Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 01:24
Behavioral task
behavioral1
Sample
b8c51381be7ad925631d87518c845980N.exe
Resource
win7-20240708-en
windows7-x64
3 signatures
120 seconds
General
-
Target
b8c51381be7ad925631d87518c845980N.exe
-
Size
250KB
-
MD5
b8c51381be7ad925631d87518c845980
-
SHA1
257404d39215cdaf65f78fe632f69dd94e154d38
-
SHA256
efc24d23ceeb2fa3687735caef9f5679cfba72d7e48e97f5b0511ddbe3f658c7
-
SHA512
5f01882737fe778656330ea14eb7ad920d5baa062efa9eec35e64892f5d945734ecc0edb27919714187f73e876a4fd4f1a0a8082ab573cea7e5f3c6d988b2caf
-
SSDEEP
1536:/UxQcxHCapCtGPMVCe9VdQuDIqH1bd/OW13QzcSLVclN:/UOcxHCoeGPMVCe9VdQ4H1bdWGQTBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Vitima
C2
191.215.199.248:4449
Mutex
pqmjwdssgfg
Attributes
-
delay
1
-
install
true
-
install_file
System.exe
-
install_folder
%AppData%
aes.plain
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4108-1-0x0000000000450000-0x0000000000494000-memory.dmp VenomRAT -
Suspicious use of AdjustPrivilegeToken 43 IoCs
Processes:
b8c51381be7ad925631d87518c845980N.exedescription pid process Token: SeDebugPrivilege 4108 b8c51381be7ad925631d87518c845980N.exe Token: SeIncreaseQuotaPrivilege 4108 b8c51381be7ad925631d87518c845980N.exe Token: SeSecurityPrivilege 4108 b8c51381be7ad925631d87518c845980N.exe Token: SeTakeOwnershipPrivilege 4108 b8c51381be7ad925631d87518c845980N.exe Token: SeLoadDriverPrivilege 4108 b8c51381be7ad925631d87518c845980N.exe Token: SeSystemProfilePrivilege 4108 b8c51381be7ad925631d87518c845980N.exe Token: SeSystemtimePrivilege 4108 b8c51381be7ad925631d87518c845980N.exe Token: SeProfSingleProcessPrivilege 4108 b8c51381be7ad925631d87518c845980N.exe Token: SeIncBasePriorityPrivilege 4108 b8c51381be7ad925631d87518c845980N.exe Token: SeCreatePagefilePrivilege 4108 b8c51381be7ad925631d87518c845980N.exe Token: SeBackupPrivilege 4108 b8c51381be7ad925631d87518c845980N.exe Token: SeRestorePrivilege 4108 b8c51381be7ad925631d87518c845980N.exe Token: SeShutdownPrivilege 4108 b8c51381be7ad925631d87518c845980N.exe Token: SeDebugPrivilege 4108 b8c51381be7ad925631d87518c845980N.exe Token: SeSystemEnvironmentPrivilege 4108 b8c51381be7ad925631d87518c845980N.exe Token: SeRemoteShutdownPrivilege 4108 b8c51381be7ad925631d87518c845980N.exe Token: SeUndockPrivilege 4108 b8c51381be7ad925631d87518c845980N.exe Token: SeManageVolumePrivilege 4108 b8c51381be7ad925631d87518c845980N.exe Token: 33 4108 b8c51381be7ad925631d87518c845980N.exe Token: 34 4108 b8c51381be7ad925631d87518c845980N.exe Token: 35 4108 b8c51381be7ad925631d87518c845980N.exe Token: 36 4108 b8c51381be7ad925631d87518c845980N.exe Token: SeIncreaseQuotaPrivilege 4108 b8c51381be7ad925631d87518c845980N.exe Token: SeSecurityPrivilege 4108 b8c51381be7ad925631d87518c845980N.exe Token: SeTakeOwnershipPrivilege 4108 b8c51381be7ad925631d87518c845980N.exe Token: SeLoadDriverPrivilege 4108 b8c51381be7ad925631d87518c845980N.exe Token: SeSystemProfilePrivilege 4108 b8c51381be7ad925631d87518c845980N.exe Token: SeSystemtimePrivilege 4108 b8c51381be7ad925631d87518c845980N.exe Token: SeProfSingleProcessPrivilege 4108 b8c51381be7ad925631d87518c845980N.exe Token: SeIncBasePriorityPrivilege 4108 b8c51381be7ad925631d87518c845980N.exe Token: SeCreatePagefilePrivilege 4108 b8c51381be7ad925631d87518c845980N.exe Token: SeBackupPrivilege 4108 b8c51381be7ad925631d87518c845980N.exe Token: SeRestorePrivilege 4108 b8c51381be7ad925631d87518c845980N.exe Token: SeShutdownPrivilege 4108 b8c51381be7ad925631d87518c845980N.exe Token: SeDebugPrivilege 4108 b8c51381be7ad925631d87518c845980N.exe Token: SeSystemEnvironmentPrivilege 4108 b8c51381be7ad925631d87518c845980N.exe Token: SeRemoteShutdownPrivilege 4108 b8c51381be7ad925631d87518c845980N.exe Token: SeUndockPrivilege 4108 b8c51381be7ad925631d87518c845980N.exe Token: SeManageVolumePrivilege 4108 b8c51381be7ad925631d87518c845980N.exe Token: 33 4108 b8c51381be7ad925631d87518c845980N.exe Token: 34 4108 b8c51381be7ad925631d87518c845980N.exe Token: 35 4108 b8c51381be7ad925631d87518c845980N.exe Token: 36 4108 b8c51381be7ad925631d87518c845980N.exe