Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 18:57
Behavioral task
behavioral1
Sample
b338e4d15224efcb05fc9962d00293eb07d48a484a85b96139ec6e6943326ec8.exe
Resource
win7-20240704-en
5 signatures
150 seconds
General
-
Target
b338e4d15224efcb05fc9962d00293eb07d48a484a85b96139ec6e6943326ec8.exe
-
Size
141KB
-
MD5
074e70bc39ea413de1f6c26ad96a1679
-
SHA1
b7642b2803ee63343e9effb8058b72102f2606e6
-
SHA256
b338e4d15224efcb05fc9962d00293eb07d48a484a85b96139ec6e6943326ec8
-
SHA512
3bd30388d762e4bbebcbe27fd571a61497a115c28dabcaf975e0e735f1397c1fcd1b3cdff9c7e6f32f61347e37f5af69919e765d0395e95fd31527e3b43fc597
-
SSDEEP
3072:4Uxcx4GfSPMVav8BH1bUtr4QDwbvW9JY:45fSPMVxBVbY4QKM
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
127.0.0.1:4449
Mutex
ujcsuxmcxzlznlvaz
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
resource yara_rule behavioral2/memory/3992-1-0x0000000000BF0000-0x0000000000C18000-memory.dmp VenomRAT -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 3992 b338e4d15224efcb05fc9962d00293eb07d48a484a85b96139ec6e6943326ec8.exe 3992 b338e4d15224efcb05fc9962d00293eb07d48a484a85b96139ec6e6943326ec8.exe 3992 b338e4d15224efcb05fc9962d00293eb07d48a484a85b96139ec6e6943326ec8.exe 3992 b338e4d15224efcb05fc9962d00293eb07d48a484a85b96139ec6e6943326ec8.exe 3992 b338e4d15224efcb05fc9962d00293eb07d48a484a85b96139ec6e6943326ec8.exe 3992 b338e4d15224efcb05fc9962d00293eb07d48a484a85b96139ec6e6943326ec8.exe 3992 b338e4d15224efcb05fc9962d00293eb07d48a484a85b96139ec6e6943326ec8.exe 3992 b338e4d15224efcb05fc9962d00293eb07d48a484a85b96139ec6e6943326ec8.exe 3992 b338e4d15224efcb05fc9962d00293eb07d48a484a85b96139ec6e6943326ec8.exe 3992 b338e4d15224efcb05fc9962d00293eb07d48a484a85b96139ec6e6943326ec8.exe 3992 b338e4d15224efcb05fc9962d00293eb07d48a484a85b96139ec6e6943326ec8.exe 3992 b338e4d15224efcb05fc9962d00293eb07d48a484a85b96139ec6e6943326ec8.exe 3992 b338e4d15224efcb05fc9962d00293eb07d48a484a85b96139ec6e6943326ec8.exe 3992 b338e4d15224efcb05fc9962d00293eb07d48a484a85b96139ec6e6943326ec8.exe 3992 b338e4d15224efcb05fc9962d00293eb07d48a484a85b96139ec6e6943326ec8.exe 3992 b338e4d15224efcb05fc9962d00293eb07d48a484a85b96139ec6e6943326ec8.exe 3992 b338e4d15224efcb05fc9962d00293eb07d48a484a85b96139ec6e6943326ec8.exe 3992 b338e4d15224efcb05fc9962d00293eb07d48a484a85b96139ec6e6943326ec8.exe 3992 b338e4d15224efcb05fc9962d00293eb07d48a484a85b96139ec6e6943326ec8.exe 3992 b338e4d15224efcb05fc9962d00293eb07d48a484a85b96139ec6e6943326ec8.exe 3992 b338e4d15224efcb05fc9962d00293eb07d48a484a85b96139ec6e6943326ec8.exe 3992 b338e4d15224efcb05fc9962d00293eb07d48a484a85b96139ec6e6943326ec8.exe 3992 b338e4d15224efcb05fc9962d00293eb07d48a484a85b96139ec6e6943326ec8.exe 3992 b338e4d15224efcb05fc9962d00293eb07d48a484a85b96139ec6e6943326ec8.exe 3992 b338e4d15224efcb05fc9962d00293eb07d48a484a85b96139ec6e6943326ec8.exe 3992 b338e4d15224efcb05fc9962d00293eb07d48a484a85b96139ec6e6943326ec8.exe 3992 b338e4d15224efcb05fc9962d00293eb07d48a484a85b96139ec6e6943326ec8.exe 3992 b338e4d15224efcb05fc9962d00293eb07d48a484a85b96139ec6e6943326ec8.exe 3992 b338e4d15224efcb05fc9962d00293eb07d48a484a85b96139ec6e6943326ec8.exe 3992 b338e4d15224efcb05fc9962d00293eb07d48a484a85b96139ec6e6943326ec8.exe 3992 b338e4d15224efcb05fc9962d00293eb07d48a484a85b96139ec6e6943326ec8.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3992 b338e4d15224efcb05fc9962d00293eb07d48a484a85b96139ec6e6943326ec8.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3992 b338e4d15224efcb05fc9962d00293eb07d48a484a85b96139ec6e6943326ec8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b338e4d15224efcb05fc9962d00293eb07d48a484a85b96139ec6e6943326ec8.exe"C:\Users\Admin\AppData\Local\Temp\b338e4d15224efcb05fc9962d00293eb07d48a484a85b96139ec6e6943326ec8.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3992