Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 16:19
Static task
static1
Behavioral task
behavioral1
Sample
VenomV5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
VenomV5.exe
Resource
win10v2004-20241007-en
General
-
Target
VenomV5.exe
-
Size
289KB
-
MD5
121a7190a24ba74a4c49c951dd56ad72
-
SHA1
fb5b1adf74cda03d5a77096b866942a6fbd5aa89
-
SHA256
049e3ab43c29a82fc17b415fb88df0b0c238efea6be76a25da1f2bb88ee22a6b
-
SHA512
b1a983027932897e97c4e3ac9865e6fe987c3b772c5847db3f3cc5b8e2b4c845e7040bf8a7e7d546b77c3f78e39c32eaeb7321f1c6f99dd28554c80fec603bb3
-
SSDEEP
6144:6/E7c5W+sPgJJUuCm2pad2AO51SLPml16S6M6supNDdPstxChZ:UEeggJauClpjL5sar6M6supXPstw
Malware Config
Extracted
njrat
v4.0
Victim
audio-ham.gl.at.ply.gg:52424
Windows
-
reg_key
Windows
-
splitter
|-F-|
Signatures
-
Njrat family
-
Drops startup file 2 IoCs
Processes:
paylod.exePayload.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk paylod.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk Payload.exe -
Executes dropped EXE 3 IoCs
Processes:
paylod.exemain.exePayload.exepid process 2492 paylod.exe 1712 main.exe 2272 Payload.exe -
Loads dropped DLL 7 IoCs
Processes:
VenomV5.exepaylod.exepid process 2060 VenomV5.exe 2060 VenomV5.exe 2060 VenomV5.exe 2060 VenomV5.exe 2184 2492 paylod.exe 2492 paylod.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
paylod.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Payload.exe" paylod.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Payload.exeattrib.exeattrib.exeattrib.exeVenomV5.exepaylod.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payload.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VenomV5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language paylod.exe -
Suspicious use of AdjustPrivilegeToken 31 IoCs
Processes:
Payload.exedescription pid process Token: SeDebugPrivilege 2272 Payload.exe Token: 33 2272 Payload.exe Token: SeIncBasePriorityPrivilege 2272 Payload.exe Token: 33 2272 Payload.exe Token: SeIncBasePriorityPrivilege 2272 Payload.exe Token: 33 2272 Payload.exe Token: SeIncBasePriorityPrivilege 2272 Payload.exe Token: 33 2272 Payload.exe Token: SeIncBasePriorityPrivilege 2272 Payload.exe Token: 33 2272 Payload.exe Token: SeIncBasePriorityPrivilege 2272 Payload.exe Token: 33 2272 Payload.exe Token: SeIncBasePriorityPrivilege 2272 Payload.exe Token: 33 2272 Payload.exe Token: SeIncBasePriorityPrivilege 2272 Payload.exe Token: 33 2272 Payload.exe Token: SeIncBasePriorityPrivilege 2272 Payload.exe Token: 33 2272 Payload.exe Token: SeIncBasePriorityPrivilege 2272 Payload.exe Token: 33 2272 Payload.exe Token: SeIncBasePriorityPrivilege 2272 Payload.exe Token: 33 2272 Payload.exe Token: SeIncBasePriorityPrivilege 2272 Payload.exe Token: 33 2272 Payload.exe Token: SeIncBasePriorityPrivilege 2272 Payload.exe Token: 33 2272 Payload.exe Token: SeIncBasePriorityPrivilege 2272 Payload.exe Token: 33 2272 Payload.exe Token: SeIncBasePriorityPrivilege 2272 Payload.exe Token: 33 2272 Payload.exe Token: SeIncBasePriorityPrivilege 2272 Payload.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
VenomV5.exemain.execmd.exepaylod.exePayload.exedescription pid process target process PID 2060 wrote to memory of 2492 2060 VenomV5.exe paylod.exe PID 2060 wrote to memory of 2492 2060 VenomV5.exe paylod.exe PID 2060 wrote to memory of 2492 2060 VenomV5.exe paylod.exe PID 2060 wrote to memory of 2492 2060 VenomV5.exe paylod.exe PID 2060 wrote to memory of 1712 2060 VenomV5.exe main.exe PID 2060 wrote to memory of 1712 2060 VenomV5.exe main.exe PID 2060 wrote to memory of 1712 2060 VenomV5.exe main.exe PID 2060 wrote to memory of 1712 2060 VenomV5.exe main.exe PID 1712 wrote to memory of 2724 1712 main.exe cmd.exe PID 1712 wrote to memory of 2724 1712 main.exe cmd.exe PID 1712 wrote to memory of 2724 1712 main.exe cmd.exe PID 2724 wrote to memory