Analysis
-
max time kernel
30s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-12-2024 04:40
Behavioral task
behavioral1
Sample
4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe
Resource
win10v2004-20241007-en
General
-
Target
4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe
-
Size
63KB
-
MD5
7a07e04f23f699274848e648de214470
-
SHA1
4de6f3027d543bf41aced63f10124dc067e4e31d
-
SHA256
4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50
-
SHA512
32a61674fff66c5d2e5dbd9e07571b1bb61a41a0437ad4f67ca3992f69e27fcddba867997c2390b362d327216dd02674d7dfb5919c671d8e9bd9422baafe5283
-
SSDEEP
1536:AhIBLTM3Ufc0cMdmeeiIVrGbbXwKpZKjGGDpqKmY7:AhIBLTM3Ufc6d/eXGbbXLZKjgz
Malware Config
Extracted
asyncrat
5.0.5
Venom Clients
but-directive.gl.at.ply.gg:9840
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2288 4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe Token: SeSecurityPrivilege 2288 4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe Token: SeTakeOwnershipPrivilege 2288 4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe Token: SeLoadDriverPrivilege 2288 4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe Token: SeSystemProfilePrivilege 2288 4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe Token: SeSystemtimePrivilege 2288 4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe Token: SeProfSingleProcessPrivilege 2288 4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe Token: SeIncBasePriorityPrivilege 2288 4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe Token: SeCreatePagefilePrivilege 2288 4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe Token: SeBackupPrivilege 2288 4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe Token: SeRestorePrivilege 2288 4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe Token: SeShutdownPrivilege 2288 4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe Token: SeDebugPrivilege 2288 4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe Token: SeSystemEnvironmentPrivilege 2288 4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe Token: SeRemoteShutdownPrivilege 2288 4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe Token: SeUndockPrivilege 2288 4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe Token: SeManageVolumePrivilege 2288 4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe Token: 33 2288 4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe Token: 34 2288 4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe Token: 35 2288 4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe