Analysis
-
max time kernel
1789s -
max time network
1800s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
10-10-2024 11:15
Static task
static1
1 signatures
General
-
Target
corn.zip
-
Size
42.8MB
-
MD5
b2240d2e0b513829302d88ffe03d0dfc
-
SHA1
53aee13e981747502a54c412794cc7cdc9d1805b
-
SHA256
7f792e120c8f15453d4c3475911aa8ec4bcbe95514d9167aadfc445af7fe68a5
-
SHA512
d687e375b6b70c18f4bb3b4a3c72277eed2f4433be63d7a3f1a192af29a4a89e7b333ec9743e83ed327bb7e7c0f251eb2e5735c5d73b740170afcc0663254c09
-
SSDEEP
786432:CDXXuerfHkIZf06hLwbl9Pm2TW38ZF+oxwk4fbSep82zpMNV:CDnXfHkIZcXM2TdZooxwnXWNV
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
91.92.247.210:4449
Mutex
sarcofamdkdtq
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
python.exedescription pid process target process PID 4504 created 3168 4504 python.exe Explorer.EXE -
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/4684-48-0x00000265C53F0000-0x00000265C5408000-memory.dmp family_asyncrat -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
python.exenotepad.exepid process 4504 python.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe 4684 notepad.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
Processes:
python.exepid process 4504 python.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
7zFM.exenotepad.exedescription pid process Token: SeRestorePrivilege 2752 7zFM.exe Token: 35 2752 7zFM.exe Token: SeDebugPrivilege 4684 notepad.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
notepad.exepid process 4684 notepad.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.exepython.exedescription pid process target process PID 1936 wrote to memory of 4504 1936 cmd.exe python.exe PID 1936 wrote to memory of 4504 1936 cmd.exe python.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe PID 4504 wrote to memory of 4684 4504 python.exe notepad.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3168
-
C:\Program Files\7-Zip\7zFM.exeC:\Users\Admin\AppData\Local\Temp\corn.zip2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2752 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\puncher\Downloads\Python\Python312\python.exepython.exe an.py3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\System32\notepad.exeC:\Windows\System32\notepad.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4684
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3588