Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/11/2024, 20:55

General

  • Target

    listenlittlenigger.exe

  • Size

    6.7MB

  • MD5

    42bd70076cbd6bf784ab995852146824

  • SHA1

    e0f1e831775736e856f5325f546c3638f6112775

  • SHA256

    b89c8fb7d60e1ad1593a0f8f71f0ff8627f4cd7cdca0ad816cf88f17e36fa159

  • SHA512

    61b4a3e526e84280df3a26b2d8e7cef969dd45f32f6e857f62e9e2b01b355d22da9430807ab1515b2a4be6c7ef2d4b5520d2c3cc8a5c0152595b9a91c3c38f54

  • SSDEEP

    196608:QsjpAN/kWDGXtGzICteEroxzlxZV3Gu5D4S26/CS3HxTM9:Jj6buGzInErot14S26nxY9

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

127.0.0.1:11162

Mutex

kqfpdrtqyhcytvu

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • VenomRAT 2 IoCs

    Detects VenomRAT.

  • Venomrat family
  • Async RAT payload 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\listenlittlenigger.exe
    "C:\Users\Admin\AppData\Local\Temp\listenlittlenigger.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3480
    • C:\Users\Admin\AppData\Local\Temp\listenlittlenigger.exe
      "C:\Users\Admin\AppData\Local\Temp\listenlittlenigger.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:3316
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI34802\file1.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2392
        • C:\Users\Admin\AppData\Local\Temp\_MEI34802\file1.exe
          C:\Users\Admin\AppData\Local\Temp\_MEI34802\file1.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1612
          • \??\c:\PROGRA~1\java\jre-1.8\bin\java.exe
            "c:\PROGRA~1\java\jre-1.8\bin\java.exe" -version
            5⤵
              PID:3596
            • \??\c:\PROGRA~1\java\jdk-1.8\jre\bin\java.exe
              "c:\PROGRA~1\java\jdk-1.8\jre\bin\java.exe" -version
              5⤵
                PID:1540
              • C:\Windows\SYSTEM32\reg.exe
                reg query "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Themes\Personalize" /v AppsUseLightTheme
                5⤵
                  PID:8
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI34802\file2.exe"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:836
              • C:\Users\Admin\AppData\Local\Temp\_MEI34802\file2.exe
                C:\Users\Admin\AppData\Local\Temp\_MEI34802\file2.exe
                4⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:3228

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

                Filesize

                46B

                MD5

                41dd05a5d8621c1552eaf00c8fc949c4

                SHA1

                f2601672e27000fc460724fadcade8c78b6dc663

                SHA256

                a057be46718d51cdd9cac435968aff3d718fb61ef0b14152ae2ee0025172ac99

                SHA512

                3caa757c467b36222969ecd38ac2cf53b1beb4d22ca2f9f30047530e1ec11d6d0177adee7f6167bd26d3297af0e4cfa6343abb39dfcb3979f0c591685106e6aa

              • C:\Users\Admin\AppData\Local\Temp\+JXF3145731845840364052.tmp

                Filesize

                405KB

                MD5

                8f2869a84ad71f156a17bb66611ebe22

                SHA1

                0325b9b3992fa2fdc9c715730a33135696c68a39

                SHA256

                0cb1bc1335372d9e3a0cf6f5311c7cce87af90d2a777fdeec18be605a2a70bc1

                SHA512

                3d4315d591dcf7609c15b3e32bcc234659fcdbe4be24aef5dba4ad248ad42fd9ab082250244f99dc801ec21575b7400aace50a1e8834d5c33404e76a0caac834

              • C:\Users\Admin\AppData\Local\Temp\+JXF538613840190352300.tmp

                Filesize

                397KB

                MD5

                fdb50e0d48cdcf775fa1ac0dc3c33bd4

                SHA1

                5c95e5d66572aeca303512ba41a8dde0cea92c80

                SHA256

                64f8be6e55c37e32ef03da99714bf3aa58b8f2099bfe4f759a7578e3b8291123

                SHA512

                20ce8100c96058d4e64a12d0817b7ce638cec9f5d03651320eb6b9c3f47ee289ccc695bd3b5b6bf8e0867cdab0ebb6e8cae77df054e185828a6a13f3733ede53

              • C:\Users\Admin\AppData\Local\Temp\+JXF8426737665876658062.tmp

                Filesize

                398KB

                MD5

                ff5fdc6f42c720a3ebd7b60f6d605888

                SHA1

                460c18ddf24846e3d8792d440fd9a750503aef1b

                SHA256

                1936d24cb0f4ce7006e08c6ef4243d2e42a7b45f2249f8fe54d92f76a317dfd1

                SHA512

                d3d333b1627d597c83a321a3daca38df63ea0f7cab716006935905b8170379ec2aab26cb7ffc7b539ca272cf7fb7937198aee6db3411077bedf3d2b920d078a3

