Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2024 03:18
Behavioral task
behavioral1
Sample
54b791663447c49cc0dadf7a5187fb804699cacbd213e3eccce3b7606703d552.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
54b791663447c49cc0dadf7a5187fb804699cacbd213e3eccce3b7606703d552.exe
Resource
win10v2004-20241007-en
General
-
Target
54b791663447c49cc0dadf7a5187fb804699cacbd213e3eccce3b7606703d552.exe
-
Size
63KB
-
MD5
a976b24a350e174e151706daf5d10293
-
SHA1
9843c3c0112d889fced3ef34485d14ac33288551
-
SHA256
54b791663447c49cc0dadf7a5187fb804699cacbd213e3eccce3b7606703d552
-
SHA512
253e57a0a34aaafcecdafd253e98fa3ad8e5cba3691c826b1f0ef415dd4fd5400809bf9b091e9519441741b731a84c4e235e115d31a8781da973e5e8b6235eb8
-
SSDEEP
1536:AhIBLTM3Ufc0cMdmeeiIVrGbbXwKpZKjGGDpqKmY79:AhIBLTM3Ufc6d/eXGbbXLZKjgzk
Malware Config
Extracted
asyncrat
5.0.5
Venom Clients
but-directive.gl.at.ply.gg:9840
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2100 54b791663447c49cc0dadf7a5187fb804699cacbd213e3eccce3b7606703d552.exe Token: SeSecurityPrivilege 2100 54b791663447c49cc0dadf7a5187fb804699cacbd213e3eccce3b7606703d552.exe Token: SeTakeOwnershipPrivilege 2100 54b791663447c49cc0dadf7a5187fb804699cacbd213e3eccce3b7606703d552.exe Token: SeLoadDriverPrivilege 2100 54b791663447c49cc0dadf7a5187fb804699cacbd213e3eccce3b7606703d552.exe Token: SeSystemProfilePrivilege 2100 54b791663447c49cc0dadf7a5187fb804699cacbd213e3eccce3b7606703d552.exe Token: SeSystemtimePrivilege 2100 54b791663447c49cc0dadf7a5187fb804699cacbd213e3eccce3b7606703d552.exe Token: SeProfSingleProcessPrivilege 2100 54b791663447c49cc0dadf7a5187fb804699cacbd213e3eccce3b7606703d552.exe Token: SeIncBasePriorityPrivilege 2100 54b791663447c49cc0dadf7a5187fb804699cacbd213e3eccce3b7606703d552.exe Token: SeCreatePagefilePrivilege 2100 54b791663447c49cc0dadf7a5187fb804699cacbd213e3eccce3b7606703d552.exe Token: SeBackupPrivilege 2100 54b791663447c49cc0dadf7a5187fb804699cacbd213e3eccce3b7606703d552.exe Token: SeRestorePrivilege 2100 54b791663447c49cc0dadf7a5187fb804699cacbd213e3eccce3b7606703d552.exe Token: SeShutdownPrivilege 2100 54b791663447c49cc0dadf7a5187fb804699cacbd213e3eccce3b7606703d552.exe Token: SeDebugPrivilege 2100 54b791663447c49cc0dadf7a5187fb804699cacbd213e3eccce3b7606703d552.exe Token: SeSystemEnvironmentPrivilege 2100 54b791663447c49cc0dadf7a5187fb804699cacbd213e3eccce3b7606703d552.exe Token: SeRemoteShutdownPrivilege 2100 54b791663447c49cc0dadf7a5187fb804699cacbd213e3eccce3b7606703d552.exe Token: SeUndockPrivilege 2100 54b791663447c49cc0dadf7a5187fb804699cacbd213e3eccce3b7606703d552.exe Token: SeManageVolumePrivilege 2100 54b791663447c49cc0dadf7a5187fb804699cacbd213e3eccce3b7606703d552.exe Token: 33 2100 54b791663447c49cc0dadf7a5187fb804699cacbd213e3eccce3b7606703d552.exe Token: 34 2100 54b791663447c49cc0dadf7a5187fb804699cacbd213e3eccce3b7606703d552.exe Token: 35 2100 54b791663447c49cc0dadf7a5187fb804699cacbd213e3eccce3b7606703d552.exe Token: 36 2100 54b791663447c49cc0dadf7a5187fb804699cacbd213e3eccce3b7606703d552.exe