Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-11-2024 17:44
Static task
static1
Behavioral task
behavioral1
Sample
d34a8a8a5661c308dff6fa997aa1151ee7ed46bfefee20b64e826292a272e42d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d34a8a8a5661c308dff6fa997aa1151ee7ed46bfefee20b64e826292a272e42d.exe
Resource
win10v2004-20241007-en
General
-
Target
d34a8a8a5661c308dff6fa997aa1151ee7ed46bfefee20b64e826292a272e42d.exe
-
Size
136KB
-
MD5
71166c04e60532bb84fc37b12cbc39c2
-
SHA1
438f6bc46adc2f500516adfa83668ae0bf48abfd
-
SHA256
d34a8a8a5661c308dff6fa997aa1151ee7ed46bfefee20b64e826292a272e42d
-
SHA512
bfbd3b5a909c4a89639c20ac63e3947e5c78f16b05adc8496bcda9ccb6642ac848256c9778c80f8150ecf8138c33ed5c4c1ba391fd20e83427fb4b09e9aa58bd
-
SSDEEP
3072:seRxy2E/7oh9/Gzyx7XaI/7fI81Z34zikDMSb1BYLWQfv:BkO9/GKX17FZIukD9O3
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
qdjtygkpttzwe
-
delay
1
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/w9ciyBd2
Signatures
-
Asyncrat family
-
Processes:
resource yara_rule behavioral1/files/0x001000000001866e-11.dat VenomRAT behavioral1/memory/2756-14-0x0000000000D10000-0x0000000000D2E000-memory.dmp VenomRAT -
Venomrat family
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/files/0x001000000001866e-11.dat family_asyncrat -
Executes dropped EXE 1 IoCs
Processes:
Client.exepid Process 2756 Client.exe -
Loads dropped DLL 1 IoCs
Processes:
d34a8a8a5661c308dff6fa997aa1151ee7ed46bfefee20b64e826292a272e42d.exepid Process 2904 d34a8a8a5661c308dff6fa997aa1151ee7ed46bfefee20b64e826292a272e42d.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d34a8a8a5661c308dff6fa997aa1151ee7ed46bfefee20b64e826292a272e42d.exeDllHost.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d34a8a8a5661c308dff6fa997aa1151ee7ed46bfefee20b64e826292a272e42d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
Client.exepid Process 2756 Client.exe 2756 Client.exe 2756 Client.exe 2756 Client.exe 2756 Client.exe 2756 Client.exe 2756 Client.exe 2756 Client.exe 2756 Client.exe 2756 Client.exe 2756 Client.exe 2756 Client.exe 2756 Client.exe 2756 Client.exe 2756 Client.exe 2756 Client.exe 2756 Client.exe 2756 Client.exe 2756 Client.exe 2756 Client.exe 2756 Client.exe 2756 Client.exe 2756 Client.exe 2756 Client.exe 2756 Client.exe 2756 Client.exe 2756 Client.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Client.exedescription pid Process Token: SeDebugPrivilege 2756 Client.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
DllHost.exepid Process 2888 DllHost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
Client.exeDllHost.exepid Process 2756 Client.exe 2888 DllHost.exe 2888 DllHost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
d34a8a8a5661c308dff6fa997aa1151ee7ed46bfefee20b64e826292a272e42d.exedescription pid Process procid_target PID 2904 wrote to memory of 2756 2904 d34a8a8a5661c308dff6fa997aa1151ee7ed46bfefee20b64e826292a272e42d.exe 31 PID 2904 wrote to memory of 2756 2904 d34a8a8a5661c308dff6fa997aa1151ee7ed46bfefee20b64e826292a272e42d.exe 31 PID 2904 wrote to memory of 2756 2904 d34a8a8a5661c308dff6fa997aa1151ee7ed46bfefee20b64e826292a272e42d.exe 31 PID 2904 wrote to memory of 2756 2904 d34a8a8a5661c308dff6fa997aa1151ee7ed46bfefee20b64e826292a272e42d.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\d34a8a8a5661c308dff6fa997aa1151ee7ed46bfefee20b64e826292a272e42d.exe"C:\Users\Admin\AppData\Local\Temp\d34a8a8a5661c308dff6fa997aa1151ee7ed46bfefee20b64e826292a272e42d.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Roaming\Client.exe"C:\Users\Admin\AppData\Roaming\Client.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2756
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD58f0807d1ba521c06b793a6717744c4f3
SHA1f5a414ddcbf4a7bcc420912d4a8eb5f414f2ea35
SHA256c40b7d6c8145eb7b3d40d868c72701f21b1390259585e0bfaf0ac4b66b438572
SHA512cacae5105f21d0d5d6b930f8e86c6fd0ed2adcf289e18ad9e34d584bcd757b7beb17ed31cd64ee0514b2b6ed21b68ec0361a7b37c9d063981320c698769ae134
-
Filesize
34KB
MD59e2447961613086a0bfbd34dececd929
SHA17ef96a9b48f63f94fc91ab0f17b18d4c81c77901
SHA256ee30977c24b9607c07513670e524bdb95fdd89c1c1c4d551666a4b9a64a4a5f8
SHA512379117b6a5b3ce178069ec7e51aca3026168a827685235a6d372e9d5f9b14470e7755bd1b9179c46019273b00dc25fcca807189d62a2414ff0e355457a65a675