Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 18:25
Static task
static1
Behavioral task
behavioral1
Sample
6002845UDOOPZE.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6002845UDOOPZE.exe
Resource
win10v2004-20241007-en
General
-
Target
6002845UDOOPZE.exe
-
Size
301.0MB
-
MD5
a0101393af76c8defc685601bf00b050
-
SHA1
06deea9b7e544d86599c27e77b02193ba8ea65d7
-
SHA256
2b28db92f130ef4d71ccfbc40b2456e2f82ea645a9d493f681269fe08e277cb2
-
SHA512
cd59e33c5238445e5947775d57867204e8917232bd3a19787d20e269cba8dd8396ecf43f693480d4326b3725bf785b5c17e15ca7e81a836cfd5acc056e77d19a
-
SSDEEP
3072:Ixrfsl33+seYAlFpKb45eoUeGo2mT9Vua0Hi:67s8pKrlePZV
Malware Config
Extracted
asyncrat
Venom RAT 5.0.5
NOV-7(VHD)
saddlepoint.duckdns.org:25045
q0qeiwx9cj
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Executes dropped EXE 2 IoCs
pid Process 1316 FVEo.exe 1748 FVEo.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1820 set thread context of 2744 1820 6002845UDOOPZE.exe 36 PID 1316 set thread context of 2688 1316 FVEo.exe 45 PID 1748 set thread context of 560 1748 FVEo.exe 52 -
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FVEo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6002845UDOOPZE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FVEo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2824 schtasks.exe 3068 schtasks.exe 2432 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2744 vbc.exe Token: SeDebugPrivilege 2688 vbc.exe Token: SeDebugPrivilege 560 vbc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1820 wrote to memory of 2920 1820 6002845UDOOPZE.exe 31 PID 1820 wrote to memory of 2920 1820 6002845UDOOPZE.exe 31 PID 1820 wrote to memory of 2920 1820 6002845UDOOPZE.exe 31 PID 1820 wrote to memory of 2920 1820 6002845UDOOPZE.exe 31 PID 2920 wrote to memory of 2824 2920 cmd.exe 33 PID 2920 wrote to memory of 2824 2920 cmd.exe 33 PID 2920 wrote to memory of 2824 2920 cmd.exe 33 PID 2920 wrote to memory of 2824 2920 cmd.exe 33 PID 1820 wrote to memory of 2784 1820 6002845UDOOPZE.exe 34 PID 1820 wrote to memory of 2784 1820 6002845UDOOPZE.exe 34 PID 1820 wrote to memory of 2784 1820 6002845UDOOPZE.exe 34 PID 1820 wrote to memory of 2784 1820 6002845UDOOPZE.exe 34 PID 1820 wrote to memory of 2744 1820 6002845UDOOPZE.exe 36 PID 1820 wrote to memory of 2744 1820 6002845UDOOPZE.exe 36 PID 1820 wrote to memory of 2744 1820 6002845UDOOPZE.exe 36 PID 1820 wrote to memory of 2744 1820 6002845UDOOPZE.exe 36 PID 1820 wrote to memory of 2744 1820 6002845UDOOPZE.exe 36 PID 1820 wrote to memory of 2744 1820 6002845UDOOPZE.exe 36 PID 1820 wrote to memory of 2744 1820 6002845UDOOPZE.exe 36 PID 1820 wrote to memory of 2744 1820 6002845UDOOPZE.exe 36 PID 1820 wrote to memory of 2744 1820 6002845UDOOPZE.exe 36 PID 2684 wrote to memory of 1316 2684 taskeng.exe 39 PID 2684 wrote to memory of 1316 2684 taskeng.exe 39 PID 2684 wrote to memory of 1316 2684 taskeng.exe 39 PID 2684 wrote to memory of 1316 2684 taskeng.exe 39 PID 1316 wrote to memory of 2996 1316 FVEo.exe 40 PID 1316 wrote to memory of 2996 1316 FVEo.exe 40 PID 1316 wrote to memory of 2996 1316 FVEo.exe 40 PID 1316 wrote to memory of 2996 1316 FVEo.exe 40 PID 1316 wrote to memory of 2992 1316 FVEo.exe 42 PID 1316 wrote to memory of 2992 1316 FVEo.exe 42 PID 1316 wrote to memory of 