Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2024, 09:36
Static task
static1
Behavioral task
behavioral1
Sample
eVoucher.exe
Resource
win7-20240729-en
General
-
Target
eVoucher.exe
-
Size
300.0MB
-
MD5
3bf947955196c0d542ab337354bba05f
-
SHA1
9695affc705e866e7b1307ecfadd9db37acc3918
-
SHA256
49cb3e0011f6d43b205c5336abf642d56ad93c7ebb250aa8cc907d08d06f382e
-
SHA512
1dd243cc586dc516044b9e42452bba87a796a6c177bfef7cd4a1be12bd7282f3887bf220b2411f360c5ba82bd59276ccc3265b4aecc2173cd3f6a7d88194fe6f
-
SSDEEP
6144:xpOo/IPZccVtOw7Msw0b+lNZxsEOFco5z:rOo/YZ1QQXz6lHP8
Malware Config
Extracted
asyncrat
Venom RAT 5.0.5
August-04
fejong.duckdns.org:25045
iordes45s
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Executes dropped EXE 2 IoCs
pid Process 4164 wyehd.exe 1144 wyehd.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3492 set thread context of 3628 3492 eVoucher.exe 94 PID 4164 set thread context of 1600 4164 wyehd.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wyehd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eVoucher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wyehd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1400 schtasks.exe 652 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3628 RegAsm.exe Token: SeDebugPrivilege 1600 RegAsm.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 3492 wrote to memory of 5052 3492 eVoucher.exe 89 PID 3492 wrote to memory of 5052 3492 eVoucher.exe 89 PID 3492 wrote to memory of 5052 3492 eVoucher.exe 89 PID 3492 wrote to memory of 2800 3492 eVoucher.exe 91 PID 3492 wrote to memory of 2800 3492 eVoucher.exe 91 PID 3492 wrote to memory of 2800 3492 eVoucher.exe 91 PID 5052 wrote to memory of 1400 5052 cmd.exe 93 PID 5052 wrote to memory of 1400 5052 cmd.exe 93 PID 5052 wrote to memory of 1400 5052 cmd.exe 93 PID 3492 wrote to memory of 3628 3492 eVoucher.exe 94 PID 3492 wrote to memory of 3628 3492 eVoucher.exe 94 PID 3492 wrote to memory of 3628 3492 eVoucher.exe 94 PID 3492 wrote to memory of 3628 3492 eVoucher.exe 94 PID 3492 wrote to memory of 3628 3492 eVoucher.exe 94 PID 3492 wrote to memory of 3628 3492 eVoucher.exe 94 PID 3492 wrote to memory of 3628 3492 eVoucher.exe 94 PID 3492 wrote to memory of 3628 3492 eVoucher.exe 94 PID 4164 wrote to memory of 4668 4164 wyehd.exe 97 PID 4164 wrote to memory of 4668 4164 wyehd.exe 97 PID 4164 wrote to memory of 4668 4164 wyehd.exe 97 PID 4164 wrote to memory of 4740 4164 wyehd.exe 98 PID 4164 wrote to memory of 4740 4164 wyehd.exe 98 PID 4164 wrote to memory of 4740 4164 wyehd.exe 98 PID 4164 wrote to memory of 1600 4164 wyehd.exe 99 PID 4164 wrote to memory of 1600 4164 wyehd.exe 99 PID 4164 wrote to memory of 1600 4164 wyehd.exe 99 PID 4164 wrote to memory of 1600 4164 wyehd.exe 99 PID 4164 wrote to memory of 1600 4164 wyehd.exe 99 PID 4164 wrote to memory of 1600 4164 wyehd.exe 99 PID 4164 wrote to memory of 1600 4164 wyehd.exe 99 PID 4164 wrote to memory of 1600 4164 wyehd.exe 99 PID 4668 wrote to memory of 652 4668 cmd.exe 102 PID 4668 wrote to memory of 652 4668 cmd.exe 102 PID 4668 wrote to memory of 652 4668 cmd.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\eVoucher.exe"C:\Users\Admin\AppData\Local\Temp\eVoucher.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Local\Temp\wyehd.exe'" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Local\Temp\wyehd.exe'" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1400
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\eVoucher.exe" "C:\Users\Admin\AppData\Local\Temp\wyehd.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2800
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3628
-
-
C:\Users\Admin\AppData\Local\Temp\wyehd.exeC:\Users\Admin\AppData\Local\Temp\wyehd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Local\Temp\wyehd.exe'" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Local\Temp\wyehd.exe'" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:652
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\wyehd.exe" "C:\Users\Admin\AppData\Local\Temp\wyehd.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4740
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
-
C:\Users\Admin\AppData\Local\Temp\wyehd.exeC:\Users\Admin\AppData\Local\Temp\wyehd.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1144
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
520B
MD53ca2f9e6a94c24c455ac9431a0bf479b
SHA1a90309eec691588990609f8f8ad9b935d6f38eb2
SHA256e84d0c64750ec6333b67eb8aef737bb21cd86c6ef6e520c6537ede13505e125e
SHA512ba66e42b384f0d865a21d9169169a0b2bd9c62ebee68acc63a191b1a67ca16f4534f955055fc84bbc4a9cd22cec11c3c22a15df7741d99b7dec456e5cabcb0b5