Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-10-2024 10:54
Behavioral task
behavioral1
Sample
7873d35d4c9ed8188f0a96466c30c704a0c6b327cc8be398d9ed1cd1df26a289.exe
Resource
win7-20240903-en
General
-
Target
7873d35d4c9ed8188f0a96466c30c704a0c6b327cc8be398d9ed1cd1df26a289.exe
-
Size
74KB
-
MD5
db502a66ed6eba1496277893356009a3
-
SHA1
7a298afae8c4523dc51245d0d9a5aa8d2a1bfe3e
-
SHA256
7873d35d4c9ed8188f0a96466c30c704a0c6b327cc8be398d9ed1cd1df26a289
-
SHA512
e6a1c0d25da04d9ee68df5aeab7eaa8d695d8f73031d23b1aaf275dc57cb84784f0d2cc13e670c67676df7c53afdfdc3f653315a5c119584b4790267391346c3
-
SSDEEP
1536:1ULkcxVKpC6yPMVKe9VdQuDI6H1bf/ISCQzcGLVclN:1UocxVENyPMVKe9VdQsH1bfwSCQfBY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
frirxjguotjierkd
-
delay
1
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/E41BUzEu
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2536-1-0x0000000000540000-0x0000000000558000-memory.dmp VenomRAT -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
7873d35d4c9ed8188f0a96466c30c704a0c6b327cc8be398d9ed1cd1df26a289.exepid process 2536 7873d35d4c9ed8188f0a96466c30c704a0c6b327cc8be398d9ed1cd1df26a289.exe 2536 7873d35d4c9ed8188f0a96466c30c704a0c6b327cc8be398d9ed1cd1df26a289.exe 2536 7873d35d4c9ed8188f0a96466c30c704a0c6b327cc8be398d9ed1cd1df26a289.exe 2536 7873d35d4c9ed8188f0a96466c30c704a0c6b327cc8be398d9ed1cd1df26a289.exe 2536 7873d35d4c9ed8188f0a96466c30c704a0c6b327cc8be398d9ed1cd1df26a289.exe 2536 7873d35d4c9ed8188f0a96466c30c704a0c6b327cc8be398d9ed1cd1df26a289.exe 2536 7873d35d4c9ed8188f0a96466c30c704a0c6b327cc8be398d9ed1cd1df26a289.exe 2536 7873d35d4c9ed8188f0a96466c30c704a0c6b327cc8be398d9ed1cd1df26a289.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
7873d35d4c9ed8188f0a96466c30c704a0c6b327cc8be398d9ed1cd1df26a289.exedescription pid process Token: SeDebugPrivilege 2536 7873d35d4c9ed8188f0a96466c30c704a0c6b327cc8be398d9ed1cd1df26a289.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
7873d35d4c9ed8188f0a96466c30c704a0c6b327cc8be398d9ed1cd1df26a289.exepid process 2536 7873d35d4c9ed8188f0a96466c30c704a0c6b327cc8be398d9ed1cd1df26a289.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7873d35d4c9ed8188f0a96466c30c704a0c6b327cc8be398d9ed1cd1df26a289.exe"C:\Users\Admin\AppData\Local\Temp\7873d35d4c9ed8188f0a96466c30c704a0c6b327cc8be398d9ed1cd1df26a289.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2536