Analysis
-
max time kernel
94s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-12-2024 17:15
Static task
static1
Behavioral task
behavioral1
Sample
New_Order0512204#7666467pdf.scr
Resource
win7-20241010-en
General
-
Target
New_Order0512204#7666467pdf.scr
-
Size
950KB
-
MD5
a8a4aa9c047894582f100213370da8de
-
SHA1
e7b4d9747c787599947d9944cc90ed36c31984b4
-
SHA256
31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7
-
SHA512
235b0a604d73ea9a45c3db63693cf1a6ee3f38ea783c22568af233252a41c7018dd77b96f70020e2e97c0f2843b316b270a023d95983c55cdc72c6ecc86df0c9
-
SSDEEP
24576:Gu6J33O0c+JY5UZ+XC0kGso6Fat0svhWWY:Iu0c++OCvkGs9Fat0sv7Y
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
87.120.120.15:4449
ykpleyrgtopul
-
delay
10
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
resource yara_rule behavioral2/memory/3056-20-0x0000000000400000-0x0000000000418000-memory.dmp VenomRAT -
Venomrat family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vitrailist.vbs vitrailist.exe -
Executes dropped EXE 1 IoCs
pid Process 2504 vitrailist.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023cb6-9.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2504 set thread context of 3056 2504 vitrailist.exe 83 -
Program crash 1 IoCs
pid pid_target Process procid_target 4872 3056 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New_Order0512204#7666467pdf.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vitrailist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2504 vitrailist.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeDebugPrivilege 3056 RegSvcs.exe Token: SeIncreaseQuotaPrivilege 3056 RegSvcs.exe Token: SeSecurityPrivilege 3056 RegSvcs.exe Token: SeTakeOwnershipPrivilege 3056 RegSvcs.exe Token: SeLoadDriverPrivilege 3056 RegSvcs.exe Token: SeSystemProfilePrivilege 3056 RegSvcs.exe Token: SeSystemtimePrivilege 3056 RegSvcs.exe Token: SeProfSingleProcessPrivilege 3056 RegSvcs.exe Token: SeIncBasePriorityPrivilege 3056 RegSvcs.exe Token: SeCreatePagefilePrivilege 3056 RegSvcs.exe Token: SeBackupPrivilege 3056 RegSvcs.exe Token: SeRestorePrivilege 3056 RegSvcs.exe Token: SeShutdownPrivilege 3056 RegSvcs.exe Token: SeDebugPrivilege 3056 RegSvcs.exe Token: SeSystemEnvironmentPrivilege 3056 RegSvcs.exe Token: SeRemoteShutdownPrivilege 3056 RegSvcs.exe Token: SeUndockPrivilege 3056 RegSvcs.exe Token: SeManageVolumePrivilege 3056 RegSvcs.exe Token: 33 3056 RegSvcs.exe Token: 34 3056 RegSvcs.exe Token: 35 3056 RegSvcs.exe Token: 36 3056 RegSvcs.exe Token: SeIncreaseQuotaPrivilege 3056 RegSvcs.exe Token: SeSecurityPrivilege 3056 RegSvcs.exe Token: SeTakeOwnershipPrivilege 3056 RegSvcs.exe Token: SeLoadDriverPrivilege 3056 RegSvcs.exe Token: SeSystemProfilePrivilege 3056 RegSvcs.exe Token: SeSystemtimePrivilege 3056 RegSvcs.exe Token: SeProfSingleProcessPrivilege 3056 RegSvcs.exe Token: SeIncBasePriorityPrivilege 3056 RegSvcs.exe Token: SeCreatePagefilePrivilege 3056 RegSvcs.exe Token: SeBackupPrivilege 3056 RegSvcs.exe Token: SeRestorePrivilege 3056 RegSvcs.exe Token: SeShutdownPrivilege 3056 RegSvcs.exe Token: SeDebugPrivilege 3056 RegSvcs.exe Token: SeSystemEnvironmentPrivilege 3056 RegSvcs.exe Token: SeRemoteShutdownPrivilege 3056 RegSvcs.exe Token: SeUndockPrivilege 3056 RegSvcs.exe Token: SeManageVolumePrivilege 3056 RegSvcs.exe Token: 33 3056 RegSvcs.exe Token: 34 3056 RegSvcs.exe Token: 35 3056 RegSvcs.exe Token: 36 3056 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 4836 New_Order0512204#7666467pdf.scr 4836 New_Order0512204#7666467pdf.scr 4836 New_Order0512204#7666467pdf.scr 2504 vitrailist.exe 2504 vitrailist.exe -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 4836 New_Order0512204#7666467pdf.scr 4836 New_Order0512204#7666467pdf.scr 4836 New_Order0512204#7666467pdf.scr 2504 vitrailist.exe 2504 vitrailist.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4836 wrote to memory of 2504 4836 New_Order0512204#7666467pdf.scr 82 PID 4836 wrote to memory of 2504 4836 New_Order0512204#7666467pdf.scr 82 PID 4836 wrote to memory of 2504 4836 New_Order0512204#7666467pdf.scr 82 PID 2504 wrote to memory of 3056 2504 vitrailist.exe 83 PID 2504 wrote to memory of 3056 2504 vitrailist.exe 83 PID 2504 wrote to memory of 3056 2504 vitrailist.exe 83 PID 2504 wrote to memory of 3056 2504 vitrailist.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\New_Order0512204#7666467pdf.scr"C:\Users\Admin\AppData\Local\Temp\New_Order0512204#7666467pdf.scr" /S1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Users\Admin\AppData\Local\savagenesses\vitrailist.exe"C:\Users\Admin\AppData\Local\Temp\New_Order0512204#7666467pdf.scr" /S2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\New_Order0512204#7666467pdf.scr" /S3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3056 -s 12964⤵
- Program crash
PID:4872
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3056 -ip 30561⤵PID:3840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
950KB
MD5a8a4aa9c047894582f100213370da8de
SHA1e7b4d9747c787599947d9944cc90ed36c31984b4
SHA25631c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7
SHA512235b0a604d73ea9a45c3db63693cf1a6ee3f38ea783c22568af233252a41c7018dd77b96f70020e2e97c0f2843b316b270a023d95983c55cdc72c6ecc86df0c9