Analysis

  • max time kernel
    1053s
  • max time network
    1067s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 16:14

General

  • Target

    VenomRAT v6.0.3 (+SOURCE)/VenomRAT v6.0.3 (SOURCE)/Venom RAT + HVNC + Stealer + Grabber.exe

  • Size

    14.2MB

  • MD5

    3b3a304c6fc7a3a1d9390d7cbff56634

  • SHA1

    e8bd5244e6362968f5017680da33f1e90ae63dd7

  • SHA256

    7331368c01b2a16bda0f013f376a039e6aeb4cb2dd8b0c2afc7ca208fb544c58

  • SHA512

    7f1beacb6449b3b3e108016c8264bb9a21ecba526c2778794f16a7f9c817c0bbd5d4cf0c208d706d25c54322a875da899ab047aab1e07684f6b7b6083981abe5

  • SSDEEP

    196608:Nja6chUZX81lbFklbYJygrP7aIBhLkNPFCZZwiJl1NLIsPA8fxvuIMzd/95UhS14:qT+P+Zw6NLIsFfskh1BmXG04

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

127.0.0.1:4449

Mutex

hfvvhdasugp

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Async RAT payload 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VenomRAT v6.0.3 (+SOURCE)\VenomRAT v6.0.3 (SOURCE)\Venom RAT + HVNC + Stealer + Grabber.exe
    "C:\Users\Admin\AppData\Local\Temp\VenomRAT v6.0.3 (+SOURCE)\VenomRAT v6.0.3 (SOURCE)\Venom RAT + HVNC + Stealer + Grabber.exe"
    1⤵
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2856
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:2896
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      1⤵
        PID:2232
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x578
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2772
      • C:\Users\Admin\Downloads\Client.exe
        "C:\Users\Admin\Downloads\Client.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2468

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Server\Venom_RAT_+_HVNC_+_Steale_Url_cvf54gjurhovsxsxgwejkoeavchtvkvc\6.0.3.1\user.config

        Filesize

        1KB

        MD5

        3fb8d2a2cd510948957ef43af5de1a6a

        SHA1

        165c56b69c45db04546436b8cfcd21bf543fe1e3

        SHA256

        095a2b7ce003847ea27f3eb98eca1c5bf9098c194c137c550bed549fe8d46306

        SHA512

        ddf025953f0487612cab831866ce03285aa810a406d0a92d4491a2d26c7eaba2c4108c230309732a7ab6184c1578419164afe2fdc8e0179d8584bfbc7e75f1c6

      • C:\Users\Admin\AppData\Local\Server\Venom_RAT_+_HVNC_+_Steale_Url_cvf54gjurhovsxsxgwejkoeavchtvkvc\6.0.3.1\user.config

        Filesize

        1KB

        MD5

        ec49b7f5618d420d4c61a527d52c2638

        SHA1

        4c627db09339ea9d8266671a866140c5c9377c89

        SHA256

        1e5fc255b1d6ff6b9fcb242f9aade5db7d5ce869a7bad4a216cf92c90f239def

        SHA512

        d33bbc0e55aa55a52b12a476d570bc2f2bb649313d416d94cd7bf73c0e76bdbf016b8cecf2eb3aaafb490e36238a8bec3e41e88201b65d032daaed757ddabd6c

      • C:\Users\Admin\AppData\Local\Temp\Cab81FE.tmp

        Filesize

        70KB

        MD5

        49aebf8cbd62d92ac215b2923fb1b9f5

        SHA1

        1723be06719828dda65ad804298d0431f6aff976

        SHA256

        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

        SHA512

        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

      • C:\Users\Admin\AppData\Local\Temp\Tar9439.tmp

        Filesize

        181KB

        MD5

        4ea6026cf93ec6338144661bf1202cd1

        SHA1

        a1dec9044f750ad887935a01430bf49322fbdcb7

        SHA256

        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

        SHA512

        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

      • C:\Users\Admin\Downloads\Client.exe

        Filesize

        74KB

        MD5

        d686848aaf0af34e74282251cc46a97c

        SHA1

        749ecfd263addbe97773a4158833b63ce5044cee

        SHA256

        6949a9a3d1fa8c518c70493a12f5b46393b45669269d3dfdad19d17cbd4d397f

        SHA512

        8671c51f0a51e4769ad7ff35d3addae65a3c7cf93c04a673213a6f20e357039105a7fe4bf363f3569a8fe5007a325925cb30e0de673581b22810d5fd230dca28

