Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2024 16:13

General

  • Target

    Venom V5.exe

  • Size

    289KB

  • MD5

    121a7190a24ba74a4c49c951dd56ad72

  • SHA1

    fb5b1adf74cda03d5a77096b866942a6fbd5aa89

  • SHA256

    049e3ab43c29a82fc17b415fb88df0b0c238efea6be76a25da1f2bb88ee22a6b

  • SHA512

    b1a983027932897e97c4e3ac9865e6fe987c3b772c5847db3f3cc5b8e2b4c845e7040bf8a7e7d546b77c3f78e39c32eaeb7321f1c6f99dd28554c80fec603bb3

  • SSDEEP

    6144:6/E7c5W+sPgJJUuCm2pad2AO51SLPml16S6M6supNDdPstxChZ:UEeggJauClpjL5sar6M6supXPstw

Malware Config

Extracted

Family

njrat

Version

v4.0

Botnet

Victim

C2

audio-ham.gl.at.ply.gg:52424

Mutex

Windows

Attributes
  • reg_key

    Windows

  • splitter

    |-F-|

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 55 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Venom V5.exe
    "C:\Users\Admin\AppData\Local\Temp\Venom V5.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3736
    • C:\Users\Admin\AppData\Local\Temp\paylod.exe
      "C:\Users\Admin\AppData\Local\Temp\paylod.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4936
      • C:\Users\Admin\AppData\Local\Temp\Payload.exe
        "C:\Users\Admin\AppData\Local\Temp\Payload.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2640
        • C:\Windows\SysWOW64\attrib.exe
          attrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:4424
        • C:\Windows\SysWOW64\attrib.exe
          attrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Windows.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:512
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h +r +s "C:\Users\Admin\AppData\Local\Temp\Payload.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:2572
    • C:\Users\Admin\AppData\Local\Temp\main.exe
      "C:\Users\Admin\AppData\Local\Temp\main.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4492
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd" /c "C:\Users\Admin\AppData\Local\Temp\6F15.tmp\6F16.tmp\6F17.bat C:\Users\Admin\AppData\Local\Temp\main.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2952
        • C:\Windows\system32\chcp.com
          chcp 65001
          4⤵
            PID:1780
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1440
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ff993afcc40,0x7ff993afcc4c,0x7ff993afcc58
        2⤵
          PID:2808
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1984,i,8917490905487593022,2743328435258552046,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1980 /prefetch:2
          2⤵
            PID:8
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2132,i,8917490905487593022,2743328435258552046,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2376 /prefetch:3
            2⤵
              PID:2816
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2212,i,8917490905487593022,2743328435258552046,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2456 /prefetch:8
              2⤵
                PID:1392
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,8917490905487593022,2743328435258552046,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3200 /prefetch:1
                2⤵
                  PID:3708
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3312,i,8917490905487593022,2743328435258552046,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3296 /prefetch:1
                  2⤵
                    PID:4000
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4520,i,8917490905487593022,2743328435258552046,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4572 /prefetch:1
                    2⤵
                      PID:4836
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4788,i,8917490905487593022,2743328435258552046,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4796 /prefetch:8
                      2⤵
                        PID:1924
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4904,i,8917490905487593022,2743328435258552046,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4864 /prefetch:8
                        2⤵
                          PID:968
                      • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                        1⤵
                          PID:4540
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                          1⤵
                            PID:2660

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                            Filesize

                            649B

                            MD5

                            892953530ce97c592bbd1f213eb70d46

                            SHA1

                            9e64f3c460ec7de39a38b5ebc0ca884d317d0d5d

                            SHA256

                            0ac119f7e899c9ac3b2787482bbd88f79b0d4a5de133ab01f42d6e5259cefe0f

                            SHA512

                            8bec4fbe45d1d15445d817fb5b6773fcc4af85138076b2f07e2d556c5e35dca05b24070f5bcac79870d70a5308a48aef9236901bd663cf6f967b0d8a5f32603a

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                            Filesize

                            2B

                            MD5

                            d751713988987e9331980363e24189ce

                            SHA1

                            97d170e1550eee4afc0af065b78cda302a97674c

                            SHA256

                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                            SHA512

                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                            Filesize

                            356B

                            MD5

                            e396ec5394bb329ce18dbfd73a9574b1

                            SHA1

                            fdb333a2cdb9d3913d2d5d34902f391bf97cb87e

                            SHA256

                            82021a64afc106cc0f27edfe7f50a88e7a13ef0e7c84145d4276a829f74a88db

                            SHA512

                            89dc807b8481ea1cdaf50e5f28ad376c4aefcad8a6ac7a73dc9b5987eb1eae6922469fd70e45abe58674bd140b0ab9f63f56f3af7387a21f340e76bef4aeb001

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            6506291cebff06dbdd6bde010d535ea3

                            SHA1

                            e0a813beaf0c36a32e45d97ee64af6f5b26f442c

                            SHA256

                            dfff904efdb9e530288470107869753016175ce5512f45c0ab0ce67fc11908c4

                            SHA512

                            b0c8a90361073eae42244a63ae68e44fe51cbbf2a0fda2a95b7f2346cb7e6c6ea77808769718d91c6a3c450325f5c581923c7ed054cae10fe3676346bf3bc20c

