Analysis
-
max time kernel
29s -
max time network
32s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
09/09/2024, 03:49
Static task
static1
Behavioral task
behavioral1
Sample
r6core.exe
Resource
win11-20240802-en
General
-
Target
r6core.exe
-
Size
135KB
-
MD5
9a37880c5ffefb36ebc2ad17b8a2ad85
-
SHA1
ac00f0071d2f95606c9963f2d6156c73e547b556
-
SHA256
269d075e3c034c75dd202678f7508d0b90e06fb06ab1fb8eb970b70f7bffeb7e
-
SHA512
889b557cf1a79c467b75d26d5749780feefd8a920ecf8f26ba8a0478d946fca19beddfa18bf59d6eac56ace7c4017245b1191117a5e7b8b306aa8333d09622c7
-
SSDEEP
1536:bSGOtP1YjItQqXZ0Hh4Swxw5kFzZN0qhXLIEWTQWmt04KvST6EUg6z/8Tap325Y5:bktXWB4SwykFNXLqTQBtLKtxJp3v4eZ
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Nymeria
94.232.249.235:4449
94.232.249.235:13001
uzzpgldlipcvvtx
-
delay
1
-
install
false
-
install_folder
%Temp%
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3540 nopu.exe -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3540 set thread context of 3632 3540 nopu.exe 83 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language r6core.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3384 powershell.exe 3384 powershell.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: SeDebugPrivilege 3632 csc.exe Token: SeDebugPrivilege 3384 powershell.exe Token: SeIncreaseQuotaPrivilege 3632 csc.exe Token: SeSecurityPrivilege 3632 csc.exe Token: SeTakeOwnershipPrivilege 3632 csc.exe Token: SeLoadDriverPrivilege 3632 csc.exe Token: SeSystemProfilePrivilege 3632 csc.exe Token: SeSystemtimePrivilege 3632 csc.exe Token: SeProfSingleProcessPrivilege 3632 csc.exe Token: SeIncBasePriorityPrivilege 3632 csc.exe Token: SeCreatePagefilePrivilege 3632 csc.exe Token: SeBackupPrivilege 3632 csc.exe Token: SeRestorePrivilege 3632 csc.exe Token: SeShutdownPrivilege 3632 csc.exe Token: SeDebugPrivilege 3632 csc.exe Token: SeSystemEnvironmentPrivilege 3632 csc.exe Token: SeRemoteShutdownPrivilege 3632 csc.exe Token: SeUndockPrivilege 3632 csc.exe Token: SeManageVolumePrivilege 3632 csc.exe Token: 33 3632 csc.exe Token: 34 3632 csc.exe Token: 35 3632 csc.exe Token: 36 3632 csc.exe Token: SeIncreaseQuotaPrivilege 3632 csc.exe Token: SeSecurityPrivilege 3632 csc.exe Token: SeTakeOwnershipPrivilege 3632 csc.exe Token: SeLoadDriverPrivilege 3632 csc.exe Token: SeSystemProfilePrivilege 3632 csc.exe Token: SeSystemtimePrivilege 3632 csc.exe Token: SeProfSingleProcessPrivilege 3632 csc.exe Token: SeIncBasePriorityPrivilege 3632 csc.exe Token: SeCreatePagefilePrivilege 3632 csc.exe Token: SeBackupPrivilege 3632 csc.exe Token: SeRestorePrivilege 3632 csc.exe Token: SeShutdownPrivilege 3632 csc.exe Token: SeDebugPrivilege 3632 csc.exe Token: SeSystemEnvironmentPrivilege 3632 csc.exe Token: SeRemoteShutdownPrivilege 3632 csc.exe Token: SeUndockPrivilege 3632 csc.exe Token: SeManageVolumePrivilege 3632 csc.exe Token: 33 3632 csc.exe Token: 34 3632 csc.exe Token: 35 3632 csc.exe Token: 36 3632 csc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2380 wrote to memory of 3384 2380 r6core.exe 80 PID 2380 wrote to memory of 3384 2380 r6core.exe 80 PID 2380 wrote to memory of 3384 2380 r6core.exe 80 PID 2380 wrote to memory of 3540 2380 r6core.exe 82 PID 2380 wrote to memory of 3540 2380 r6core.exe 82 PID 3540 wrote to memory of 3632 3540 nopu.exe 83 PID 3540 wrote to memory of 3632 3540 nopu.exe 83 PID 3540 wrote to memory of 3632 3540 nopu.exe 83 PID 3540 wrote to memory of 3632 3540 nopu.exe 83 PID 3540 wrote to memory of 3632 3540 nopu.exe 83 PID 3540 wrote to memory of 3632 3540 nopu.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\r6core.exe"C:\Users\Admin\AppData\Local\Temp\r6core.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAZQBwACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGgAcgBuACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHMAdQBsACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGwAbAB0ACMAPgA="2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3384
-
-
C:\Users\Admin\AppData\Local\Temp\nopu.exe"C:\Users\Admin\AppData\Local\Temp\nopu.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3632
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
126KB
MD521aa889aaa988c257ec75cdf60803b66
SHA1ad70aa9e9479153a6c9043ce493fcd7de8ee4aef
SHA256c434a99e79aadd1c40cf84791b396caee931eda1c0fd5036663fa62827915d4d
SHA512a69d191b5896dc1dd4f8221bb4592dd227534aa4eeb2cfaec0f9420b8632c1f8526287a609ffc5f3c2f141bce5932a77783f17b967cdd32b184901d22a6f48f5