Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    18-08-2024 18:47

General

  • Target

    62faa6629d18abb3b5f3a1137267ba32fd685bc8fd2de7b9b2b908d156511cf0.exe

  • Size

    2.9MB

  • MD5

    5e985577ae17524bda2af7b183bbb0bb

  • SHA1

    041e93e1a56d37032fc2fb1f61481bcbcef04f8d

  • SHA256

    62faa6629d18abb3b5f3a1137267ba32fd685bc8fd2de7b9b2b908d156511cf0

  • SHA512

    f2b3ac015705bd77c149a727413d8987cc018cc5ac3a48e3841ef7bade75e3a69497e77092e7eb0029c551043cf9af3657cd640cc23387b9703344dd0bf0acd2

  • SSDEEP

    49152:1IOY/SiSf6KSIshmgTlxRQv9rn0KtX2pyJz0qGoyEs:1kKZshhYv9ptXZJe

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

Mutex

vhlcckztkbtpquk

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    https://pastebin.ai/raw/bth2zeoztv

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • VenomRAT 2 IoCs

    Detects VenomRAT.

  • Async RAT payload 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\62faa6629d18abb3b5f3a1137267ba32fd685bc8fd2de7b9b2b908d156511cf0.exe
    "C:\Users\Admin\AppData\Local\Temp\62faa6629d18abb3b5f3a1137267ba32fd685bc8fd2de7b9b2b908d156511cf0.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2280
    • C:\Users\Admin\AppData\Local\Temp\CELESTY.EXE
      "C:\Users\Admin\AppData\Local\Temp\CELESTY.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2180
    • C:\Users\Admin\AppData\Local\Temp\CLIENT.EXE
      "C:\Users\Admin\AppData\Local\Temp\CLIENT.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\CELESTY.EXE

    Filesize

    2.7MB

    MD5

    c3009ee63bc661d9ea75eaeb256448ca

    SHA1

    45eb01150756df432e25eed44d976442473356de

    SHA256

    0bb88564a22bfd6d9ad6e4d8efa9077792a7b6094c2a0f865d70c43e11507352

    SHA512

    96f5847fbeef95df1309e97a4bc3d786a5f5c19b87e804f12d88b4473a0b50291c40407a3d95a2d5d78031f03be76da47f1846a73c7802ddae46a38ac4634e67

  • \Users\Admin\AppData\Local\Temp\CLIENT.EXE

    Filesize

    74KB

    MD5

    55f73c9b3197d7d7bb7156b04601c2f0

    SHA1

    bd40272e5b4dd5b3dd1c74c49fa40c59b7cf26da

    SHA256

    7c2cbfbb042e20dd4a785ece1d49dbcfd48711abed518531acaeacf6b65419ae

    SHA512

    27ff1a737e052299a2825d4467fc4a546a9fbc10302a9781d3701fa94d8e8be671bd9d37e2975561ab3f07a8fd72db1f78601c58d77519f0341d8595e0a2a68e

  • memory/2180-19-0x0000000000400000-0x00000000006DC000-memory.dmp

    Filesize

    2.9MB

  • memory/2180-23-0x0000000000400000-0x00000000006DC000-memory.dmp

    Filesize

    2.9MB

  • memory/2180-16-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2180-15-0x0000000000400000-0x00000000006DC000-memory.dmp

    Filesize

    2.9MB

  • memory/2180-17-0x0000000000400000-0x00000000006DC000-memory.dmp

    Filesize

    2.9MB

  • memory/2180-18-0x0000000000400000-0x00000000006DC000-memory.dmp

    Filesize

    2.9MB

  • memory/2180-8-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2180-20-0x0000000000400000-0x00000000006DC000-memory.dmp

    Filesize

    2.9MB

  • memory/2180-21-0x0000000000400000-0x00000000006DC000-memory.dmp

    Filesize

    2.9MB

  • memory/2180-30-0x0000000000400000-0x00000000006DC000-memory.dmp

    Filesize

    2.9MB

  • memory/2180-24-0x0000000000400000-0x00000000006DC000-memory.dmp

    Filesize

    2.9MB

  • memory/2180-25-0x0000000000400000-0x00000000006DC000-memory.dmp

    Filesize

    2.9MB

  • memory/2180-26-0x0000000000400000-0x00000000006DC000-memory.dmp

    Filesize

    2.9MB

  • memory/2180-27-0x0000000000400000-0x00000000006DC000-memory.dmp

    Filesize

    2.9MB

  • memory/2180-28-0x0000000000400000-0x00000000006DC000-memory.dmp

    Filesize

    2.9MB

  • memory/2180-29-0x0000000000400000-0x00000000006DC000-memory.dmp

    Filesize

    2.9MB

  • memory/2816-13-0x0000000000E40000-0x0000000000E58000-memory.dmp

    Filesize

    96KB