Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 21:34
Behavioral task
behavioral1
Sample
1702653787f369ddd7ca8cebbcaefd07586ccf93e2da0fe5ff68cbac758016b0f4a1d97402770.exe
Resource
win7-20240708-en
5 signatures
150 seconds
General
-
Target
1702653787f369ddd7ca8cebbcaefd07586ccf93e2da0fe5ff68cbac758016b0f4a1d97402770.exe
-
Size
74KB
-
MD5
e26ca3f0e251a42d708b468f79f810a9
-
SHA1
3a83244bf4ada3b95f13a8f10e6ad6e71dafbd63
-
SHA256
7b7da08ce864f34537071bd1bfcb8e649ce079c518575d1fdf7fc88a63e98afc
-
SHA512
dcfce96e536048c0b09570052f7830c1b9773694b7a7525263053e7dcddfc5510aa9351113e7284546ebe393952718e651e8e2ecb40e45bb9a2831415fa69f8e
-
SSDEEP
1536:gUUPcxVteCW7PMVsUT7a3IOE1bh/hTgkJQzcyLVclN:gUmcxV4x7PMVu3E1bhpQjBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
181.41.200.232:4000
Mutex
uygxpmvanmnxusy
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
resource yara_rule behavioral1/memory/1660-1-0x0000000000310000-0x0000000000328000-memory.dmp VenomRAT -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1660 1702653787f369ddd7ca8cebbcaefd07586ccf93e2da0fe5ff68cbac758016b0f4a1d97402770.exe 1660 1702653787f369ddd7ca8cebbcaefd07586ccf93e2da0fe5ff68cbac758016b0f4a1d97402770.exe 1660 1702653787f369ddd7ca8cebbcaefd07586ccf93e2da0fe5ff68cbac758016b0f4a1d97402770.exe 1660 1702653787f369ddd7ca8cebbcaefd07586ccf93e2da0fe5ff68cbac758016b0f4a1d97402770.exe 1660 1702653787f369ddd7ca8cebbcaefd07586ccf93e2da0fe5ff68cbac758016b0f4a1d97402770.exe 1660 1702653787f369ddd7ca8cebbcaefd07586ccf93e2da0fe5ff68cbac758016b0f4a1d97402770.exe 1660 1702653787f369ddd7ca8cebbcaefd07586ccf93e2da0fe5ff68cbac758016b0f4a1d97402770.exe 1660 1702653787f369ddd7ca8cebbcaefd07586ccf93e2da0fe5ff68cbac758016b0f4a1d97402770.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1660 1702653787f369ddd7ca8cebbcaefd07586ccf93e2da0fe5ff68cbac758016b0f4a1d97402770.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1660 1702653787f369ddd7ca8cebbcaefd07586ccf93e2da0fe5ff68cbac758016b0f4a1d97402770.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1702653787f369ddd7ca8cebbcaefd07586ccf93e2da0fe5ff68cbac758016b0f4a1d97402770.exe"C:\Users\Admin\AppData\Local\Temp\1702653787f369ddd7ca8cebbcaefd07586ccf93e2da0fe5ff68cbac758016b0f4a1d97402770.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1660