Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 18:34
Behavioral task
behavioral1
Sample
22db8f335208597418d6bffbbbd97606f351608c33764ee0f1e9bf49f528161c.exe
Resource
win7-20240704-en
windows7-x64
5 signatures
150 seconds
General
-
Target
22db8f335208597418d6bffbbbd97606f351608c33764ee0f1e9bf49f528161c.exe
-
Size
74KB
-
MD5
2fd43c0b14d13f81a18e093c43c94dc7
-
SHA1
2de61d1fd2f939d8bb53167b87b6a1f1d7ffab36
-
SHA256
22db8f335208597418d6bffbbbd97606f351608c33764ee0f1e9bf49f528161c
-
SHA512
32b271211afc3572796453c7ddd8c5c53d280d536d6446b5a48069b610fa7df06102d2507be9cf333b6a2e31ad66baa52a3d2f198f23ba6716eef4c29b58a4fe
-
SSDEEP
1536:8UUPcxVteCW7PMVee9VdQuDI6H1bf/kNfQzcBLVclN:8UmcxV4x7PMVee9VdQsH1bfMVQYBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
46.197.123.202:1604
Mutex
retyutnhgdf
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4368-1-0x0000000000300000-0x0000000000318000-memory.dmp VenomRAT -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
22db8f335208597418d6bffbbbd97606f351608c33764ee0f1e9bf49f528161c.exepid process 4368 22db8f335208597418d6bffbbbd97606f351608c33764ee0f1e9bf49f528161c.exe 4368 22db8f335208597418d6bffbbbd97606f351608c33764ee0f1e9bf49f528161c.exe 4368 22db8f335208597418d6bffbbbd97606f351608c33764ee0f1e9bf49f528161c.exe 4368 22db8f335208597418d6bffbbbd97606f351608c33764ee0f1e9bf49f528161c.exe 4368 22db8f335208597418d6bffbbbd97606f351608c33764ee0f1e9bf49f528161c.exe 4368 22db8f335208597418d6bffbbbd97606f351608c33764ee0f1e9bf49f528161c.exe 4368 22db8f335208597418d6bffbbbd97606f351608c33764ee0f1e9bf49f528161c.exe 4368 22db8f335208597418d6bffbbbd97606f351608c33764ee0f1e9bf49f528161c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
22db8f335208597418d6bffbbbd97606f351608c33764ee0f1e9bf49f528161c.exedescription pid process Token: SeDebugPrivilege 4368 22db8f335208597418d6bffbbbd97606f351608c33764ee0f1e9bf49f528161c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
22db8f335208597418d6bffbbbd97606f351608c33764ee0f1e9bf49f528161c.exepid process 4368 22db8f335208597418d6bffbbbd97606f351608c33764ee0f1e9bf49f528161c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\22db8f335208597418d6bffbbbd97606f351608c33764ee0f1e9bf49f528161c.exe"C:\Users\Admin\AppData\Local\Temp\22db8f335208597418d6bffbbbd97606f351608c33764ee0f1e9bf49f528161c.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4368