Analysis
-
max time kernel
146s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 18:52
Behavioral task
behavioral1
Sample
8ca4a63e29be75e946846530ebbaae1f61426735c844fd09883d964a3fef440c.exe
Resource
win7-20240708-en
General
-
Target
8ca4a63e29be75e946846530ebbaae1f61426735c844fd09883d964a3fef440c.exe
-
Size
74KB
-
MD5
9698c66c9413af74c8746c6692b98b23
-
SHA1
bf7af50dfe45385fd28e4f00301a4caeb518f01b
-
SHA256
8ca4a63e29be75e946846530ebbaae1f61426735c844fd09883d964a3fef440c
-
SHA512
b27fe3fba6da85050d8452e210a1b7314b25e0903a92632413ff7d10c13c7f61082d83deea82e9c25e894ec584e053620e7eca59806201d02d0e98492e43e7e6
-
SSDEEP
1536:EUzkcx4VHsC0SPMVeQ0IG5IXH1bl4kQQzc2LVclN:EUwcx4GfSPMVeQ0IrH1bllQQPBY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
127.0.0.1:4449
127.0.0.1:4444
102.222.204.19:4449
102.222.204.19:4444
uwlyvcszmpjvyj
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2308-1-0x0000000000AC0000-0x0000000000AD8000-memory.dmp VenomRAT -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
8ca4a63e29be75e946846530ebbaae1f61426735c844fd09883d964a3fef440c.exepid process 2308 8ca4a63e29be75e946846530ebbaae1f61426735c844fd09883d964a3fef440c.exe 2308 8ca4a63e29be75e946846530ebbaae1f61426735c844fd09883d964a3fef440c.exe 2308 8ca4a63e29be75e946846530ebbaae1f61426735c844fd09883d964a3fef440c.exe 2308 8ca4a63e29be75e946846530ebbaae1f61426735c844fd09883d964a3fef440c.exe 2308 8ca4a63e29be75e946846530ebbaae1f61426735c844fd09883d964a3fef440c.exe 2308 8ca4a63e29be75e946846530ebbaae1f61426735c844fd09883d964a3fef440c.exe 2308 8ca4a63e29be75e946846530ebbaae1f61426735c844fd09883d964a3fef440c.exe 2308 8ca4a63e29be75e946846530ebbaae1f61426735c844fd09883d964a3fef440c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
8ca4a63e29be75e946846530ebbaae1f61426735c844fd09883d964a3fef440c.exedescription pid process Token: SeDebugPrivilege 2308 8ca4a63e29be75e946846530ebbaae1f61426735c844fd09883d964a3fef440c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
8ca4a63e29be75e946846530ebbaae1f61426735c844fd09883d964a3fef440c.exepid process 2308 8ca4a63e29be75e946846530ebbaae1f61426735c844fd09883d964a3fef440c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ca4a63e29be75e946846530ebbaae1f61426735c844fd09883d964a3fef440c.exe"C:\Users\Admin\AppData\Local\Temp\8ca4a63e29be75e946846530ebbaae1f61426735c844fd09883d964a3fef440c.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2308