Analysis
-
max time kernel
147s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20-10-2024 09:35
Behavioral task
behavioral1
Sample
zcxxz.exe
Resource
win7-20240708-en
windows7-x64
5 signatures
150 seconds
General
-
Target
zcxxz.exe
-
Size
74KB
-
MD5
4d3d13d39deb64c17ff692e8d9058d3a
-
SHA1
3d44229b978878c06da6cc06534472745c44202b
-
SHA256
7d2d2aec7b5689480509caf4b3f688a57b0b1d7aeb0e367a4b5d42c679b558cc
-
SHA512
fb95bc8eec6e389e6ffec41daa1ed0786e737fcf97b8d0096e3e94f3f272a3e11a0d92b0addaa22554714756bf008b00b0b92955305d6858cd7a9ad9376a225e
-
SSDEEP
1536:gUUPcxVteCW7PMVG07RhCI2H1bB/la3QzcyLVclN:gUmcxV4x7PMVrNhqH1bBo3QjBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
127.0.0.1:36414
Mutex
azxwblnxumphapq
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2084-1-0x00000000010B0000-0x00000000010C8000-memory.dmp VenomRAT -
Suspicious behavior: EnumeratesProcesses 38 IoCs
Processes:
zcxxz.exepid process 2084 zcxxz.exe 2084 zcxxz.exe 2084 zcxxz.exe 2084 zcxxz.exe 2084 zcxxz.exe 2084 zcxxz.exe 2084 zcxxz.exe 2084 zcxxz.exe 2084 zcxxz.exe 2084 zcxxz.exe 2084 zcxxz.exe 2084 zcxxz.exe 2084 zcxxz.exe 2084 zcxxz.exe 2084 zcxxz.exe 2084 zcxxz.exe 2084 zcxxz.exe 2084 zcxxz.exe 2084 zcxxz.exe 2084 zcxxz.exe 2084 zcxxz.exe 2084 zcxxz.exe 2084 zcxxz.exe 2084 zcxxz.exe 2084 zcxxz.exe 2084 zcxxz.exe 2084 zcxxz.exe 2084 zcxxz.exe 2084 zcxxz.exe 2084 zcxxz.exe 2084 zcxxz.exe 2084 zcxxz.exe 2084 zcxxz.exe 2084 zcxxz.exe 2084 zcxxz.exe 2084 zcxxz.exe 2084 zcxxz.exe 2084 zcxxz.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
zcxxz.exedescription pid process Token: SeDebugPrivilege 2084 zcxxz.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
zcxxz.exepid process 2084 zcxxz.exe