              • C:\Users\Admin\AppData\Local\Temp\_MEI34802\VCRUNTIME140.dll

                Filesize

                94KB

                MD5

                11d9ac94e8cb17bd23dea89f8e757f18

                SHA1

                d4fb80a512486821ad320c4fd67abcae63005158

                SHA256

                e1d6f78a72836ea120bd27a33ae89cbdc3f3ca7d9d0231aaa3aac91996d2fa4e

                SHA512

                aa6afd6bea27f554e3646152d8c4f96f7bcaaa4933f8b7c04346e410f93f23cfa6d29362fd5d51ccbb8b6223e094cd89e351f072ad0517553703f5bf9de28778

              • C:\Users\Admin\AppData\Local\Temp\_MEI34802\_bz2.pyd

                Filesize

                78KB

                MD5

                b45e82a398713163216984f2feba88f6

                SHA1

                eaaf4b91db6f67d7c57c2711f4e968ce0fe5d839

                SHA256

                4c2649dc69a8874b91646723aacb84c565efeaa4277c46392055bca9a10497a8

                SHA512

                b9c4f22dc4b52815c407ab94d18a7f2e1e4f2250aecdb2e75119150e69b006ed69f3000622ec63eabcf0886b7f56ffdb154e0bf57d8f7f45c3b1dd5c18b84ec8

              • C:\Users\Admin\AppData\Local\Temp\_MEI34802\_decimal.pyd

                Filesize

                241KB

                MD5

                1cdd7239fc63b7c8a2e2bc0a08d9ea76

                SHA1

                85ef6f43ba1343b30a223c48442a8b4f5254d5b0

                SHA256

                384993b2b8cfcbf155e63f0ee2383a9f9483de92ab73736ff84590a0c4ca2690

                SHA512

                ba4e19e122f83d477cc4be5e0dea184dafba2f438a587dd4f0ef038abd40cb9cdc1986ee69c34bac3af9cf2347bea137feea3b82e02cca1a7720d735cea7acda

              • C:\Users\Admin\AppData\Local\Temp\_MEI34802\_hashlib.pyd

                Filesize

                57KB

                MD5

                cfb9e0a73a6c9d6d35c2594e52e15234

                SHA1

                b86042c96f2ce6d8a239b7d426f298a23df8b3b9

                SHA256

                50daeb3985302a8d85ce8167b0bf08b9da43e7d51ceae50e8e1cdfb0edf218c6

                SHA512

                22a5fd139d88c0eee7241c5597d8dbbf2b78841565d0ed0df62383ab50fde04b13a203bddef03530f8609f5117869ed06894a572f7655224285823385d7492d2

              • C:\Users\Admin\AppData\Local\Temp\_MEI34802\_lzma.pyd

                Filesize

                149KB

                MD5

                5a77a1e70e054431236adb9e46f40582

                SHA1

                be4a8d1618d3ad11cfdb6a366625b37c27f4611a

                SHA256

                f125a885c10e1be4b12d988d6c19128890e7add75baa935fe1354721aa2dea3e

                SHA512

                3c14297a1400a93d1a01c7f8b4463bfd6be062ec08daaf5eb7fcbcde7f4fa40ae06e016ff0de16cb03b987c263876f2f437705adc66244d3ee58f23d6bf7f635

              • C:\Users\Admin\AppData\Local\Temp\_MEI34802\_socket.pyd

                Filesize

                72KB

                MD5

                5dd51579fa9b6a06336854889562bec0

                SHA1

                99c0ed0a15ed450279b01d95b75c162628c9be1d

                SHA256

                3669e56e99ae3a944fbe7845f0be05aea96a603717e883d56a27dc356f8c2f2c

                SHA512

                7aa6c6587890ae8c3f9a5e97ebde689243ac5b9abb9b1e887f29c53eef99a53e4b4ec100c03e1c043e2f0d330e7af444c3ca886c9a5e338c2ea42aaacae09f3e

              • C:\Users\Admin\AppData\Local\Temp\_MEI34802\base_library.zip

                Filesize

                858KB

                MD5

                98619f4a9ef4debe1f8e20361c3e5280

                SHA1

                d6fd1b33527b0a8db0070bfd8c0a75d59ecd8daa

                SHA256

                ac11659983d0cd24f8cae58fb12ad017a4d4523c9486247d477fbea5bd49f951

                SHA512

                a39bc78bb4b37f64b2046fe5b9dfc1dfb0b2f5b8733f3bde4a6fa38ed8abaed5992574ea89634294472f2d82f0f0314cd3de093f288076e74213ced58c205434

