Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 18:42
Behavioral task
behavioral1
Sample
42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe
Resource
win7-20240708-en
windows7-x64
3 signatures
150 seconds
General
-
Target
42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe
-
Size
74KB
-
MD5
18e0277b361debe968f10eef3d6396ce
-
SHA1
929ab1ffaaec25f1e919f119ef77c3f43f4c7d6d
-
SHA256
42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8
-
SHA512
47162d90ff720beaffc6d14d04b9f5a0b6843682697ff22cfb9d8d40c8089bb63fb4debc6ac04aeb1f1abb8c50d040f503eb0cdee0c9094ff8c1d52a06936eca
-
SSDEEP
1536:EUEkcx4VHsC0SPMVDsf7EYINH1bD/mRDxKQzc2LVclN:EUxcx4GfSPMVDsA3H1bDORDEQPBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
91.92.247.147:8080
91.92.247.147:0
Mutex
esimgiwhbleickdx
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2988-1-0x00000000001E0000-0x00000000001F8000-memory.dmp VenomRAT -
Suspicious use of AdjustPrivilegeToken 41 IoCs
Processes:
42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exedescription pid process Token: SeDebugPrivilege 2988 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeIncreaseQuotaPrivilege 2988 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeSecurityPrivilege 2988 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeTakeOwnershipPrivilege 2988 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeLoadDriverPrivilege 2988 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeSystemProfilePrivilege 2988 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeSystemtimePrivilege 2988 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeProfSingleProcessPrivilege 2988 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeIncBasePriorityPrivilege 2988 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeCreatePagefilePrivilege 2988 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeBackupPrivilege 2988 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeRestorePrivilege 2988 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeShutdownPrivilege 2988 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeDebugPrivilege 2988 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeSystemEnvironmentPrivilege 2988 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeRemoteShutdownPrivilege 2988 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeUndockPrivilege 2988 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeManageVolumePrivilege 2988 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: 33 2988 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: 34 2988 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: 35 2988 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeIncreaseQuotaPrivilege 2988 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeSecurityPrivilege 2988 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeTakeOwnershipPrivilege 2988 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeLoadDriverPrivilege 2988 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeSystemProfilePrivilege 2988 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeSystemtimePrivilege 2988 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeProfSingleProcessPrivilege 2988 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeIncBasePriorityPrivilege 2988 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeCreatePagefilePrivilege 2988 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeBackupPrivilege 2988 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeRestorePrivilege 2988 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeShutdownPrivilege 2988 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeDebugPrivilege 2988 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeSystemEnvironmentPrivilege 2988 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeRemoteShutdownPrivilege 2988 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeUndockPrivilege 2988 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeManageVolumePrivilege 2988 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: 33 2988 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: 34 2988 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: 35 2988 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe