Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2024 14:10
Behavioral task
behavioral1
Sample
QML32_Test.exe
Resource
win7-20240903-en
windows7-x64
5 signatures
150 seconds
General
-
Target
QML32_Test.exe
-
Size
74KB
-
MD5
d19a6f265293b9a714760f3a4e15a228
-
SHA1
f6c851e1708d8796019332d3f610599b649562f4
-
SHA256
266d1af2cb4893a07df7b3e99b9c63dd997cc1e48f6b721878eedf393a392c52
-
SHA512
055f0a5f0c8f10dde203580be7223c8a087b18413c10994af883dc8de48f91fc233aa221429be1bee91ec0e056089deb73e493c8620da0b6e4dffae33777237a
-
SSDEEP
1536:WUCccx0dxCKg6PMVP4SfSzyIrH1bC/b2OHcQzcyLVclN:WUTcx0f9g6PMVP4SSH1bCh8QjBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
127.0.0.1:4449
Mutex
hlvrakbhxgipspjpl
Attributes
-
delay
1
-
install
true
-
install_file
eeeehhhhh.exe
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
Processes:
resource yara_rule behavioral2/memory/1680-1-0x0000000000F60000-0x0000000000F78000-memory.dmp VenomRAT -
Venomrat family
-
Suspicious use of AdjustPrivilegeToken 43 IoCs
Processes:
QML32_Test.exedescription pid Process Token: SeDebugPrivilege 1680 QML32_Test.exe Token: SeIncreaseQuotaPrivilege 1680 QML32_Test.exe Token: SeSecurityPrivilege 1680 QML32_Test.exe Token: SeTakeOwnershipPrivilege 1680 QML32_Test.exe Token: SeLoadDriverPrivilege 1680 QML32_Test.exe Token: SeSystemProfilePrivilege 1680 QML32_Test.exe Token: SeSystemtimePrivilege 1680 QML32_Test.exe Token: SeProfSingleProcessPrivilege 1680 QML32_Test.exe Token: SeIncBasePriorityPrivilege 1680 QML32_Test.exe Token: SeCreatePagefilePrivilege 1680 QML32_Test.exe Token: SeBackupPrivilege 1680 QML32_Test.exe Token: SeRestorePrivilege 1680 QML32_Test.exe Token: SeShutdownPrivilege 1680 QML32_Test.exe Token: SeDebugPrivilege 1680 QML32_Test.exe Token: SeSystemEnvironmentPrivilege 1680 QML32_Test.exe Token: SeRemoteShutdownPrivilege 1680 QML32_Test.exe Token: SeUndockPrivilege 1680 QML32_Test.exe Token: SeManageVolumePrivilege 1680 QML32_Test.exe Token: 33 1680 QML32_Test.exe Token: 34 1680 QML32_Test.exe Token: 35 1680 QML32_Test.exe Token: 36 1680 QML32_Test.exe Token: SeIncreaseQuotaPrivilege 1680 QML32_Test.exe Token: SeSecurityPrivilege 1680 QML32_Test.exe Token: SeTakeOwnershipPrivilege 1680 QML32_Test.exe Token: SeLoadDriverPrivilege 1680 QML32_Test.exe Token: SeSystemProfilePrivilege 1680 QML32_Test.exe Token: SeSystemtimePrivilege 1680 QML32_Test.exe Token: SeProfSingleProcessPrivilege 1680 QML32_Test.exe Token: SeIncBasePriorityPrivilege 1680 QML32_Test.exe Token: SeCreatePagefilePrivilege 1680 QML32_Test.exe Token: SeBackupPrivilege 1680 QML32_Test.exe Token: SeRestorePrivilege 1680 QML32_Test.exe Token: SeShutdownPrivilege 1680 QML32_Test.exe Token: SeDebugPrivilege 1680 QML32_Test.exe Token: SeSystemEnvironmentPrivilege 1680 QML32_Test.exe Token: SeRemoteShutdownPrivilege 1680 QML32_Test.exe Token: SeUndockPrivilege 1680 QML32_Test.exe Token: SeManageVolumePrivilege 1680 QML32_Test.exe Token: 33 1680 QML32_Test.exe Token: 34 1680 QML32_Test.exe Token: 35 1680 QML32_Test.exe Token: 36 1680 QML32_Test.exe