Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 18:59
Behavioral task
behavioral1
Sample
bfaa1a2e64a91e8d1cc56bc9ac7d906b135b41d5b155c43af147e6590c596cd6.exe
Resource
win7-20240708-en
5 signatures
150 seconds
General
-
Target
bfaa1a2e64a91e8d1cc56bc9ac7d906b135b41d5b155c43af147e6590c596cd6.exe
-
Size
73KB
-
MD5
338cee4d2b3e4d1a0ce18dd982eefbcd
-
SHA1
183d34238bf60cf1b0261efcce4ce8deb3852d60
-
SHA256
bfaa1a2e64a91e8d1cc56bc9ac7d906b135b41d5b155c43af147e6590c596cd6
-
SHA512
6325b74c2ec4fd8429822766e08f29750cdb2968560ffe719bef866f0147b0e246d309240339035c500aac6db66a81ec9c3e16a5199d7f58589debff2cd29f6c
-
SSDEEP
1536:CSUEkcxNYungvHZDJ/SkXizIqksbLvPMwS2n6g3dHKH1blbTFxXbwzUQbVclN:CSUxcxNYungPZDJ/SkXizIqks/vPMwSP
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.2
Botnet
Default
C2
45.88.91.103:4545
Mutex
rhnwhvnnkyidnvwavvp
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
resource yara_rule behavioral1/memory/2316-1-0x00000000010E0000-0x00000000010F8000-memory.dmp VenomRAT -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2316 bfaa1a2e64a91e8d1cc56bc9ac7d906b135b41d5b155c43af147e6590c596cd6.exe 2316 bfaa1a2e64a91e8d1cc56bc9ac7d906b135b41d5b155c43af147e6590c596cd6.exe 2316 bfaa1a2e64a91e8d1cc56bc9ac7d906b135b41d5b155c43af147e6590c596cd6.exe 2316 bfaa1a2e64a91e8d1cc56bc9ac7d906b135b41d5b155c43af147e6590c596cd6.exe 2316 bfaa1a2e64a91e8d1cc56bc9ac7d906b135b41d5b155c43af147e6590c596cd6.exe 2316 bfaa1a2e64a91e8d1cc56bc9ac7d906b135b41d5b155c43af147e6590c596cd6.exe 2316 bfaa1a2e64a91e8d1cc56bc9ac7d906b135b41d5b155c43af147e6590c596cd6.exe 2316 bfaa1a2e64a91e8d1cc56bc9ac7d906b135b41d5b155c43af147e6590c596cd6.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2316 bfaa1a2e64a91e8d1cc56bc9ac7d906b135b41d5b155c43af147e6590c596cd6.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2316 bfaa1a2e64a91e8d1cc56bc9ac7d906b135b41d5b155c43af147e6590c596cd6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfaa1a2e64a91e8d1cc56bc9ac7d906b135b41d5b155c43af147e6590c596cd6.exe"C:\Users\Admin\AppData\Local\Temp\bfaa1a2e64a91e8d1cc56bc9ac7d906b135b41d5b155c43af147e6590c596cd6.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2316