Analysis
-
max time kernel
151s -
max time network
162s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 04:31
Static task
static1
Behavioral task
behavioral1
Sample
RVF001.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
RVF001.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
RVF002.vbs
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
RVF002.vbs
Resource
win10v2004-20241007-en
General
-
Target
RVF001.exe
-
Size
300.0MB
-
MD5
fdd6bb2ce995b36d49d3196894192988
-
SHA1
9e8b9db35c796ccd6622771ffc5d333038d3333d
-
SHA256
a09c85265ae57ce325328a06925d3fbc61021f2ca815d00858c3024ab6f8e3a8
-
SHA512
e337f94b47930a8e01ef4877a45578c9e1bf430111a6c27de03f50cee599717e4c0605f01f41d70b2123ef3bf12fb695893965876cd90ac4a17746dc8b7389e2
-
SSDEEP
3072:9q1IYuRXuhcSOY/hQ6d1XmRsDvHt02pWJJ67rmvHszvTBFUa:UyY6TYC6d1XjxpWJmryHszvTBFZ
Malware Config
Extracted
asyncrat
Venom RAT 5.0.5
Venom Clients
ry8325585.duckdns.org:6087
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Executes dropped EXE 1 IoCs
pid Process 2600 regdsop.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2988 set thread context of 2224 2988 RVF001.exe 35 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RVF001.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regdsop.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2356 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2224 vbc.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2756 2988 RVF001.exe 30 PID 2988 wrote to memory of 2756 2988 RVF001.exe 30 PID 2988 wrote to memory of 2756 2988 RVF001.exe 30 PID 2988 wrote to memory of 2756 2988 RVF001.exe 30 PID 2756 wrote to memory of 2356 2756 cmd.exe 32 PID 2756 wrote to memory of 2356 2756 cmd.exe 32 PID 2756 wrote to memory of 2356 2756 cmd.exe 32 PID 2756 wrote to memory of 2356 2756 cmd.exe 32 PID 2988 wrote to memory of 2816 2988 RVF001.exe 33 PID 2988 wrote to memory of 2816 2988 RVF001.exe 33 PID 2988 wrote to memory of 2816 2988 RVF001.exe 33 PID 2988 wrote to memory of 2816 2988 RVF001.exe 33 PID 2988 wrote to memory of 2224 2988 RVF001.exe 35 PID 2988 wrote to memory of 2224 2988 RVF001.exe 35 PID 2988 wrote to memory of 2224 2988 RVF001.exe 35 PID 2988 wrote to memory of 2224 2988 RVF001.exe 35 PID 2988 wrote to memory of 2224 2988 RVF001.exe 35 PID 2988 wrote to memory of 2224 2988 RVF001.exe 35 PID 2988 wrote to memory of 2224 2988 RVF001.exe 35 PID 2988 wrote to memory of 2224 2988 RVF001.exe 35 PID 2988 wrote to memory of 2224 2988 RVF001.exe 35 PID 2152 wrote to memory of 2600 2152 taskeng.exe 38 PID 2152 wrote to memory of 2600 2152 taskeng.exe 38 PID 2152 wrote to memory of 2600 2152 taskeng.exe 38 PID 2152 wrote to memory of 2600 2152 taskeng.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\RVF001.exe"C:\Users\Admin\AppData\Local\Temp\RVF001.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\regdsop.exe'" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\regdsop.exe'" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2356
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\RVF001.exe" "C:\Users\Admin\AppData\Roaming\regdsop.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2816
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2224
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {E5948C6A-0615-41EF-8337-F8FE4BF7F7A2} S-1-5-21-3692679935-4019334568-335155002-1000:BCXRJFKE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Roaming\regdsop.exeC:\Users\Admin\AppData\Roaming\regdsop.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2600
-