Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 20:30
Behavioral task
behavioral1
Sample
gamesense.exe
Resource
win7-20240708-en
5 signatures
150 seconds
General
-
Target
gamesense.exe
-
Size
74KB
-
MD5
f80d39235071bfee3b4d869d5c40a0b5
-
SHA1
57872f4f77e4416db34047d887ac8413b94780e6
-
SHA256
6fb8cc16b1ccca659be32d77ec18818579183e20c900a2c33252f83abc038e1e
-
SHA512
96cf0a780e7cc3a9f9aa6c95d8ff70b0c430e94a7bd1cb80a563773cdd65a08b221a32b2f4bcdfe3e54d54216c42d9c98ea45d350a396cba93233224a5da257c
-
SSDEEP
1536:rUEkcx4VHsC0SPMVW6DeI/H1b4/cqjQzcCLVclN:rUxcx4GfSPMVWqnH1b4ljQTBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
127.0.0.1:4449
Mutex
ekeoabajpfxgmzzzia
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
resource yara_rule behavioral2/memory/464-1-0x0000000000A90000-0x0000000000AA8000-memory.dmp VenomRAT -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 464 gamesense.exe 464 gamesense.exe 464 gamesense.exe 464 gamesense.exe 464 gamesense.exe 464 gamesense.exe 464 gamesense.exe 464 gamesense.exe 464 gamesense.exe 464 gamesense.exe 464 gamesense.exe 464 gamesense.exe 464 gamesense.exe 464 gamesense.exe 464 gamesense.exe 464 gamesense.exe 464 gamesense.exe 464 gamesense.exe 464 gamesense.exe 464 gamesense.exe 464 gamesense.exe 464 gamesense.exe 464 gamesense.exe 464 gamesense.exe 464 gamesense.exe 464 gamesense.exe 464 gamesense.exe 464 gamesense.exe 464 gamesense.exe 464 gamesense.exe 464 gamesense.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 464 gamesense.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 464 gamesense.exe