Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 19:03
Behavioral task
behavioral1
Sample
d28f7450c5e67578a648fc4530ef2aa04cccd0ad4e77f64188b561931cf7a223.exe
Resource
win7-20240705-en
General
-
Target
d28f7450c5e67578a648fc4530ef2aa04cccd0ad4e77f64188b561931cf7a223.exe
-
Size
73KB
-
MD5
030091b2ee5ee4eed596203d2898df70
-
SHA1
e483a5287167c3aee7539b2b10b4de320a1e9e3e
-
SHA256
d28f7450c5e67578a648fc4530ef2aa04cccd0ad4e77f64188b561931cf7a223
-
SHA512
e2c9783d0d4d55d6e89303c430e40027a47a784cb4f62e0e67815af56a9578fd8c501397b105c457141982081d1c08bae6ac8217d5167055a46376290825e9ec
-
SSDEEP
1536:TUUPcxVteCW7PMVee9VdQkhDIyH1bf/jJIQzcPtVclNU:TUmcxV4x7PMVee9VdQgH1bfLJIQS/Yi
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
127.0.0.1:4449
127.0.0.1:9090
fayznitpzwwzts
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4176-1-0x0000000000040000-0x0000000000056000-memory.dmp VenomRAT -
Suspicious behavior: EnumeratesProcesses 31 IoCs
Processes:
d28f7450c5e67578a648fc4530ef2aa04cccd0ad4e77f64188b561931cf7a223.exepid process 4176 d28f7450c5e67578a648fc4530ef2aa04cccd0ad4e77f64188b561931cf7a223.exe 4176 d28f7450c5e67578a648fc4530ef2aa04cccd0ad4e77f64188b561931cf7a223.exe 4176 d28f7450c5e67578a648fc4530ef2aa04cccd0ad4e77f64188b561931cf7a223.exe 4176 d28f7450c5e67578a648fc4530ef2aa04cccd0ad4e77f64188b561931cf7a223.exe 4176 d28f7450c5e67578a648fc4530ef2aa04cccd0ad4e77f64188b561931cf7a223.exe 4176 d28f7450c5e67578a648fc4530ef2aa04cccd0ad4e77f64188b561931cf7a223.exe 4176 d28f7450c5e67578a648fc4530ef2aa04cccd0ad4e77f64188b561931cf7a223.exe 4176 d28f7450c5e67578a648fc4530ef2aa04cccd0ad4e77f64188b561931cf7a223.exe 4176 d28f7450c5e67578a648fc4530ef2aa04cccd0ad4e77f64188b561931cf7a223.exe 4176 d28f7450c5e67578a648fc4530ef2aa04cccd0ad4e77f64188b561931cf7a223.exe 4176 d28f7450c5e67578a648fc4530ef2aa04cccd0ad4e77f64188b561931cf7a223.exe 4176 d28f7450c5e67578a648fc4530ef2aa04cccd0ad4e77f64188b561931cf7a223.exe 4176 d28f7450c5e67578a648fc4530ef2aa04cccd0ad4e77f64188b561931cf7a223.exe 4176 d28f7450c5e67578a648fc4530ef2aa04cccd0ad4e77f64188b561931cf7a223.exe 4176 d28f7450c5e67578a648fc4530ef2aa04cccd0ad4e77f64188b561931cf7a223.exe 4176 d28f7450c5e67578a648fc4530ef2aa04cccd0ad4e77f64188b561931cf7a223.exe 4176 d28f7450c5e67578a648fc4530ef2aa04cccd0ad4e77f64188b561931cf7a223.exe 4176 d28f7450c5e67578a648fc4530ef2aa04cccd0ad4e77f64188b561931cf7a223.exe 4176 d28f7450c5e67578a648fc4530ef2aa04cccd0ad4e77f64188b561931cf7a223.exe 4176 d28f7450c5e67578a648fc4530ef2aa04cccd0ad4e77f64188b561931cf7a223.exe 4176 d28f7450c5e67578a648fc4530ef2aa04cccd0ad4e77f64188b561931cf7a223.exe 4176 d28f7450c5e67578a648fc4530ef2aa04cccd0ad4e77f64188b561931cf7a223.exe 4176 d28f7450c5e67578a648fc4530ef2aa04cccd0ad4e77f64188b561931cf7a223.exe 4176 d28f7450c5e67578a648fc4530ef2aa04cccd0ad4e77f64188b561931cf7a223.exe 4176 d28f7450c5e67578a648fc4530ef2aa04cccd0ad4e77f64188b561931cf7a223.exe 4176 d28f7450c5e67578a648fc4530ef2aa04cccd0ad4e77f64188b561931cf7a223.exe 4176 d28f7450c5e67578a648fc4530ef2aa04cccd0ad4e77f64188b561931cf7a223.exe 4176 d28f7450c5e67578a648fc4530ef2aa04cccd0ad4e77f64188b561931cf7a223.exe 4176 d28f7450c5e67578a648fc4530ef2aa04cccd0ad4e77f64188b561931cf7a223.exe 4176 d28f7450c5e67578a648fc4530ef2aa04cccd0ad4e77f64188b561931cf7a223.exe 4176 d28f7450c5e67578a648fc4530ef2aa04cccd0ad4e77f64188b561931cf7a223.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
d28f7450c5e67578a648fc4530ef2aa04cccd0ad4e77f64188b561931cf7a223.exedescription pid process Token: SeDebugPrivilege 4176 d28f7450c5e67578a648fc4530ef2aa04cccd0ad4e77f64188b561931cf7a223.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
d28f7450c5e67578a648fc4530ef2aa04cccd0ad4e77f64188b561931cf7a223.exepid process 4176 d28f7450c5e67578a648fc4530ef2aa04cccd0ad4e77f64188b561931cf7a223.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d28f7450c5e67578a648fc4530ef2aa04cccd0ad4e77f64188b561931cf7a223.exe"C:\Users\Admin\AppData\Local\Temp\d28f7450c5e67578a648fc4530ef2aa04cccd0ad4e77f64188b561931cf7a223.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4176