Overview
overview
10Static
static
10Crypted.exe
windows7-x64
10Crypted.exe
windows10-2004-x64
10HELL-96SQH...4H.exe
windows7-x64
3HELL-96SQH...4H.exe
windows10-2004-x64
3Payload.exe
windows7-x64
10Payload.exe
windows10-2004-x64
10Skype.exe
windows7-x64
10Skype.exe
windows10-2004-x64
10SpotifyGenerator.exe
windows7-x64
10SpotifyGenerator.exe
windows10-2004-x64
10calculate.exe
windows7-x64
3calculate.exe
windows10-2004-x64
3services.exe
windows7-x64
10services.exe
windows10-2004-x64
10xray.exe
windows7-x64
10xray.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 13:34
Behavioral task
behavioral1
Sample
Crypted.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Crypted.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
HELL-96SQH6IO9SOI2GJFE2H9FUEM3FGU34H.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
HELL-96SQH6IO9SOI2GJFE2H9FUEM3FGU34H.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Payload.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
Payload.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Skype.exe
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
Skype.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
SpotifyGenerator.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
SpotifyGenerator.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
calculate.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
calculate.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
services.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
services.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
xray.exe
Resource
win7-20240903-en
General
-
Target
services.exe
-
Size
74KB
-
MD5
e7ba2c20ff0d6d894b2e342dfbc682da
-
SHA1
b459862f4e9a5a8ed260f13682691eb19e8620f8
-
SHA256
4820832a84cc249be6408727b394f68127af853496b2f3ac5702fa07c98af452
-
SHA512
a8291c5357a81f40e9a01467788fad6e57b7869e065223a8a5fa4ee8b471d7491dc3c6af069fd6a635cee7b3d7f34a2cf18d9563b80a874c714f765985668c36
-
SSDEEP
1536:X5UdAcxqXPC/2PMVMwGPoIYH1ba/PGHq1yzQzc2LVclN:pUicxqfs2PMV7GP2H1bau8SQPBY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
ximlxhkxkljothcwg
-
c2_url_file
https://paste.tc/raw/x-88152-88
-
delay
1
-
install
false
-
install_file
services
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
resource yara_rule behavioral14/memory/2668-1-0x0000000000710000-0x0000000000728000-memory.dmp VenomRAT -
Venomrat family
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2668 services.exe 2668 services.exe 2668 services.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2668 services.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2668 services.exe