Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 19:09
Behavioral task
behavioral1
Sample
f9ea2819dcba78770d80e6ed9b8d2ae72888bd0045f9e0bc6646fd2f375230bb.exe
Resource
win7-20240704-en
windows7-x64
5 signatures
150 seconds
General
-
Target
f9ea2819dcba78770d80e6ed9b8d2ae72888bd0045f9e0bc6646fd2f375230bb.exe
-
Size
74KB
-
MD5
11a301e2655eec32e77ce458b3801af0
-
SHA1
0bae394cf6f7f2b262c9a099dec11a8cb8b51464
-
SHA256
f9ea2819dcba78770d80e6ed9b8d2ae72888bd0045f9e0bc6646fd2f375230bb
-
SHA512
62cd3c9fc5030d26387efe23940c71961fe69638b563856d7d6e4e0076d838d2aaa65f3972d742c2c8457ab6fa255466f5950b40728ebdb1025035da2d8f4eb7
-
SSDEEP
1536:8UUPcxVteCW7PMVee9VdQuDI6H1bf/pmysQzcBLVclN:8UmcxV4x7PMVee9VdQsH1bfxm/QYBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
78.84.88.9:55389
Mutex
kazpxtdaikacwes
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1908-1-0x0000000000240000-0x0000000000258000-memory.dmp VenomRAT -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
f9ea2819dcba78770d80e6ed9b8d2ae72888bd0045f9e0bc6646fd2f375230bb.exepid process 1908 f9ea2819dcba78770d80e6ed9b8d2ae72888bd0045f9e0bc6646fd2f375230bb.exe 1908 f9ea2819dcba78770d80e6ed9b8d2ae72888bd0045f9e0bc6646fd2f375230bb.exe 1908 f9ea2819dcba78770d80e6ed9b8d2ae72888bd0045f9e0bc6646fd2f375230bb.exe 1908 f9ea2819dcba78770d80e6ed9b8d2ae72888bd0045f9e0bc6646fd2f375230bb.exe 1908 f9ea2819dcba78770d80e6ed9b8d2ae72888bd0045f9e0bc6646fd2f375230bb.exe 1908 f9ea2819dcba78770d80e6ed9b8d2ae72888bd0045f9e0bc6646fd2f375230bb.exe 1908 f9ea2819dcba78770d80e6ed9b8d2ae72888bd0045f9e0bc6646fd2f375230bb.exe 1908 f9ea2819dcba78770d80e6ed9b8d2ae72888bd0045f9e0bc6646fd2f375230bb.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
f9ea2819dcba78770d80e6ed9b8d2ae72888bd0045f9e0bc6646fd2f375230bb.exedescription pid process Token: SeDebugPrivilege 1908 f9ea2819dcba78770d80e6ed9b8d2ae72888bd0045f9e0bc6646fd2f375230bb.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
f9ea2819dcba78770d80e6ed9b8d2ae72888bd0045f9e0bc6646fd2f375230bb.exepid process 1908 f9ea2819dcba78770d80e6ed9b8d2ae72888bd0045f9e0bc6646fd2f375230bb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9ea2819dcba78770d80e6ed9b8d2ae72888bd0045f9e0bc6646fd2f375230bb.exe"C:\Users\Admin\AppData\Local\Temp\f9ea2819dcba78770d80e6ed9b8d2ae72888bd0045f9e0bc6646fd2f375230bb.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1908