Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 18:52
Behavioral task
behavioral1
Sample
8ca4a63e29be75e946846530ebbaae1f61426735c844fd09883d964a3fef440c.exe
Resource
win7-20240708-en
General
-
Target
8ca4a63e29be75e946846530ebbaae1f61426735c844fd09883d964a3fef440c.exe
-
Size
74KB
-
MD5
9698c66c9413af74c8746c6692b98b23
-
SHA1
bf7af50dfe45385fd28e4f00301a4caeb518f01b
-
SHA256
8ca4a63e29be75e946846530ebbaae1f61426735c844fd09883d964a3fef440c
-
SHA512
b27fe3fba6da85050d8452e210a1b7314b25e0903a92632413ff7d10c13c7f61082d83deea82e9c25e894ec584e053620e7eca59806201d02d0e98492e43e7e6
-
SSDEEP
1536:EUzkcx4VHsC0SPMVeQ0IG5IXH1bl4kQQzc2LVclN:EUwcx4GfSPMVeQ0IrH1bllQQPBY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
127.0.0.1:4449
127.0.0.1:4444
102.222.204.19:4449
102.222.204.19:4444
uwlyvcszmpjvyj
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2572-1-0x0000000000B90000-0x0000000000BA8000-memory.dmp VenomRAT -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
8ca4a63e29be75e946846530ebbaae1f61426735c844fd09883d964a3fef440c.exepid process 2572 8ca4a63e29be75e946846530ebbaae1f61426735c844fd09883d964a3fef440c.exe 2572 8ca4a63e29be75e946846530ebbaae1f61426735c844fd09883d964a3fef440c.exe 2572 8ca4a63e29be75e946846530ebbaae1f61426735c844fd09883d964a3fef440c.exe 2572 8ca4a63e29be75e946846530ebbaae1f61426735c844fd09883d964a3fef440c.exe 2572 8ca4a63e29be75e946846530ebbaae1f61426735c844fd09883d964a3fef440c.exe 2572 8ca4a63e29be75e946846530ebbaae1f61426735c844fd09883d964a3fef440c.exe 2572 8ca4a63e29be75e946846530ebbaae1f61426735c844fd09883d964a3fef440c.exe 2572 8ca4a63e29be75e946846530ebbaae1f61426735c844fd09883d964a3fef440c.exe 2572 8ca4a63e29be75e946846530ebbaae1f61426735c844fd09883d964a3fef440c.exe 2572 8ca4a63e29be75e946846530ebbaae1f61426735c844fd09883d964a3fef440c.exe 2572 8ca4a63e29be75e946846530ebbaae1f61426735c844fd09883d964a3fef440c.exe 2572 8ca4a63e29be75e946846530ebbaae1f61426735c844fd09883d964a3fef440c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
8ca4a63e29be75e946846530ebbaae1f61426735c844fd09883d964a3fef440c.exedescription pid process Token: SeDebugPrivilege 2572 8ca4a63e29be75e946846530ebbaae1f61426735c844fd09883d964a3fef440c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
8ca4a63e29be75e946846530ebbaae1f61426735c844fd09883d964a3fef440c.exepid process 2572 8ca4a63e29be75e946846530ebbaae1f61426735c844fd09883d964a3fef440c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ca4a63e29be75e946846530ebbaae1f61426735c844fd09883d964a3fef440c.exe"C:\Users\Admin\AppData\Local\Temp\8ca4a63e29be75e946846530ebbaae1f61426735c844fd09883d964a3fef440c.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2572