Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 21:58
Behavioral task
behavioral1
Sample
VenomRATH.exe
Resource
win7-20241010-en
5 signatures
150 seconds
General
-
Target
VenomRATH.exe
-
Size
82KB
-
MD5
8a3dd13b76ffa48d91e3977521470b00
-
SHA1
5b8680973619e3815b3740d59dbc1787f36e647c
-
SHA256
a28b1a9bdd2af4df5021dd2b52a16b8e2706694e2f0005161e52c0dcc7dff1b6
-
SHA512
4039ff446bd618c6357ff05bbf2d4b9a0e1ae85147ad19b11c6e56a3e461f71acacc261e16679e3962d59409897c84457752b9af2b3307f780c85cab28e74ed4
-
SSDEEP
1536:RzUiccx4y3lCl6PMVOe9VdQuDI6H1bf/UkUU3QzcH33hQVclN:pUzcx4yVy6PMVOe9VdQsH1bfyU3Qq33P
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
C2
127.0.0.1:4449
Mutex
xtyciqbmxupr
Attributes
-
delay
1
-
install
true
-
install_file
VenomRAT v6.0.3 (+SOURCE).exe
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
resource yara_rule behavioral2/memory/4832-1-0x00000000008A0000-0x00000000008BA000-memory.dmp VenomRAT -
Venomrat family
-
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeDebugPrivilege 4832 VenomRATH.exe Token: SeIncreaseQuotaPrivilege 4832 VenomRATH.exe Token: SeSecurityPrivilege 4832 VenomRATH.exe Token: SeTakeOwnershipPrivilege 4832 VenomRATH.exe Token: SeLoadDriverPrivilege 4832 VenomRATH.exe Token: SeSystemProfilePrivilege 4832 VenomRATH.exe Token: SeSystemtimePrivilege 4832 VenomRATH.exe Token: SeProfSingleProcessPrivilege 4832 VenomRATH.exe Token: SeIncBasePriorityPrivilege 4832 VenomRATH.exe Token: SeCreatePagefilePrivilege 4832 VenomRATH.exe Token: SeBackupPrivilege 4832 VenomRATH.exe Token: SeRestorePrivilege 4832 VenomRATH.exe Token: SeShutdownPrivilege 4832 VenomRATH.exe Token: SeDebugPrivilege 4832 VenomRATH.exe Token: SeSystemEnvironmentPrivilege 4832 VenomRATH.exe Token: SeRemoteShutdownPrivilege 4832 VenomRATH.exe Token: SeUndockPrivilege 4832 VenomRATH.exe Token: SeManageVolumePrivilege 4832 VenomRATH.exe Token: 33 4832 VenomRATH.exe Token: 34 4832 VenomRATH.exe Token: 35 4832 VenomRATH.exe Token: 36 4832 VenomRATH.exe Token: SeIncreaseQuotaPrivilege 4832 VenomRATH.exe Token: SeSecurityPrivilege 4832 VenomRATH.exe Token: SeTakeOwnershipPrivilege 4832 VenomRATH.exe Token: SeLoadDriverPrivilege 4832 VenomRATH.exe Token: SeSystemProfilePrivilege 4832 VenomRATH.exe Token: SeSystemtimePrivilege 4832 VenomRATH.exe Token: SeProfSingleProcessPrivilege 4832 VenomRATH.exe Token: SeIncBasePriorityPrivilege 4832 VenomRATH.exe Token: SeCreatePagefilePrivilege 4832 VenomRATH.exe Token: SeBackupPrivilege 4832 VenomRATH.exe Token: SeRestorePrivilege 4832 VenomRATH.exe Token: SeShutdownPrivilege 4832 VenomRATH.exe Token: SeDebugPrivilege 4832 VenomRATH.exe Token: SeSystemEnvironmentPrivilege 4832 VenomRATH.exe Token: SeRemoteShutdownPrivilege 4832 VenomRATH.exe Token: SeUndockPrivilege 4832 VenomRATH.exe Token: SeManageVolumePrivilege 4832 VenomRATH.exe Token: 33 4832 VenomRATH.exe Token: 34 4832 VenomRATH.exe Token: 35 4832 VenomRATH.exe Token: 36 4832 VenomRATH.exe