Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2024 04:40
Behavioral task
behavioral1
Sample
4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe
Resource
win10v2004-20241007-en
General
-
Target
4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe
-
Size
63KB
-
MD5
7a07e04f23f699274848e648de214470
-
SHA1
4de6f3027d543bf41aced63f10124dc067e4e31d
-
SHA256
4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50
-
SHA512
32a61674fff66c5d2e5dbd9e07571b1bb61a41a0437ad4f67ca3992f69e27fcddba867997c2390b362d327216dd02674d7dfb5919c671d8e9bd9422baafe5283
-
SSDEEP
1536:AhIBLTM3Ufc0cMdmeeiIVrGbbXwKpZKjGGDpqKmY7:AhIBLTM3Ufc6d/eXGbbXLZKjgz
Malware Config
Extracted
asyncrat
5.0.5
Venom Clients
but-directive.gl.at.ply.gg:9840
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4724 4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe Token: SeSecurityPrivilege 4724 4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe Token: SeTakeOwnershipPrivilege 4724 4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe Token: SeLoadDriverPrivilege 4724 4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe Token: SeSystemProfilePrivilege 4724 4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe Token: SeSystemtimePrivilege 4724 4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe Token: SeProfSingleProcessPrivilege 4724 4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe Token: SeIncBasePriorityPrivilege 4724 4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe Token: SeCreatePagefilePrivilege 4724 4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe Token: SeBackupPrivilege 4724 4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe Token: SeRestorePrivilege 4724 4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe Token: SeShutdownPrivilege 4724 4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe Token: SeDebugPrivilege 4724 4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe Token: SeSystemEnvironmentPrivilege 4724 4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe Token: SeRemoteShutdownPrivilege 4724 4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe Token: SeUndockPrivilege 4724 4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe Token: SeManageVolumePrivilege 4724 4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe Token: 33 4724 4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe Token: 34 4724 4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe Token: 35 4724 4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe Token: 36 4724 4c525390a03779b69cee65bc2a5d37356af5a6e641bb5936a187acbac9296b50N.exe