Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 18:39
Behavioral task
behavioral1
Sample
30eb281a512774aba2ec5baa2c1acf3670f9ef943c48a2005625e7a02d09d787.exe
Resource
win7-20240729-en
5 signatures
150 seconds
General
-
Target
30eb281a512774aba2ec5baa2c1acf3670f9ef943c48a2005625e7a02d09d787.exe
-
Size
74KB
-
MD5
7dc58fd2226e2c9f56efc92b26ba2ed1
-
SHA1
dbe8dc5fc568b4f24cc3a2a8e4a11cf38c217dd2
-
SHA256
30eb281a512774aba2ec5baa2c1acf3670f9ef943c48a2005625e7a02d09d787
-
SHA512
bb856bbec7b98c7e729e5eb312b2a7061de0382d65f1a1d47ad1bee965f3aa63a84be5ccc58c9308a8bedd43893b549adb41df22381f629c4a4c7926f011bcf6
-
SSDEEP
1536:UUUPcxVteCW7PMVabajIFH1bf/QdLJCQzcWLVclN:UUmcxV4x7PMVAacH1bf4gQvBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
94.156.69.160:2020
Mutex
cwddfxajfbhwjug
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
resource yara_rule behavioral1/memory/2732-1-0x0000000000850000-0x0000000000868000-memory.dmp VenomRAT -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2732 30eb281a512774aba2ec5baa2c1acf3670f9ef943c48a2005625e7a02d09d787.exe 2732 30eb281a512774aba2ec5baa2c1acf3670f9ef943c48a2005625e7a02d09d787.exe 2732 30eb281a512774aba2ec5baa2c1acf3670f9ef943c48a2005625e7a02d09d787.exe 2732 30eb281a512774aba2ec5baa2c1acf3670f9ef943c48a2005625e7a02d09d787.exe 2732 30eb281a512774aba2ec5baa2c1acf3670f9ef943c48a2005625e7a02d09d787.exe 2732 30eb281a512774aba2ec5baa2c1acf3670f9ef943c48a2005625e7a02d09d787.exe 2732 30eb281a512774aba2ec5baa2c1acf3670f9ef943c48a2005625e7a02d09d787.exe 2732 30eb281a512774aba2ec5baa2c1acf3670f9ef943c48a2005625e7a02d09d787.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2732 30eb281a512774aba2ec5baa2c1acf3670f9ef943c48a2005625e7a02d09d787.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2732 30eb281a512774aba2ec5baa2c1acf3670f9ef943c48a2005625e7a02d09d787.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\30eb281a512774aba2ec5baa2c1acf3670f9ef943c48a2005625e7a02d09d787.exe"C:\Users\Admin\AppData\Local\Temp\30eb281a512774aba2ec5baa2c1acf3670f9ef943c48a2005625e7a02d09d787.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2732