455199990d3d189f66
-
SHA256
1d8219f967ab56f527a176a07a91f447b7ee335103e5cbac73b1bacc03cbab4d
-
SHA512
0c65b35f59dc3dce6d4951800696573619e2e8cbff6f623f2f1d39b740eb79495515436cd82bcf38d315688f456424bd03cd8bc32fe7389eb1b5d25921bc0a31
-
SSDEEP
1536:4UUPcxVteCW7PMVgOyWIeH1bc/buLLhaQzcaLVclN:4UmcxV4x7PMVLyOH1bcMLgQLBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
194.55.186.155:2424
Mutex
qncatmcnnrwluo
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2292-1-0x0000000000260000-0x0000000000278000-memory.dmp VenomRAT -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
1d8219f967ab56f527a176a07a91f447b7ee335103e5cbac73b1bacc03cbab4d.exepid Process 2292 1d8219f967ab56f527a176a07a91f447b7ee335103e5cbac73b1bacc03cbab4d.exe 2292 1d8219f967ab56f527a176a07a91f447b7ee335103e5cbac73b1bacc03cbab4d.exe 2292 1d8219f967ab56f527a176a07a91f447b7ee335103e5cbac73b1bacc03cbab4d.exe 2292 1d8219f967ab56f527a176a07a91f447b7ee335103e5cbac73b1bacc03cbab4d.exe 2292 1d8219f967ab56f527a176a07a91f447b7ee335103e5cbac73b1bacc03cbab4d.exe 2292 1d8219f967ab56f527a176a07a91f447b7ee335103e5cbac73b1bacc03cbab4d.exe 2292 1d8219f967ab56f527a176a07a91f447b7ee335103e5cbac73b1bacc03cbab4d.exe 2292 1d8219f967ab56f527a176a07a91f447b7ee335103e5cbac73b1bacc03cbab4d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1d8219f967ab56f527a176a07a91f447b7ee335103e5cbac73b1bacc03cbab4d.exedescription pid Process Token: SeDebugPrivilege 2292 1d8219f967ab56f527a176a07a91f447b7ee335103e5cbac73b1bacc03cbab4d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
1d8219f967ab56f527a176a07a91f447b7ee335103e5cbac73b1bacc03cbab4d.exepid Process 2292 1d8219f967ab56f527a176a07a91f447b7ee335103e5cbac73b1bacc03cbab4d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d8219f967ab56f527a176a07a91f447b7ee335103e5cbac73b1bacc03cbab4d.exe"C:\Users\Admin\AppData\Local\Temp\1d8219f967ab56f527a176a07a91f447b7ee335103e5cbac73b1bacc03cbab4d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2292