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            234KB

                            MD5

                            5ed462cb8c78db2c9daab3d00c7cedcd

                            SHA1

                            d0b2bdad0c772735b04473535aeaeb6312b0021f

                            SHA256

                            9484b7f68dc4e89b6f58e55ac9174cd87182c990eb1dd3255691fae0b19e3ae1

                            SHA512

                            a8d5f06a4c9c8ac9b4ef1cdfbb8724dd8333283c533848c1a3c4446cd901a14b3354553e6471ebfc65abdfd337e812993e08425d8a9156b01e59423e87ed276e

                          • C:\Users\Admin\AppData\Local\Temp\6F15.tmp\6F16.tmp\6F17.bat

                            Filesize

                            3KB

                            MD5

                            ed10dc8c536ee4a022b94514936658e1

                            SHA1

                            006378f2c2837b196ecd17db6f1d6db862b8454e

                            SHA256

                            6851924794377b148813fd77ffe990aeb8abd363e9086b73bf76db117feedc59

                            SHA512

                            245a2bef61c75090b9108a5c5b81a77d1091b5a4abe8f561d5658e9c708907fe2ada359a9931dfa6decf0a06e5a0fdb08dab6ed7165a78f559512cbedf37634f

                          • C:\Users\Admin\AppData\Local\Temp\main.exe

                            Filesize

                            126KB

                            MD5

                            fb32165caff9614efbc6311fe75da2f2

                            SHA1

                            674e7a93ed4b9cb097d846463a249bd68c4ab7a6

                            SHA256

                            41018b0dcfb3adf0ddcda481a276d98cbcee94698ac9c7dbd3644a86687e76e8

                            SHA512

                            65356ddd14df07f2153e740a8ac9f4d722e604a85663254f5e444850cbb66c15c35e7cedc6fece72df63677ffbbeb094122b05c11e01bf0cded917c3c4608a6d

                          • C:\Users\Admin\AppData\Local\Temp\paylod.exe

                            Filesize

                            26KB

                            MD5

                            1f5545281784c48b113dde61778a4697

                            SHA1

                            46aee2f749bbee1fb7e4f5d8609b798bd5077673

                            SHA256

                            e31e3e11ce40c048eed1a0f68b0e47a15369b9289b30dcce9fe70b7f7ea26c20

                            SHA512

                            e262e58f15bbbee488a8423cbd5f03b2e9ab12b7af267d3278b48cb86373ff180b992d126694d3e224a8b97bff5edbaeb9c0d3493528b0d6b49e236339a1ab37

                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk

                            Filesize

                            1KB

                            MD5

                            673a9bfc7804a07c7366ec5d0b00361a

                            SHA1

                            9f0b4e270bd89e15c78af01f1be587271d6d692a

                            SHA256

                            408dad851ba148ecc3dfc7dfbb37354777ea1e4eeddbee737eda8d99dfab6f23

                            SHA512

                            57f11123be108eefd7651fc7421b3a98c83bec6782c81f66bec7489fe1c25c0f6cbd7d9b7a0a551f8201df020bb12e322e104eaa506a3631ab6c1507b0c77dc1

                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Windows.lnk

                            Filesize

                            1KB

                            MD5

                            1fb89c71e3ec30b565388e407ca44024

                            SHA1

                            59ff1cc02e0d6f090dfb8f86869988f618639f75

                            SHA256

                            51101a07864f773ca8cc55f7b716bc73329bd3b74444d1e1c5e3ba0b22a42b7d

                            SHA512

                            03bc06f91891d17787dc2133c14ba3f89e39102fa07ac758bfdd83d37318dcedc4aa8a62436b180f7685dd30b1e3f5e8d1d7050dcc3d833cc57165bc4471fd8d

                          • memory/2640-44-0x0000000006360000-0x00000000063C6000-memory.dmp

                            Filesize

                            408KB

                          • memory/2640-45-0x00000000012A0000-0x00000000012AA000-memory.dmp

                            Filesize

                            40KB

                          • memory/2640-42-0x0000000006140000-0x00000000061D2000-memory.dmp

                            Filesize

                            584KB

                          • memory/2640-43-0x00000000060E0000-0x00000000060EA000-memory.dmp

                            Filesize

                            40KB

                          • memory/3736-19-0x00000000745D0000-0x0000000074B81000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/3736-0-0x00000000745D2000-0x00000000745D3000-memory.dmp

                            Filesize

                            4KB

                          • memory/3736-2-0x00000000745D0000-0x0000000074B81000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/3736-1-0x00000000745D0000-0x0000000074B81000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4936-28-0x0000000005840000-0x0000000005DE4000-memory.dmp

                            Filesize

                            5.6MB

                          • memory/4936-22-0x0000000000040000-0x000000000004C000-memory.dmp

                            Filesize

                            48KB

                          • memory/4936-23-0x0000000004A20000-0x0000000004ABC000-memory.dmp

                            Filesize

                            624KB

                          • memory/4936-20-0x000000007175E000-0x000000007175F000-memory.dmp

                            Filesize

                            4KB