              • C:\Users\Admin\AppData\Local\Temp\_MEI34802\file1.exe

                Filesize

                1.6MB

                MD5

                ebb40145a6bfbed88859e41689315d82

                SHA1

                7bb2c82ef24ef919d04592930bceae039f78aebf

                SHA256

                e4baeaa3c58628acfd7058b9d434ab2e6a7400445f55685169a79f045810298c

                SHA512

                67c6601bed14363e6850d93cf2b90c1e4f69c7cd5098d548aa0f378fb42dc6e32fe52cb81aeb232a365a3edb24fdc6ef46f6400cf1709e1d5ee22fa4ac4e07ae

              • C:\Users\Admin\AppData\Local\Temp\_MEI34802\file2.exe

                Filesize

                74KB

                MD5

                e16eebd243b2f89c9d9c1d81dc44a09d

                SHA1

                268c938415c863c330a00747ee9ddd5a7d890ffc

                SHA256

                fc0118ea892af96231a2f6314fe1f8d19ce5393a04be525e6c977b300d28d3d3

                SHA512

                dacef3fef80ec8cff1f2ec25ab78fb2e27f430f87512d21e3009fdc4cccddff2ef7c29fa78fe80aca7c32db51bd42d03842f50774690c3d39e25ce6469d25831

              • C:\Users\Admin\AppData\Local\Temp\_MEI34802\libcrypto-1_1.dll

                Filesize

                3.3MB

                MD5

                63c4f445b6998e63a1414f5765c18217

                SHA1

                8c1ac1b4290b122e62f706f7434517077974f40e

                SHA256

                664c3e52f914e351bb8a66ce2465ee0d40acab1d2a6b3167ae6acf6f1d1724d2

                SHA512

                aa7bdb3c5bc8aeefbad70d785f2468acbb88ef6e6cac175da765647030734453a2836f9658dc7ce33f6fff0de85cb701c825ef5c04018d79fa1953c8ef946afd

              • C:\Users\Admin\AppData\Local\Temp\_MEI34802\python310.dll

                Filesize

                4.2MB

                MD5

                384349987b60775d6fc3a6d202c3e1bd

                SHA1

                701cb80c55f859ad4a31c53aa744a00d61e467e5

                SHA256

                f281c2e252ed59dd96726dbb2de529a2b07b818e9cc3799d1ffa9883e3028ed8

                SHA512

                6bf3ef9f08f4fc07461b6ea8d9822568ad0a0f211e471b990f62c6713adb7b6be28b90f206a4ec0673b92bae99597d1c7785381e486f6091265c7df85ff0f9b5

              • C:\Users\Admin\AppData\Local\Temp\_MEI34802\select.pyd

                Filesize

                25KB

                MD5

                78d421a4e6b06b5561c45b9a5c6f86b1

                SHA1

                c70747d3f2d26a92a0fe0b353f1d1d01693929ac

                SHA256

                f1694ce82da997faa89a9d22d469bfc94abb0f2063a69ec9b953bc085c2cb823

                SHA512

                83e02963c9726a40cd4608b69b4cdf697e41c9eedfb2d48f3c02c91500e212e7e0ab03e6b3f70f42e16e734e572593f27b016b901c8aa75f674b6e0fbb735012

              • C:\Users\Admin\AppData\Local\Temp\_MEI34802\unicodedata.pyd

                Filesize

                1.1MB

                MD5

                a40ff441b1b612b3b9f30f28fa3c680d

                SHA1

                42a309992bdbb68004e2b6b60b450e964276a8fc

                SHA256

                9b22d93f4db077a70a1d85ffc503980903f1a88e262068dd79c6190ec7a31b08

                SHA512

                5f9142b16ed7ffc0e5b17d6a4257d7249a21061fe5e928d3cde75265c2b87b723b2e7bd3109c30d2c8f83913134445e8672c98c187073368c244a476ac46c3ef

              • C:\Users\Admin\AppData\Local\Temp\e4j82CC.tmp_dir1732913727\SKlauncher-3.2.10.jar

                Filesize

                1.1MB

                MD5

                1495e81aa573744050268cb330af8281

                SHA1

                b67d9bda787a526c79128179e5000924bca11dd4

                SHA256

                3ce7e5aff85320e1d393eb34e918a6b71a667bccf08252fbdd512443e5d62f9a

                SHA512

                e321e4b9243815b4d0b3ab34c380c2b8da0e8e264b791018a4385967946e8cf320fb5bcb695b7aa75e5a9420ae6ced6ea3c05ecfaedb7a1a6e02a1438a2c9d4d

