Analysis
-
max time kernel
688s -
max time network
682s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
23-11-2024 17:55
Static task
static1
Behavioral task
behavioral1
Sample
Venom V5.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
Venom V5.exe
-
Size
289KB
-
MD5
121a7190a24ba74a4c49c951dd56ad72
-
SHA1
fb5b1adf74cda03d5a77096b866942a6fbd5aa89
-
SHA256
049e3ab43c29a82fc17b415fb88df0b0c238efea6be76a25da1f2bb88ee22a6b
-
SHA512
b1a983027932897e97c4e3ac9865e6fe987c3b772c5847db3f3cc5b8e2b4c845e7040bf8a7e7d546b77c3f78e39c32eaeb7321f1c6f99dd28554c80fec603bb3
-
SSDEEP
6144:6/E7c5W+sPgJJUuCm2pad2AO51SLPml16S6M6supNDdPstxChZ:UEeggJauClpjL5sar6M6supXPstw
Malware Config
Extracted
njrat
v4.0
Victim
audio-ham.gl.at.ply.gg:52424
Windows
-
reg_key
Windows
-
splitter
|-F-|
Signatures
-
Njrat family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\Control Panel\International\Geo\Nation Venom V5.exe Key value queried \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\Control Panel\International\Geo\Nation paylod.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk paylod.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk Payload.exe -
Executes dropped EXE 3 IoCs
pid Process 1444 paylod.exe 3376 main.exe 2892 Payload.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Payload.exe" paylod.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 1036 tasklist.exe 4720 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payload.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Venom V5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language paylod.exe -
Delays execution with timeout.exe 9 IoCs
pid Process 3096 timeout.exe 1960 timeout.exe 2192 timeout.exe 1820 timeout.exe 3524 timeout.exe 3028 timeout.exe 2772 timeout.exe 2204 timeout.exe 1132 timeout.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2892 Payload.exe Token: 33 2892 Payload.exe Token: SeIncBasePriorityPrivilege 2892 Payload.exe Token: 33 2892 Payload.exe Token: SeIncBasePriorityPrivilege 2892 Payload.exe Token: 33 2892 Payload.exe Token: SeIncBasePriorityPrivilege 2892 Payload.exe Token: 33 2892 Payload.exe Token: SeIncBasePriorityPrivilege 2892 Payload.exe Token: 33 2892 Payload.exe Token: SeIncBasePriorityPrivilege 2892 Payload.exe Token: 33 2892 Payload.exe Token: SeIncBasePriorityPrivilege 2892 Payload.exe Token: 33 2892 Payload.exe Token: SeIncBasePriorityPrivilege 2892 Payload.exe Token: 33 2892 Payload.exe Token: SeIncBasePriorityPrivilege 2892 Payload.exe Token: 33 2892 Payload.exe Token: SeIncBasePriorityPrivilege 2892 Payload.exe Token: 33 2892 Payload.exe Token: SeIncBasePriorityPrivilege 2892 Payload.exe Token: 33 2892 Payload.exe Token: SeIncBasePriorityPrivilege 2892 Payload.exe Token: 33 2892 Payload.exe Token: SeIncBasePriorityPrivilege 2892 Payload.exe Token: 33 2892 Payload.exe Token: SeIncBasePriorityPrivilege 2892 Payload.exe Token: 33 2892 Payload.exe Token: SeIncBasePriorityPrivilege 2892 Payload.exe Token: SeDebugPrivilege 1036 tasklist.exe Token: 33 2892 Payload.exe Token: SeIncBasePriorityPrivilege 2892 Payload.exe Token: SeDebugPrivilege 4720 tasklist.exe Token: 33 2892 Payload.exe Token: SeIncBasePriorityPrivilege 2892 Payload.exe Token: 33 2892 Payload.exe Token: SeIncBasePriorityPrivilege 2892 Payload.exe Token: 33 2892 Payload.exe Token: SeIncBasePriorityPrivilege 2892 Payload.exe Token: 33 2892 Payload.exe Token: SeIncBasePriorityPrivilege 2892 Payload.exe Token: 33 2892 Payload.exe Token: SeIncBasePriorityPrivilege 2892 Payload.exe Token: 33 2892 Payload.exe Token: SeIncBasePriorityPrivilege 2892 Payload.exe Token: 33 