of 2832 2724 cmd.exe chcp.com PID 2724 wrote to memory of 2832 2724 cmd.exe chcp.com PID 2724 wrote to memory of 2832 2724 cmd.exe chcp.com PID 2492 wrote to memory of 2272 2492 paylod.exe Payload.exe PID 2492 wrote to memory of 2272 2492 paylod.exe Payload.exe PID 2492 wrote to memory of 2272 2492 paylod.exe Payload.exe PID 2492 wrote to memory of 2272 2492 paylod.exe Payload.exe PID 2492 wrote to memory of 2640 2492 paylod.exe attrib.exe PID 2492 wrote to memory of 2640 2492 paylod.exe attrib.exe PID 2492 wrote to memory of 2640 2492 paylod.exe attrib.exe PID 2492 wrote to memory of 2640 2492 paylod.exe attrib.exe PID 2272 wrote to memory of 1472 2272 Payload.exe attrib.exe PID 2272 wrote to memory of 1472 2272 Payload.exe attrib.exe PID 2272 wrote to memory of 1472 2272 Payload.exe attrib.exe PID 2272 wrote to memory of 1472 2272 Payload.exe attrib.exe PID 2272 wrote to memory of 688 2272 Payload.exe attrib.exe PID 2272 wrote to memory of 688 2272 Payload.exe attrib.exe PID 2272 wrote to memory of 688 2272 Payload.exe attrib.exe PID 2272 wrote to memory of 688 2272 Payload.exe attrib.exe -
Views/modifies file attributes 1 TTPs 3 IoCs
Processes:
attrib.exeattrib.exeattrib.exepid process 2640 attrib.exe 1472 attrib.exe 688 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\VenomV5.exe"C:\Users\Admin\AppData\Local\Temp\VenomV5.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\paylod.exe"C:\Users\Admin\AppData\Local\Temp\paylod.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\Payload.exe"C:\Users\Admin\AppData\Local\Temp\Payload.exe"3⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe"4⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1472
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Windows.exe"4⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:688
-
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Local\Temp\Payload.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2640
-
-
-
C:\Users\Admin\AppData\Local\Temp\main.exe"C:\Users\Admin\AppData\Local\Temp\main.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd" /c "C:\Users\Admin\AppData\Local\Temp\A9C7.tmp\A9C8.tmp\A9C9.bat C:\Users\Admin\AppData\Local\Temp\main.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\system32\chcp.comchcp 650014⤵PID:2832
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ed10dc8c536ee4a022b94514936658e1
SHA1006378f2c2837b196ecd17db6f1d6db862b8454e
SHA2566851924794377b148813fd77ffe990aeb8abd363e9086b73bf76db117feedc59
SHA512245a2bef61c75090b9108a5c5b81a77d1091b5a4abe8f561d5658e9c708907fe2ada359a9931dfa6decf0a06e5a0fdb08dab6ed7165a78f559512cbedf37634f
-
Filesize
1KB
MD5c7bacc12f165ab5dbbd5a2ae9f2dfca3
SHA1b5017a1d4edee7765391990b42e58043e84b5914
SHA256824baa52042f45bb6bf540719d4635dda57d85989086686e4cf765970847b90e
SHA512acc855362f306368ccbca867f73525e4f2f6cec6c8114e9a706766fdfbe58edcb7b3821b174ab0f22a820e79ecc6ea6a93e1508617745e17015807c2610a4cb7
-
Filesize
1018B
MD55ee8b0aaba1bbc7650be293e7ba97e38
SHA1fecdfe9bc6eb3dd1648d11d954fcd7222a2c8e05
SHA2563931dc1e16b459204b7301391b08fb84190b1bbe5721bb8b2d3a24fa2b37d474
SHA512a3c9ba8c5bebd4a9cddc2b43429a2d5824870e17288939d9bfa333ab35601f78da80405c34bde9a215f88ec5ca01ca4c6ee0d4af69bee4b0c130a1ac8be311ac
-
Filesize
126KB
MD5fb32165caff9614efbc6311fe75da2f2
SHA1674e7a93ed4b9cb097d846463a249bd68c4ab7a6
SHA25641018b0dcfb3adf0ddcda481a276d98cbcee94698ac9c7dbd3644a86687e76e8
SHA51265356ddd14df07f2153e740a8ac9f4d722e604a85663254f5e444850cbb66c15c35e7cedc6fece72df63677ffbbeb094122b05c11e01bf0cded917c3c4608a6d
-
Filesize
26KB
MD51f5545281784c48b113dde61778a4697
SHA146aee2f749bbee1fb7e4f5d8609b798bd5077673
SHA256e31e3e11ce40c048eed1a0f68b0e47a15369b9289b30dcce9fe70b7f7ea26c20
SHA512e262e58f15bbbee488a8423cbd5f03b2e9ab12b7af267d3278b48cb86373ff180b992d126694d3e224a8b97bff5edbaeb9c0d3493528b0d6b49e236339a1ab37