Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-12-2024 17:12
Behavioral task
behavioral1
Sample
hawktuah.exe
Resource
win7-20240903-en
windows7-x64
5 signatures
150 seconds
General
-
Target
hawktuah.exe
-
Size
74KB
-
MD5
663e509c502abcc24092c39d32feb603
-
SHA1
1dcaca7cff53480cb2801c8d229dfda512af0e07
-
SHA256
72272ce432f2a7faa229466c11be9723164e09b3b4ac0309ccd2ee3ae0e59ea1
-
SHA512
3ee65b1e43c2164e46535a127dccefd163cd783d5f94147fa6b42d15b52f22ba73097f121cd4108837e7ce66438ee3164faee059f019c84dc955e36dab4668d0
-
SSDEEP
1536:rUEkcx4VHsC0SPMV39e4QKI3H1bLu3fwsQzcCLVclN:rUxcx4GfSPMVteTLH1bLcQTBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
147.185.221.24:30847
Mutex
toaaqdyqffdkpsux
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
resource yara_rule behavioral2/memory/4824-1-0x0000000000B10000-0x0000000000B28000-memory.dmp VenomRAT -
Venomrat family
-
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeDebugPrivilege 4824 hawktuah.exe Token: SeIncreaseQuotaPrivilege 4824 hawktuah.exe Token: SeSecurityPrivilege 4824 hawktuah.exe Token: SeTakeOwnershipPrivilege 4824 hawktuah.exe Token: SeLoadDriverPrivilege 4824 hawktuah.exe Token: SeSystemProfilePrivilege 4824 hawktuah.exe Token: SeSystemtimePrivilege 4824 hawktuah.exe Token: SeProfSingleProcessPrivilege 4824 hawktuah.exe Token: SeIncBasePriorityPrivilege 4824 hawktuah.exe Token: SeCreatePagefilePrivilege 4824 hawktuah.exe Token: SeBackupPrivilege 4824 hawktuah.exe Token: SeRestorePrivilege 4824 hawktuah.exe Token: SeShutdownPrivilege 4824 hawktuah.exe Token: SeDebugPrivilege 4824 hawktuah.exe Token: SeSystemEnvironmentPrivilege 4824 hawktuah.exe Token: SeRemoteShutdownPrivilege 4824 hawktuah.exe Token: SeUndockPrivilege 4824 hawktuah.exe Token: SeManageVolumePrivilege 4824 hawktuah.exe Token: 33 4824 hawktuah.exe Token: 34 4824 hawktuah.exe Token: 35 4824 hawktuah.exe Token: 36 4824 hawktuah.exe Token: SeIncreaseQuotaPrivilege 4824 hawktuah.exe Token: SeSecurityPrivilege 4824 hawktuah.exe Token: SeTakeOwnershipPrivilege 4824 hawktuah.exe Token: SeLoadDriverPrivilege 4824 hawktuah.exe Token: SeSystemProfilePrivilege 4824 hawktuah.exe Token: SeSystemtimePrivilege 4824 hawktuah.exe Token: SeProfSingleProcessPrivilege 4824 hawktuah.exe Token: SeIncBasePriorityPrivilege 4824 hawktuah.exe Token: SeCreatePagefilePrivilege 4824 hawktuah.exe Token: SeBackupPrivilege 4824 hawktuah.exe Token: SeRestorePrivilege 4824 hawktuah.exe Token: SeShutdownPrivilege 4824 hawktuah.exe Token: SeDebugPrivilege 4824 hawktuah.exe Token: SeSystemEnvironmentPrivilege 4824 hawktuah.exe Token: SeRemoteShutdownPrivilege 4824 hawktuah.exe Token: SeUndockPrivilege 4824 hawktuah.exe Token: SeManageVolumePrivilege 4824 hawktuah.exe Token: 33 4824 hawktuah.exe Token: 34 4824 hawktuah.exe Token: 35 4824 hawktuah.exe Token: 36 4824 hawktuah.exe