2892 Payload.exe Token: SeIncBasePriorityPrivilege 2892 Payload.exe Token: 33 2892 Payload.exe Token: SeIncBasePriorityPrivilege 2892 Payload.exe Token: 33 2892 Payload.exe Token: SeIncBasePriorityPrivilege 2892 Payload.exe Token: 33 2892 Payload.exe Token: SeIncBasePriorityPrivilege 2892 Payload.exe Token: 33 2892 Payload.exe Token: SeIncBasePriorityPrivilege 2892 Payload.exe Token: 33 2892 Payload.exe Token: SeIncBasePriorityPrivilege 2892 Payload.exe Token: 33 2892 Payload.exe Token: SeIncBasePriorityPrivilege 2892 Payload.exe Token: 33 2892 Payload.exe Token: SeIncBasePriorityPrivilege 2892 Payload.exe Token: 33 2892 Payload.exe Token: SeIncBasePriorityPrivilege 2892 Payload.exe Token: 33 2892 Payload.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3888 wrote to memory of 1444 3888 Venom V5.exe 83 PID 3888 wrote to memory of 1444 3888 Venom V5.exe 83 PID 3888 wrote to memory of 1444 3888 Venom V5.exe 83 PID 3888 wrote to memory of 3376 3888 Venom V5.exe 84 PID 3888 wrote to memory of 3376 3888 Venom V5.exe 84 PID 3376 wrote to memory of 5068 3376 main.exe 86 PID 3376 wrote to memory of 5068 3376 main.exe 86 PID 5068 wrote to memory of 3900 5068 cmd.exe 87 PID 5068 wrote to memory of 3900 5068 cmd.exe 87 PID 1444 wrote to memory of 2892 1444 paylod.exe 95 PID 1444 wrote to memory of 2892 1444 paylod.exe 95 PID 1444 wrote to memory of 2892 1444 paylod.exe 95 PID 1444 wrote to memory of 876 1444 paylod.exe 96 PID 1444 wrote to memory of 876 1444 paylod.exe 96 PID 1444 wrote to memory of 876 1444 paylod.exe 96 PID 2892 wrote to memory of 3780 2892 Payload.exe 98 PID 2892 wrote to memory of 3780 2892 Payload.exe 98 PID 2892 wrote to memory of 3780 2892 Payload.exe 98 PID 2892 wrote to memory of 5052 2892 Payload.exe 99 PID 2892 wrote to memory of 5052 2892 Payload.exe 99 PID 2892 wrote to memory of 5052 2892 Payload.exe 99 PID 5068 wrote to memory of 1036 5068 cmd.exe 104 PID 5068 wrote to memory of 1036 5068 cmd.exe 104 PID 5068 wrote to memory of 2448 5068 cmd.exe 105 PID 5068 wrote to memory of 2448 5068 cmd.exe 105 PID 5068 wrote to memory of 1132 5068 cmd.exe 107 PID 5068 wrote to memory of 1132 5068 cmd.exe 107 PID 5068 wrote to memory of 4720 5068 cmd.exe 108 PID 5068 wrote to memory of 4720 5068 cmd.exe 108 PID 5068 wrote to memory of 4172 5068 cmd.exe 109 PID 5068 wrote to memory of 4172 5068 cmd.exe 109 PID 5068 wrote to memory of 3028 5068 cmd.exe 110 PID 5068 wrote to memory of 3028 5068 cmd.exe 110 PID 5068 wrote to memory of 3096 5068 cmd.exe 111 PID 5068 wrote to memory of 3096 5068 cmd.exe 111 PID 5068 wrote to memory of 2772 5068 cmd.exe 112 PID 5068 wrote to memory of 2772 5068 cmd.exe 112 PID 5068 wrote to memory of 2204 5068 cmd.exe 113 PID 5068 wrote to memory of 2204 5068 cmd.exe 113 PID 5068 wrote to memory of 1960 5068 cmd.exe 114 PID 5068 wrote to memory of 1960 5068 cmd.exe 114 PID 5068 wrote to memory of 2192 5068 cmd.exe 115 PID 5068 wrote to memory of 2192 5068 cmd.exe 115 PID 5068 wrote to memory of 1820 5068 cmd.exe 116 PID 5068 wrote to memory of 1820 5068 cmd.exe 116 PID 5068 wrote to memory of 3524 5068 cmd.exe 117 PID 5068 wrote to memory of 3524 5068 cmd.exe 117 -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 876 attrib.exe 3780 attrib.exe 5052 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Venom V5.exe"C:\Users\Admin\AppData\Local\Temp\Venom V5.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\paylod.exe"C:\Users\Admin\AppData\Local\Temp\paylod.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\Payload.exe"C:\Users\Admin\AppData\Local\Temp\Payload.exe"3⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe"4⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3780
