Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2024 00:39
Behavioral task
behavioral1
Sample
sigmarizz.exe
Resource
win7-20240903-en
windows7-x64
5 signatures
150 seconds
General
-
Target
sigmarizz.exe
-
Size
74KB
-
MD5
3c864d4aa89c822182336d4bee1349eb
-
SHA1
2f3db343c46b328a9b8d170ba0f4b7995fd1a13b
-
SHA256
0d9f971be23fbef094b367a3d95a4fc89ece8ead6f82c084b018a87e6e191088
-
SHA512
dc6c0e4b73be9860a82cc89eafdd4544ad6ad28ddf8a61249cc9bcce176629ed7952ae2bc6c8f303ab81f8062ff15ec6df90176c958cf60f220b2eb91012d178
-
SSDEEP
1536:iUtkcxNNmCubPMVQZSE8DIbH1bW/WQzciLVclN:iUGcxNQ5bPMV2StCH1bWeQzBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
147.185.221.225:543120
Mutex
veeyywtggml
Attributes
-
delay
1
-
install
false
-
install_file
idk
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
Processes:
resource yara_rule behavioral2/memory/3916-1-0x0000000000730000-0x0000000000748000-memory.dmp VenomRAT -
Venomrat family
-
Suspicious use of AdjustPrivilegeToken 43 IoCs
Processes:
sigmarizz.exedescription pid Process Token: SeDebugPrivilege 3916 sigmarizz.exe Token: SeIncreaseQuotaPrivilege 3916 sigmarizz.exe Token: SeSecurityPrivilege 3916 sigmarizz.exe Token: SeTakeOwnershipPrivilege 3916 sigmarizz.exe Token: SeLoadDriverPrivilege 3916 sigmarizz.exe Token: SeSystemProfilePrivilege 3916 sigmarizz.exe Token: SeSystemtimePrivilege 3916 sigmarizz.exe Token: SeProfSingleProcessPrivilege 3916 sigmarizz.exe Token: SeIncBasePriorityPrivilege 3916 sigmarizz.exe Token: SeCreatePagefilePrivilege 3916 sigmarizz.exe Token: SeBackupPrivilege 3916 sigmarizz.exe Token: SeRestorePrivilege 3916 sigmarizz.exe Token: SeShutdownPrivilege 3916 sigmarizz.exe Token: SeDebugPrivilege 3916 sigmarizz.exe Token: SeSystemEnvironmentPrivilege 3916 sigmarizz.exe Token: SeRemoteShutdownPrivilege 3916 sigmarizz.exe Token: SeUndockPrivilege 3916 sigmarizz.exe Token: SeManageVolumePrivilege 3916 sigmarizz.exe Token: 33 3916 sigmarizz.exe Token: 34 3916 sigmarizz.exe Token: 35 3916 sigmarizz.exe Token: 36 3916 sigmarizz.exe Token: SeIncreaseQuotaPrivilege 3916 sigmarizz.exe Token: SeSecurityPrivilege 3916 sigmarizz.exe Token: SeTakeOwnershipPrivilege 3916 sigmarizz.exe Token: SeLoadDriverPrivilege 3916 sigmarizz.exe Token: SeSystemProfilePrivilege 3916 sigmarizz.exe Token: SeSystemtimePrivilege 3916 sigmarizz.exe Token: SeProfSingleProcessPrivilege 3916 sigmarizz.exe Token: SeIncBasePriorityPrivilege 3916 sigmarizz.exe Token: SeCreatePagefilePrivilege 3916 sigmarizz.exe Token: SeBackupPrivilege 3916 sigmarizz.exe Token: SeRestorePrivilege 3916 sigmarizz.exe Token: SeShutdownPrivilege 3916 sigmarizz.exe Token: SeDebugPrivilege 3916 sigmarizz.exe Token: SeSystemEnvironmentPrivilege 3916 sigmarizz.exe Token: SeRemoteShutdownPrivilege 3916 sigmarizz.exe Token: SeUndockPrivilege 3916 sigmarizz.exe Token: SeManageVolumePrivilege 3916 sigmarizz.exe Token: 33 3916 sigmarizz.exe Token: 34 3916 sigmarizz.exe Token: 35 3916 sigmarizz.exe Token: 36 3916 sigmarizz.exe