Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
31-08-2024 11:09
Behavioral task
behavioral1
Sample
b8c51381be7ad925631d87518c845980N.exe
Resource
win7-20240704-en
windows7-x64
3 signatures
150 seconds
General
-
Target
b8c51381be7ad925631d87518c845980N.exe
-
Size
250KB
-
MD5
b8c51381be7ad925631d87518c845980
-
SHA1
257404d39215cdaf65f78fe632f69dd94e154d38
-
SHA256
efc24d23ceeb2fa3687735caef9f5679cfba72d7e48e97f5b0511ddbe3f658c7
-
SHA512
5f01882737fe778656330ea14eb7ad920d5baa062efa9eec35e64892f5d945734ecc0edb27919714187f73e876a4fd4f1a0a8082ab573cea7e5f3c6d988b2caf
-
SSDEEP
1536:/UxQcxHCapCtGPMVCe9VdQuDIqH1bd/OW13QzcSLVclN:/UOcxHCoeGPMVCe9VdQ4H1bdWGQTBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Vitima
C2
191.215.199.248:4449
Mutex
pqmjwdssgfg
Attributes
-
delay
1
-
install
true
-
install_file
System.exe
-
install_folder
%AppData%
aes.plain
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2948-1-0x00000000001C0000-0x0000000000204000-memory.dmp VenomRAT -
Suspicious use of AdjustPrivilegeToken 43 IoCs
Processes:
b8c51381be7ad925631d87518c845980N.exedescription pid process Token: SeDebugPrivilege 2948 b8c51381be7ad925631d87518c845980N.exe Token: SeIncreaseQuotaPrivilege 2948 b8c51381be7ad925631d87518c845980N.exe Token: SeSecurityPrivilege 2948 b8c51381be7ad925631d87518c845980N.exe Token: SeTakeOwnershipPrivilege 2948 b8c51381be7ad925631d87518c845980N.exe Token: SeLoadDriverPrivilege 2948 b8c51381be7ad925631d87518c845980N.exe Token: SeSystemProfilePrivilege 2948 b8c51381be7ad925631d87518c845980N.exe Token: SeSystemtimePrivilege 2948 b8c51381be7ad925631d87518c845980N.exe Token: SeProfSingleProcessPrivilege 2948 b8c51381be7ad925631d87518c845980N.exe Token: SeIncBasePriorityPrivilege 2948 b8c51381be7ad925631d87518c845980N.exe Token: SeCreatePagefilePrivilege 2948 b8c51381be7ad925631d87518c845980N.exe Token: SeBackupPrivilege 2948 b8c51381be7ad925631d87518c845980N.exe Token: SeRestorePrivilege 2948 b8c51381be7ad925631d87518c845980N.exe Token: SeShutdownPrivilege 2948 b8c51381be7ad925631d87518c845980N.exe Token: SeDebugPrivilege 2948 b8c51381be7ad925631d87518c845980N.exe Token: SeSystemEnvironmentPrivilege 2948 b8c51381be7ad925631d87518c845980N.exe Token: SeRemoteShutdownPrivilege 2948 b8c51381be7ad925631d87518c845980N.exe Token: SeUndockPrivilege 2948 b8c51381be7ad925631d87518c845980N.exe Token: SeManageVolumePrivilege 2948 b8c51381be7ad925631d87518c845980N.exe Token: 33 2948 b8c51381be7ad925631d87518c845980N.exe Token: 34 2948 b8c51381be7ad925631d87518c845980N.exe Token: 35 2948 b8c51381be7ad925631d87518c845980N.exe Token: 36 2948 b8c51381be7ad925631d87518c845980N.exe Token: SeIncreaseQuotaPrivilege 2948 b8c51381be7ad925631d87518c845980N.exe Token: SeSecurityPrivilege 2948 b8c51381be7ad925631d87518c845980N.exe Token: SeTakeOwnershipPrivilege 2948 b8c51381be7ad925631d87518c845980N.exe Token: SeLoadDriverPrivilege 2948 b8c51381be7ad925631d87518c845980N.exe Token: SeSystemProfilePrivilege 2948 b8c51381be7ad925631d87518c845980N.exe Token: SeSystemtimePrivilege 2948 b8c51381be7ad925631d87518c845980N.exe Token: SeProfSingleProcessPrivilege 2948 b8c51381be7ad925631d87518c845980N.exe Token: SeIncBasePriorityPrivilege 2948 b8c51381be7ad925631d87518c845980N.exe Token: SeCreatePagefilePrivilege 2948 b8c51381be7ad925631d87518c845980N.exe Token: SeBackupPrivilege 2948 b8c51381be7ad925631d87518c845980N.exe Token: SeRestorePrivilege 2948 b8c51381be7ad925631d87518c845980N.exe Token: SeShutdownPrivilege 2948 b8c51381be7ad925631d87518c845980N.exe Token: SeDebugPrivilege 2948 b8c51381be7ad925631d87518c845980N.exe Token: SeSystemEnvironmentPrivilege 2948 b8c51381be7ad925631d87518c845980N.exe Token: SeRemoteShutdownPrivilege 2948 b8c51381be7ad925631d87518c845980N.exe Token: SeUndockPrivilege 2948 b8c51381be7ad925631d87518c845980N.exe Token: SeManageVolumePrivilege 2948 b8c51381be7ad925631d87518c845980N.exe Token: 33 2948 b8c51381be7ad925631d87518c845980N.exe Token: 34 2948 b8c51381be7ad925631d87518c845980N.exe Token: 35 2948 b8c51381be7ad925631d87518c845980N.exe Token: 36 2948 b8c51381be7ad925631d87518c845980N.exe