Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2024 09:35
Behavioral task
behavioral1
Sample
zcxxz.exe
Resource
win7-20240708-en
windows7-x64
5 signatures
150 seconds
General
-
Target
zcxxz.exe
-
Size
74KB
-
MD5
4d3d13d39deb64c17ff692e8d9058d3a
-
SHA1
3d44229b978878c06da6cc06534472745c44202b
-
SHA256
7d2d2aec7b5689480509caf4b3f688a57b0b1d7aeb0e367a4b5d42c679b558cc
-
SHA512
fb95bc8eec6e389e6ffec41daa1ed0786e737fcf97b8d0096e3e94f3f272a3e11a0d92b0addaa22554714756bf008b00b0b92955305d6858cd7a9ad9376a225e
-
SSDEEP
1536:gUUPcxVteCW7PMVG07RhCI2H1bB/la3QzcyLVclN:gUmcxV4x7PMVrNhqH1bBo3QjBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
127.0.0.1:36414
Mutex
azxwblnxumphapq
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2068-1-0x0000000000920000-0x0000000000938000-memory.dmp VenomRAT -
Suspicious behavior: EnumeratesProcesses 31 IoCs
Processes:
zcxxz.exepid process 2068 zcxxz.exe 2068 zcxxz.exe 2068 zcxxz.exe 2068 zcxxz.exe 2068 zcxxz.exe 2068 zcxxz.exe 2068 zcxxz.exe 2068 zcxxz.exe 2068 zcxxz.exe 2068 zcxxz.exe 2068 zcxxz.exe 2068 zcxxz.exe 2068 zcxxz.exe 2068 zcxxz.exe 2068 zcxxz.exe 2068 zcxxz.exe 2068 zcxxz.exe 2068 zcxxz.exe 2068 zcxxz.exe 2068 zcxxz.exe 2068 zcxxz.exe 2068 zcxxz.exe 2068 zcxxz.exe 2068 zcxxz.exe 2068 zcxxz.exe 2068 zcxxz.exe 2068 zcxxz.exe 2068 zcxxz.exe 2068 zcxxz.exe 2068 zcxxz.exe 2068 zcxxz.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
zcxxz.exedescription pid process Token: SeDebugPrivilege 2068 zcxxz.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
zcxxz.exepid process 2068 zcxxz.exe