Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 19:01
Behavioral task
behavioral1
Sample
c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe
Resource
win7-20240708-en
windows7-x64
3 signatures
150 seconds
General
-
Target
c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe
-
Size
97KB
-
MD5
03bd7ef1df466c4575bd090bb95a747d
-
SHA1
a2add458afcda96926dbe883deb0ca1215d2b97d
-
SHA256
c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d
-
SHA512
d08d0e42c1d7f13cb9a94399516bf4be08381c9d095bf8837abbe38410947219eec0055e33fc0fbca13cf844be68ae62b435b08360d90d96215ba8f2d286b851
-
SSDEEP
1536:DUdccxlfNC86PMVz6DeI/H1bY/Q1sQzcMzSpwIjezi5RLaVclN:DUecxlFT6PMVzqnH1bY6sQ6dl5hoY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
Mutex
ratrtlnyvgc
Attributes
-
delay
1
-
install
true
-
install_file
Craftrise.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.ai/raw/r1x5mktdog
aes.plain
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2192-1-0x0000000000650000-0x000000000066E000-memory.dmp VenomRAT -
Suspicious use of AdjustPrivilegeToken 43 IoCs
Processes:
c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exedescription pid process Token: SeDebugPrivilege 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe Token: SeIncreaseQuotaPrivilege 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe Token: SeSecurityPrivilege 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe Token: SeTakeOwnershipPrivilege 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe Token: SeLoadDriverPrivilege 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe Token: SeSystemProfilePrivilege 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe Token: SeSystemtimePrivilege 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe Token: SeProfSingleProcessPrivilege 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe Token: SeIncBasePriorityPrivilege 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe Token: SeCreatePagefilePrivilege 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe Token: SeBackupPrivilege 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe Token: SeRestorePrivilege 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe Token: SeShutdownPrivilege 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe Token: SeDebugPrivilege 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe Token: SeSystemEnvironmentPrivilege 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe Token: SeRemoteShutdownPrivilege 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe Token: SeUndockPrivilege 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe Token: SeManageVolumePrivilege 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe Token: 33 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe Token: 34 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe Token: 35 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe Token: 36 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe Token: SeIncreaseQuotaPrivilege 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe Token: SeSecurityPrivilege 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe Token: SeTakeOwnershipPrivilege 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe Token: SeLoadDriverPrivilege 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe Token: SeSystemProfilePrivilege 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe Token: SeSystemtimePrivilege 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe Token: SeProfSingleProcessPrivilege 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe Token: SeIncBasePriorityPrivilege 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe Token: SeCreatePagefilePrivilege 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe Token: SeBackupPrivilege 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe Token: SeRestorePrivilege 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe Token: SeShutdownPrivilege 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe Token: SeDebugPrivilege 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe Token: SeSystemEnvironmentPrivilege 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe Token: SeRemoteShutdownPrivilege 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe Token: SeUndockPrivilege 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe Token: SeManageVolumePrivilege 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe Token: 33 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe Token: 34 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe Token: 35 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe Token: 36 2192 c89af186b8d79475031d4177e9fd1d6f97e86ed680a5d152d5625debac44755d.exe