Analysis
-
max time kernel
148s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2024 09:29
General
-
Target
zcxxz.exe
-
Size
74KB
-
MD5
4d3d13d39deb64c17ff692e8d9058d3a
-
SHA1
3d44229b978878c06da6cc06534472745c44202b
-
SHA256
7d2d2aec7b5689480509caf4b3f688a57b0b1d7aeb0e367a4b5d42c679b558cc
-
SHA512
fb95bc8eec6e389e6ffec41daa1ed0786e737fcf97b8d0096e3e94f3f272a3e11a0d92b0addaa22554714756bf008b00b0b92955305d6858cd7a9ad9376a225e
-
SSDEEP
1536:gUUPcxVteCW7PMVG07RhCI2H1bB/la3QzcyLVclN:gUmcxV4x7PMVrNhqH1bBo3QjBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
127.0.0.1:36414
Mutex
azxwblnxumphapq
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
Processes:
zcxxz.exetaskmgr.exepid process 2836 zcxxz.exe 2836 zcxxz.exe 2836 zcxxz.exe 2836 zcxxz.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 2836 zcxxz.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 2836 zcxxz.exe 2836 zcxxz.exe 2836 zcxxz.exe 2836 zcxxz.exe 2836 zcxxz.exe 2836 zcxxz.exe 2836 zcxxz.exe 2836 zcxxz.exe 2836 zcxxz.exe 2836 zcxxz.exe 2836 zcxxz.exe 2836 zcxxz.exe 2836 zcxxz.exe 2836 zcxxz.exe 2836 zcxxz.exe 2836 zcxxz.exe 2836 zcxxz.exe 2836 zcxxz.exe 2836 zcxxz.exe 2836 zcxxz.exe 2836 zcxxz.exe 2836 zcxxz.exe 2836 zcxxz.exe 2836 zcxxz.exe 2836 zcxxz.exe 2836 zcxxz.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
zcxxz.exetaskmgr.exedescription pid process Token: SeDebugPrivilege 2836 zcxxz.exe Token: SeDebugPrivilege 552 taskmgr.exe Token: SeSystemProfilePrivilege 552 taskmgr.exe Token: SeCreateGlobalPrivilege 552 taskmgr.exe Token: 33 552 taskmgr.exe Token: SeIncBasePriorityPrivilege 552 taskmgr.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
Processes:
taskmgr.exepid process 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe -
Suspicious use of SendNotifyMessage 35 IoCs
Processes:
taskmgr.exepid process 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
zcxxz.exepid process 2836 zcxxz.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\zcxxz.exe"C:\Users\Admin\AppData\Local\Temp\zcxxz.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2836
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:552