Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-10-2024 19:55
Behavioral task
behavioral1
Sample
Coffee.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Coffee.exe
Resource
win10v2004-20241007-en
General
-
Target
Coffee.exe
-
Size
63KB
-
MD5
961d8e0f1ec3c196499bfcbd0a9d19fa
-
SHA1
88b7f13c633260a463127ce2ba6fbe38137e856a
-
SHA256
cd903ad2211cf7d166646d75e57fb866000f4a3b870b5ec759929be2fd81d334
-
SHA512
53ee498a9a4e458d072bfd50c86b2f89b7f56f723e66fadde223f6ccff0c6871ccb41a9886b4b98812f53111f9e9fe4ca10aa3633d54afca923833b12dbcd66b
-
SSDEEP
1536:OhIBLTM3Ufc0cMdmeeiIVrGbbXwemZG5dpqKmY7:OhIBLTM3Ufc6d/eXGbbXLmiGz
Malware Config
Extracted
asyncrat
5.0.5
Venom Clients
127.0.0.1:3451
37.120.233.226:3451
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Modifies registry class 1 IoCs
Processes:
taskmgr.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
taskmgr.exepid process 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
taskmgr.exepid process 4032 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
Coffee.exetaskmgr.exeCoffee.exeCoffee.exeCoffee.exeCoffee.exeCoffee.exeCoffee.exeCoffee.exedescription pid process Token: SeDebugPrivilege 408 Coffee.exe Token: SeDebugPrivilege 4032 taskmgr.exe Token: SeSystemProfilePrivilege 4032 taskmgr.exe Token: SeCreateGlobalPrivilege 4032 taskmgr.exe Token: SeDebugPrivilege 2900 Coffee.exe Token: SeDebugPrivilege 376 Coffee.exe Token: SeDebugPrivilege 384 Coffee.exe Token: SeDebugPrivilege 1136 Coffee.exe Token: SeDebugPrivilege 4828 Coffee.exe Token: SeDebugPrivilege 3084 Coffee.exe Token: SeDebugPrivilege 1224 Coffee.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
taskmgr.exepid process 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exepid process 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe 4032 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Coffee.exe"C:\Users\Admin\AppData\Local\Temp\Coffee.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:408
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4032
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\Coffee.exe"C:\Users\Admin\AppData\Local\Temp\Coffee.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2900
-
C:\Users\Admin\AppData\Local\Temp\Coffee.exe"C:\Users\Admin\AppData\Local\Temp\Coffee.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:376
-
C:\Users\Admin\AppData\Local\Temp\Coffee.exe"C:\Users\Admin\AppData\Local\Temp\Coffee.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:384
-
C:\Users\Admin\AppData\Local\Temp\Coffee.exe"C:\Users\Admin\AppData\Local\Temp\Coffee.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1136
-
C:\Users\Admin\AppData\Local\Temp\Coffee.exe"C:\Users\Admin\AppData\Local\Temp\Coffee.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4828
-
C:\Users\Admin\AppData\Local\Temp\Coffee.exe"C:\Users\Admin\AppData\Local\Temp\Coffee.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3084
-
C:\Users\Admin\AppData\Local\Temp\Coffee.exe"C:\Users\Admin\AppData\Local\Temp\Coffee.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1224
-
C:\Windows\System32\2adjwxdufetla.exe"C:\Windows\System32\2adjwxdufetla.exe"1⤵PID:4916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD5fff5cbccb6b31b40f834b8f4778a779a
SHA1899ed0377e89f1ed434cfeecc5bc0163ebdf0454
SHA256b8f7e4ed81764db56b9c09050f68c5a26af78d8a5e2443e75e0e1aa7cd2ccd76
SHA5121a188a14c667bc31d2651b220aa762be9cce4a75713217846fbe472a307c7bbc6e3c27617f75f489902a534d9184648d204d03ee956ac57b11aa90551248b8f9