2992 1316 FVEo.exe 42 PID 1316 wrote to memory of 2992 1316 FVEo.exe 42 PID 2996 wrote to memory of 3068 2996 cmd.exe 43 PID 2996 wrote to memory of 3068 2996 cmd.exe 43 PID 2996 wrote to memory of 3068 2996 cmd.exe 43 PID 2996 wrote to memory of 3068 2996 cmd.exe 43 PID 1316 wrote to memory of 2688 1316 FVEo.exe 45 PID 1316 wrote to memory of 2688 1316 FVEo.exe 45 PID 1316 wrote to memory of 2688 1316 FVEo.exe 45 PID 1316 wrote to memory of 2688 1316 FVEo.exe 45 PID 1316 wrote to memory of 2688 1316 FVEo.exe 45 PID 1316 wrote to memory of 2688 1316 FVEo.exe 45 PID 1316 wrote to memory of 2688 1316 FVEo.exe 45 PID 1316 wrote to memory of 2688 1316 FVEo.exe 45 PID 1316 wrote to memory of 2688 1316 FVEo.exe 45 PID 2684 wrote to memory of 1748 2684 taskeng.exe 46 PID 2684 wrote to memory of 1748 2684 taskeng.exe 46 PID 2684 wrote to memory of 1748 2684 taskeng.exe 46 PID 2684 wrote to memory of 1748 2684 taskeng.exe 46 PID 1748 wrote to memory of 1052 1748 FVEo.exe 47 PID 1748 wrote to memory of 1052 1748 FVEo.exe 47 PID 1748 wrote to memory of 1052 1748 FVEo.exe 47 PID 1748 wrote to memory of 1052 1748 FVEo.exe 47 PID 1748 wrote to memory of 1620 1748 FVEo.exe 49 PID 1748 wrote to memory of 1620 1748 FVEo.exe 49 PID 1748 wrote to memory of 1620 1748 FVEo.exe 49 PID 1748 wrote to memory of 1620 1748 FVEo.exe 49 PID 1052 wrote to memory of 2432 1052 cmd.exe 50 PID 1052 wrote to memory of 2432 1052 cmd.exe 50 PID 1052 wrote to memory of 2432 1052 cmd.exe 50 PID 1052 wrote to memory of 2432 1052 cmd.exe 50 PID 1748 wrote to memory of 560 1748 FVEo.exe 52 PID 1748 wrote to memory of 560 1748 FVEo.exe 52
Processes
-
C:\Users\Admin\AppData\Local\Temp\6002845UDOOPZE.exe"C:\Users\Admin\AppData\Local\Temp\6002845UDOOPZE.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Local\Temp\FVEo.exe'" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Local\Temp\FVEo.exe'" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2824
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\6002845UDOOPZE.exe" "C:\Users\Admin\AppData\Local\Temp\FVEo.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2784
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {70C6E942-B981-4A9A-9EA1-20D3C5A4CC55} S-1-5-21-3551809350-4263495960-1443967649-1000:NNYJZAHP\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\FVEo.exeC:\Users\Admin\AppData\Local\Temp\FVEo.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Local\Temp\FVEo.exe'" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Local\Temp\FVEo.exe'" /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3068
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\FVEo.exe" "C:\Users\Admin\AppData\Local\Temp\FVEo.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2992
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
-
-
C:\Users\Admin\AppData\Local\Temp\FVEo.exeC:\Users\Admin\AppData\Local\Temp\FVEo.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Local\Temp\FVEo.exe'" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Local\Temp\FVEo.exe'" /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2432
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\FVEo.exe" "C:\Users\Admin\AppData\Local\Temp\FVEo.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1620
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:560
-
-