Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 18:48
Behavioral task
behavioral1
Sample
6f47373b38d3552785c6739a6269f093c5bff95e7af9d4e1860078958dbe881a.exe
Resource
win7-20240705-en
General
-
Target
6f47373b38d3552785c6739a6269f093c5bff95e7af9d4e1860078958dbe881a.exe
-
Size
79KB
-
MD5
037d11156638e4584494ef53322413ba
-
SHA1
a88f49727e65aa507c820aadcd95686bc49f5b8a
-
SHA256
6f47373b38d3552785c6739a6269f093c5bff95e7af9d4e1860078958dbe881a
-
SHA512
e002aa61a801a8071ac669e5cc5f73cc4a17c9c2f8b960929a8dfe9617344bee6d678f4b998ab5311bbca45960c0410832642fb94916188efa219562d5992124
-
SSDEEP
1536:QUYkcxVKpC6yPMVS07RhcIgH1ba/am2dDgQzcD0SXVclN:QU1cxVENyPMVPNhWH1bawdDgQWFY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
127.0.0.1:4449
127.0.0.1:800
127.0.0.1:600
127.0.0.1:17790
192.168.1.17:4449
192.168.1.17:800
192.168.1.17:600
192.168.1.17:17790
3.142.167.54:4449
3.142.167.54:800
3.142.167.54:600
3.142.167.54:17790
uzaseljnonsxi
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
resource yara_rule behavioral2/memory/5076-1-0x0000000000230000-0x000000000024A000-memory.dmp VenomRAT -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 5076 6f47373b38d3552785c6739a6269f093c5bff95e7af9d4e1860078958dbe881a.exe 5076 6f47373b38d3552785c6739a6269f093c5bff95e7af9d4e1860078958dbe881a.exe 5076 6f47373b38d3552785c6739a6269f093c5bff95e7af9d4e1860078958dbe881a.exe 5076 6f47373b38d3552785c6739a6269f093c5bff95e7af9d4e1860078958dbe881a.exe 5076 6f47373b38d3552785c6739a6269f093c5bff95e7af9d4e1860078958dbe881a.exe 5076 6f47373b38d3552785c6739a6269f093c5bff95e7af9d4e1860078958dbe881a.exe 5076 6f47373b38d3552785c6739a6269f093c5bff95e7af9d4e1860078958dbe881a.exe 5076 6f47373b38d3552785c6739a6269f093c5bff95e7af9d4e1860078958dbe881a.exe 5076 6f47373b38d3552785c6739a6269f093c5bff95e7af9d4e1860078958dbe881a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5076 6f47373b38d3552785c6739a6269f093c5bff95e7af9d4e1860078958dbe881a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5076 6f47373b38d3552785c6739a6269f093c5bff95e7af9d4e1860078958dbe881a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f47373b38d3552785c6739a6269f093c5bff95e7af9d4e1860078958dbe881a.exe"C:\Users\Admin\AppData\Local\Temp\6f47373b38d3552785c6739a6269f093c5bff95e7af9d4e1860078958dbe881a.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5076
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4396,i,7447299413640964517,4240724842020506306,262144 --variations-seed-version --mojo-platform-channel-handle=4360 /prefetch:81⤵PID:1212