Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 18:42
Behavioral task
behavioral1
Sample
42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe
Resource
win7-20240708-en
windows7-x64
3 signatures
150 seconds
General
-
Target
42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe
-
Size
74KB
-
MD5
18e0277b361debe968f10eef3d6396ce
-
SHA1
929ab1ffaaec25f1e919f119ef77c3f43f4c7d6d
-
SHA256
42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8
-
SHA512
47162d90ff720beaffc6d14d04b9f5a0b6843682697ff22cfb9d8d40c8089bb63fb4debc6ac04aeb1f1abb8c50d040f503eb0cdee0c9094ff8c1d52a06936eca
-
SSDEEP
1536:EUEkcx4VHsC0SPMVDsf7EYINH1bD/mRDxKQzc2LVclN:EUxcx4GfSPMVDsA3H1bDORDEQPBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
91.92.247.147:8080
91.92.247.147:0
Mutex
esimgiwhbleickdx
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3112-1-0x0000000000460000-0x0000000000478000-memory.dmp VenomRAT -
Suspicious use of AdjustPrivilegeToken 43 IoCs
Processes:
42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exedescription pid process Token: SeDebugPrivilege 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeIncreaseQuotaPrivilege 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeSecurityPrivilege 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeTakeOwnershipPrivilege 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeLoadDriverPrivilege 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeSystemProfilePrivilege 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeSystemtimePrivilege 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeProfSingleProcessPrivilege 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeIncBasePriorityPrivilege 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeCreatePagefilePrivilege 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeBackupPrivilege 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeRestorePrivilege 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeShutdownPrivilege 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeDebugPrivilege 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeSystemEnvironmentPrivilege 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeRemoteShutdownPrivilege 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeUndockPrivilege 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeManageVolumePrivilege 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: 33 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: 34 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: 35 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: 36 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeIncreaseQuotaPrivilege 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeSecurityPrivilege 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeTakeOwnershipPrivilege 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeLoadDriverPrivilege 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeSystemProfilePrivilege 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeSystemtimePrivilege 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeProfSingleProcessPrivilege 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeIncBasePriorityPrivilege 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeCreatePagefilePrivilege 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeBackupPrivilege 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeRestorePrivilege 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeShutdownPrivilege 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeDebugPrivilege 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeSystemEnvironmentPrivilege 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeRemoteShutdownPrivilege 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeUndockPrivilege 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: SeManageVolumePrivilege 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: 33 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: 34 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: 35 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe Token: 36 3112 42de2f578a57c598f47775a0a516579e4687e9721cfd174d68343a0154c6ccc8.exe