Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 19:00
Behavioral task
behavioral1
Sample
c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe
Resource
win7-20240705-en
6 signatures
150 seconds
General
-
Target
c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe
-
Size
74KB
-
MD5
297a7df52e1057b2205815014c641b22
-
SHA1
72c2dd4a8ddd8dafd78bcbd4414f45e14c512a0e
-
SHA256
c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02
-
SHA512
f774d69e212bdc1b7fd72fec6ea216e576415fa685e416488a970bbc65239f39e8af633ac2325cc9eb165d8042af6073d7bd5eb92b1b2971271c55960dba2b23
-
SSDEEP
1536:PUk0cxVGlCBiPMVB53pIZl3H1bI/lQzcaLVclN:PURcxVMWiPMV7sl3H1bI9QLBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
Mutex
laegpkrxtpvxpx
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/73rUA0XA
aes.plain
Signatures
-
resource yara_rule behavioral1/memory/2764-1-0x0000000000EA0000-0x0000000000EB8000-memory.dmp VenomRAT -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 pastebin.com 4 pastebin.com -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2764 c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe"C:\Users\Admin\AppData\Local\Temp\c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2764