      • memory/2468-51-0x0000000000A00000-0x0000000000A18000-memory.dmp

        Filesize

        96KB

      • memory/2856-16-0x000007FEF6BB0000-0x000007FEF759C000-memory.dmp

        Filesize

        9.9MB

      • memory/2856-21-0x000007FEF6BB0000-0x000007FEF759C000-memory.dmp

        Filesize

        9.9MB

      • memory/2856-8-0x0000000021520000-0x0000000021CDE000-memory.dmp

        Filesize

        7.7MB

      • memory/2856-9-0x0000000021CE0000-0x0000000022372000-memory.dmp

        Filesize

        6.6MB

      • memory/2856-10-0x000000001F1C0000-0x000000001F55C000-memory.dmp

        Filesize

        3.6MB

      • memory/2856-11-0x0000000022380000-0x0000000022804000-memory.dmp

        Filesize

        4.5MB

      • memory/2856-12-0x000007FEF6BB3000-0x000007FEF6BB4000-memory.dmp

        Filesize

        4KB

      • memory/2856-13-0x000007FEF6BB0000-0x000007FEF759C000-memory.dmp

        Filesize

        9.9MB

      • memory/2856-14-0x0000000022810000-0x0000000022A22000-memory.dmp

        Filesize

        2.1MB

      • memory/2856-15-0x000007FEF6BB0000-0x000007FEF759C000-memory.dmp

        Filesize

        9.9MB

      • memory/2856-0-0x000007FEF6BB3000-0x000007FEF6BB4000-memory.dmp

        Filesize

        4KB

      • memory/2856-19-0x000007FEF6BB0000-0x000007FEF759C000-memory.dmp

        Filesize

        9.9MB

      • memory/2856-20-0x0000000000AB0000-0x0000000000ABA000-memory.dmp

        Filesize

        40KB

      • memory/2856-7-0x0000000001160000-0x00000000011B0000-memory.dmp

        Filesize

        320KB

      • memory/2856-25-0x000007FEF6BB0000-0x000007FEF759C000-memory.dmp

        Filesize

        9.9MB

      • memory/2856-26-0x0000000025570000-0x0000000025694000-memory.dmp

        Filesize

        1.1MB

      • memory/2856-27-0x000007FEF6BB0000-0x000007FEF759C000-memory.dmp

        Filesize

        9.9MB

      • memory/2856-28-0x0000000027A70000-0x0000000027A80000-memory.dmp

        Filesize

        64KB

      • memory/2856-29-0x000007FEF6BB0000-0x000007FEF759C000-memory.dmp

        Filesize

        9.9MB

      • memory/2856-34-0x000007FEF6BB0000-0x000007FEF759C000-memory.dmp

        Filesize

        9.9MB

      • memory/2856-6-0x000000001E140000-0x000000001E218000-memory.dmp

        Filesize

        864KB

      • memory/2856-5-0x000007FEF6BB0000-0x000007FEF759C000-memory.dmp

        Filesize

        9.9MB

      • memory/2856-4-0x000000001DB40000-0x000000001DD92000-memory.dmp

        Filesize

        2.3MB

      • memory/2856-3-0x000000001D620000-0x000000001DB32000-memory.dmp

        Filesize

        5.1MB

      • memory/2856-2-0x000000001BD40000-0x000000001D144000-memory.dmp

        Filesize

        20.0MB

      • memory/2856-1-0x00000000018C0000-0x00000000026F4000-memory.dmp

        Filesize

        14.2MB