Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 17:04
Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Client.exe
Resource
win10v2004-20241007-en
General
-
Target
Client.exe
-
Size
63KB
-
MD5
7aabeebd130a48ceb6d29db6338d46d5
-
SHA1
c72371a7cf6c472252b1d3f7c6e12d3de77e145c
-
SHA256
c6cb794e8febc4b598d491fe2c94e59cf45dfbc4ca97b03aded9277c918e3a9b
-
SHA512
d9bb873fa1768453d3fb3a1f9bbaf2b76a0b21717f86da24ed028876a4d470d014e443aaab24072487413a362d46e78ff52fac6dd8a923d2ec1efcb84016cfc7
-
SSDEEP
1536:4ZuttUdjLAQJaeeiIVrGbbXwUhktGiDpqKmY7:4ZuttUdjvJjeXGbbX7+9gz
Malware Config
Extracted
asyncrat
5.0.5
Venom Clients
following-geometry.gl.at.ply.gg:11493
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
true
-
install_file
setup.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000a00000001202c-15.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 536 setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2092 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 484 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1304 Client.exe 1304 Client.exe 1304 Client.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1304 Client.exe Token: SeDebugPrivilege 536 setup.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1304 wrote to memory of 2760 1304 Client.exe 30 PID 1304 wrote to memory of 2760 1304 Client.exe 30 PID 1304 wrote to memory of 2760 1304 Client.exe 30 PID 1304 wrote to memory of 2264 1304 Client.exe 32 PID 1304 wrote to memory of 2264 1304 Client.exe 32 PID 1304 wrote to memory of 2264 1304 Client.exe 32 PID 2760 wrote to memory of 484 2760 cmd.exe 33 PID 2760 wrote to memory of 484 2760 cmd.exe 33 PID 2760 wrote to memory of 484 2760 cmd.exe 33 PID 2264 wrote to memory of 2092 2264 cmd.exe 35 PID 2264 wrote to memory of 2092 2264 cmd.exe 35 PID 2264 wrote to memory of 2092 2264 cmd.exe 35 PID 2264 wrote to memory of 536 2264 cmd.exe 36 PID 2264 wrote to memory of 536 2264 cmd.exe 36 PID 2264 wrote to memory of 536 2264 cmd.exe 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "setup" /tr '"C:\Users\Admin\AppData\Roaming\setup.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "setup" /tr '"C:\Users\Admin\AppData\Roaming\setup.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:484
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpB895.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2092
-
-
C:\Users\Admin\AppData\Roaming\setup.exe"C:\Users\Admin\AppData\Roaming\setup.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:536
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
149B
MD5e4732b5b698c5afc5425b2e9d923c503
SHA16c39cf8211c787256fadf9bcacde303b49f1184f
SHA2569f10c0cfca1bc1af0bd5b1c26686751f25d1afd24cc0ed8a265864c3b983b6d0
SHA512f8ad376264881f886069a9da6e7a7175412a5542969e4606f3454dfbd5fbdac5014a61cf8bbb804c2890b3baf57d3405a40c7f590b9c9473da01a4927d508195
-
Filesize
63KB
MD57aabeebd130a48ceb6d29db6338d46d5
SHA1c72371a7cf6c472252b1d3f7c6e12d3de77e145c
SHA256c6cb794e8febc4b598d491fe2c94e59cf45dfbc4ca97b03aded9277c918e3a9b
SHA512d9bb873fa1768453d3fb3a1f9bbaf2b76a0b21717f86da24ed028876a4d470d014e443aaab24072487413a362d46e78ff52fac6dd8a923d2ec1efcb84016cfc7