              • C:\Users\Admin\AppData\Local\Temp\flatlaf.temp\flatlaf-windows-x86_64-4726327958800.dll

                Filesize

                23KB

                MD5

                8b9f16320499ece60d7ff0c1249c6df7

                SHA1

                cd8fc57c064533df66f0ceaaf5d76f8c4f8cb3a0

                SHA256

                f8a3af19341ac0f12f55ad28169d22b75aa66ed818692541307393c22f986727

                SHA512

                97384ee1faa1be807388f4077fde5db94010f06420b1ff3a05edf77fb91c9a8163b0a91cb1b7e648c0cd8c4d599e552050f64b8f7c5c81c1be60cd35f062e9d3

              • C:\Users\Admin\AppData\Roaming\.minecraft\sklauncher-fx.jar

                Filesize

                14.4MB

                MD5

                9def4a689f22d8ec2fbbbc08de5224d2

                SHA1

                e3a437eb4d63a6afc2541ca8e9472c73ba9cea06

                SHA256

                d9d099a694960d4b4c27ee91b1bf72c2772b66925f49cc19a77fea3e6f69e282

                SHA512

                56f0e93f45cc76f4feddf9138e278b0cb15b04031b084abf0fa44760dd8c79594112b2ace02149e7480efd6515fe28c9b8cc0cb626c563d9e9c35ac52165a5e7

              • memory/1540-76-0x000002AA0DFB0000-0x000002AA0DFB1000-memory.dmp

                Filesize

                4KB

              • memory/1612-149-0x0000000002600000-0x0000000002601000-memory.dmp

                Filesize

                4KB

              • memory/1612-292-0x0000000002600000-0x0000000002601000-memory.dmp

                Filesize

                4KB

              • memory/1612-190-0x0000000002600000-0x0000000002601000-memory.dmp

                Filesize

                4KB

              • memory/1612-205-0x0000000002600000-0x0000000002601000-memory.dmp

                Filesize

                4KB

              • memory/1612-93-0x0000000002600000-0x0000000002601000-memory.dmp

                Filesize

                4KB

              • memory/1612-223-0x0000000002600000-0x0000000002601000-memory.dmp

                Filesize

                4KB

              • memory/1612-224-0x0000000002600000-0x0000000002601000-memory.dmp

                Filesize

                4KB

              • memory/1612-225-0x0000000002600000-0x0000000002601000-memory.dmp

                Filesize

                4KB

              • memory/1612-231-0x0000000002600000-0x0000000002601000-memory.dmp

                Filesize

                4KB

              • memory/1612-277-0x0000000002600000-0x0000000002601000-memory.dmp

                Filesize

                4KB

              • memory/1612-281-0x0000000002600000-0x0000000002601000-memory.dmp

                Filesize

                4KB

              • memory/1612-286-0x0000000002600000-0x0000000002601000-memory.dmp

                Filesize

                4KB

              • memory/1612-290-0x0000000002600000-0x0000000002601000-memory.dmp

                Filesize

                4KB

              • memory/1612-127-0x0000000002600000-0x0000000002601000-memory.dmp

                Filesize

                4KB

              • memory/1612-299-0x0000000002600000-0x0000000002601000-memory.dmp

                Filesize

                4KB

              • memory/1612-301-0x0000000002600000-0x0000000002601000-memory.dmp

                Filesize

                4KB

              • memory/1612-307-0x0000000002600000-0x0000000002601000-memory.dmp

                Filesize

                4KB

              • memory/1612-306-0x0000000002600000-0x0000000002601000-memory.dmp

                Filesize

                4KB

              • memory/1612-315-0x0000000002600000-0x0000000002601000-memory.dmp

                Filesize

                4KB

              • memory/3228-389-0x00007FFF6B503000-0x00007FFF6B505000-memory.dmp

                Filesize

                8KB

              • memory/3228-524-0x00007FFF6B500000-0x00007FFF6BFC1000-memory.dmp

                Filesize

                10.8MB

              • memory/3228-54-0x00007FFF6B500000-0x00007FFF6BFC1000-memory.dmp

                Filesize

                10.8MB

              • memory/3228-50-0x0000000000620000-0x0000000000638000-memory.dmp

                Filesize

                96KB

              • memory/3228-46-0x00007FFF6B503000-0x00007FFF6B505000-memory.dmp

                Filesize

                8KB

              • memory/3596-64-0x0000026BCA0F0000-0x0000026BCA0F1000-memory.dmp

                Filesize

                4KB