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Windows.exe"4⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:5052
-
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Local\Temp\Payload.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:876
-
-
-
C:\Users\Admin\AppData\Local\Temp\main.exe"C:\Users\Admin\AppData\Local\Temp\main.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd" /c "C:\Users\Admin\AppData\Local\Temp\B4F8.tmp\B4F9.tmp\B4FA.bat C:\Users\Admin\AppData\Local\Temp\main.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\system32\chcp.comchcp 650014⤵PID:3900
-
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq RobloxPlayerBeta.exe"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1036
-
-
C:\Windows\system32\find.exefind /I "RobloxPlayerBeta.exe"4⤵PID:2448
-
-
C:\Windows\system32\timeout.exetimeout /t 5 /nobreak4⤵
- Delays execution with timeout.exe
PID:1132
-
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq RobloxPlayerBeta.exe"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4720
-
-
C:\Windows\system32\find.exefind /I "RobloxPlayerBeta.exe"4⤵PID:4172
-
-
C:\Windows\system32\timeout.exetimeout /t 3 /nobreak4⤵
- Delays execution with timeout.exe
PID:3028
-
-
C:\Windows\system32\timeout.exetimeout /t 2 /nobreak4⤵
- Delays execution with timeout.exe
PID:3096
-
-
C:\Windows\system32\timeout.exetimeout /t 3 /nobreak4⤵
- Delays execution with timeout.exe
PID:2772
-
-
C:\Windows\system32\timeout.exetimeout /t 2 /nobreak4⤵
- Delays execution with timeout.exe
PID:2204
-
-
C:\Windows\system32\timeout.exetimeout /t 2 /nobreak4⤵
- Delays execution with timeout.exe
PID:1960
-
-
C:\Windows\system32\timeout.exetimeout /t 2 /nobreak4⤵
- Delays execution with timeout.exe
PID:2192
-
-
C:\Windows\system32\timeout.exetimeout /t 2 /nobreak4⤵
- Delays execution with timeout.exe
PID:1820
-
-
C:\Windows\system32\timeout.exetimeout /t 2 /nobreak4⤵
- Delays execution with timeout.exe
PID:3524
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ed10dc8c536ee4a022b94514936658e1
SHA1006378f2c2837b196ecd17db6f1d6db862b8454e
SHA2566851924794377b148813fd77ffe990aeb8abd363e9086b73bf76db117feedc59
SHA512245a2bef61c75090b9108a5c5b81a77d1091b5a4abe8f561d5658e9c708907fe2ada359a9931dfa6decf0a06e5a0fdb08dab6ed7165a78f559512cbedf37634f
-
Filesize
126KB
MD5fb32165caff9614efbc6311fe75da2f2
SHA1674e7a93ed4b9cb097d846463a249bd68c4ab7a6
SHA25641018b0dcfb3adf0ddcda481a276d98cbcee94698ac9c7dbd3644a86687e76e8
SHA51265356ddd14df07f2153e740a8ac9f4d722e604a85663254f5e444850cbb66c15c35e7cedc6fece72df63677ffbbeb094122b05c11e01bf0cded917c3c4608a6d
-
Filesize
26KB
MD51f5545281784c48b113dde61778a4697
SHA146aee2f749bbee1fb7e4f5d8609b798bd5077673
SHA256e31e3e11ce40c048eed1a0f68b0e47a15369b9289b30dcce9fe70b7f7ea26c20
SHA512e262e58f15bbbee488a8423cbd5f03b2e9ab12b7af267d3278b48cb86373ff180b992d126694d3e224a8b97bff5edbaeb9c0d3493528b0d6b49e236339a1ab37
-
Filesize
1KB
MD5a1b20ae9a3b796fa08c62f28f4b612bb
SHA1540da09990d1e516e94154158b1ddb50332a0981
SHA256e8899e70b6ea68d070d95f708b9c6fe537cc03b3e1bcba90a65e1cf3db3fb6fc
SHA512ac73b4a7386eaa9128b6c2c6bfef89834d2b28dec67c29bdf34e2a1f3aaa93bb5782e2bd2ad2465555df92b2eccee0580b3a345264b77859dc62de2ed3943393
-
Filesize
1KB
MD550cdc975732f872173656ade87786604
SHA10437b2d837e17774acf5e2793732ad5c381c6292
SHA256b78dd817b7b8ce310e79a79f63ca6c33d810933f1b97464691cbc0bc5e94da8d
SHA51296a0088f385bdb8b648e4d62a6590f4483379bda37b622b7844735669fdb462f1c77508394f7208786694536429c6fa1a0d0a14d0d24348b91e3a2eca25938a8