Analysis
-
max time kernel
147s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 19:04
Behavioral task
behavioral1
Sample
d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe
Resource
win7-20240729-en
5 signatures
150 seconds
General
-
Target
d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe
-
Size
74KB
-
MD5
dbf5f23f69303716a9dbf7b8f54d8521
-
SHA1
fb4a707a4e87cb938bb656d6e3e9ca4e6e23d407
-
SHA256
d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc
-
SHA512
27f7aabf3bf7e0e205b124a029245a10e91e3f306c82f27ccd229787559fe5b9bc08f27192eaf04b4d6aaf3f2c5f9e2eab99a253b6b70af2aef8eb40add5a66c
-
SSDEEP
1536:KUUPcxVteCW7PMVee9VdQuDI6H1bf/keKkQzc2BVclN:KUmcxV4x7PMVee9VdQsH1bf8KQ3rY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
127.0.0.1:13116
Mutex
ycyhuvzrwnniemz
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
resource yara_rule behavioral1/memory/376-1-0x00000000001E0000-0x00000000001F8000-memory.dmp VenomRAT -
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 376 d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe 376 d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe 376 d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe 376 d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe 376 d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe 376 d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe 376 d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe 376 d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe 376 d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe 376 d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe 376 d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe 376 d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe 376 d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe 376 d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe 376 d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe 376 d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe 376 d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe 376 d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe 376 d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe 376 d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe 376 d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe 376 d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe 376 d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe 376 d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe 376 d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe 376 d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe 376 d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe 376 d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe 376 d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe 376 d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe 376 d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe 376 d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe 376 d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe 376 d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe 376 d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe 376 d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe 376 d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe 376 d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 376 d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 376 d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe"C:\Users\Admin\AppData\Local\Temp\d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:376