Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-11-2024 17:21
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20240903-en
General
-
Target
setup.exe
-
Size
146KB
-
MD5
15ac5ad1c4c1a483da074a5fad3f4b0c
-
SHA1
144d87b60d42a0b5d527b3cab8cd7ad60d3c468c
-
SHA256
d87bc6b532f94b6023c55bb38f96f0472857bb7742db4199704386bf8f533fb9
-
SHA512
4dacb7551ccc17cb552ad12a0308f2d0c6ff3a27e5a079767b094db7daf54dbf2886273f7da6cd84d73d33a861aae8f1b35d0f52b3ee1db0913854181411a4de
-
SSDEEP
3072:4ESJuC4+3BrDDl8DC+1iJLU0YFzkEDN3BtGc/aFRsO8Jw:+uCBRrDZN+1i2xCmRwc/a7j
Malware Config
Signatures
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\svchost.exe VenomRAT behavioral1/memory/996-15-0x0000000000B60000-0x0000000000BA0000-memory.dmp VenomRAT -
Venomrat family
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions svchost.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools svchost.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
svchost.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
svchost.exepid process 996 svchost.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
setup.exedescription pid process target process PID 2096 wrote to memory of 1476 2096 setup.exe cmd.exe PID 2096 wrote to memory of 1476 2096 setup.exe cmd.exe PID 2096 wrote to memory of 1476 2096 setup.exe cmd.exe PID 2096 wrote to memory of 1476 2096 setup.exe cmd.exe PID 2096 wrote to memory of 1476 2096 setup.exe cmd.exe PID 2096 wrote to memory of 996 2096 setup.exe svchost.exe PID 2096 wrote to memory of 996 2096 setup.exe svchost.exe PID 2096 wrote to memory of 996 2096 setup.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\setup.bat" "2⤵PID:1476
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- Maps connected drives based on registry
PID:996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62B
MD5bac1df08b5a2b813d82ace3a51adc67f
SHA1bd1279e6379de4ea6ac108718010235f3b342405
SHA25659f5244b33fe77d4dfe76e5159d44a07e037040f8790276ec84139ed3128a21b
SHA512175b17c6e7d91aea20e6d8d3b63abfd467c0cf7fc6b8c574e39dbffeb52db8c40020816291f7a83e0411a165d0535c033ff1df299dd2c2a7e48ba8b34dcd4afa
-
Filesize
209KB
MD5f16db0ec9722cf4e3d7761a317097568
SHA10f1f15468a7db5a662909f3a1a7e03e05a6a0533
SHA256aaf473cb17bcf36a00222fd8ca4493a4a4b0f9fda3678a1a56d2be1a52cbf5f4
SHA512f8ed6b01473cbd9b455d88b30afe3490ebc5881b5607871e693cbdfb401460ebc6b3cff1cbf1cb554a8da26f0ec55d76f3a3778d35db55f28ca3c668da1c30c8