Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 03:13
Static task
static1
Behavioral task
behavioral1
Sample
RFAU02GSHKOPSFDQW_002_PDF.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
RFAU02GSHKOPSFDQW_002_PDF.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
RV07QAROPHDFSRE_001_PDF_clean.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
RV07QAROPHDFSRE_001_PDF_clean.exe
Resource
win10v2004-20241007-en
General
-
Target
RV07QAROPHDFSRE_001_PDF_clean.exe
-
Size
126KB
-
MD5
8dc1c167f8f69381b9c97e2959f0d531
-
SHA1
a44d3def5a60ea19b2d5cc2dc89aca74c9c666c0
-
SHA256
ae3b4897a288a41ec73e1a6b94ce89b982a35e4ee754208e035877ed27ad17a8
-
SHA512
d61cd8bed549b69cdebbb26d0cfc26525165755b49d731e0268b293f8dfa99cc78f6a80897fd8db4b180b77ffb03501091f5dbd0811e11a639d74f59a97c323c
-
SSDEEP
3072:2JBH+suK5LqfcddhnOdzzW+49vdtJFu4Kis:TsugmO4xYFunis
Malware Config
Extracted
asyncrat
Venom RAT 5.0.5
Venom Clients
toff7857.duckdns.org:8890
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Executes dropped EXE 2 IoCs
pid Process 4836 redqo.exe 1760 redqo.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5084 set thread context of 4372 5084 RV07QAROPHDFSRE_001_PDF_clean.exe 95 PID 4836 set thread context of 4728 4836 redqo.exe 103 -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language redqo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language redqo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RV07QAROPHDFSRE_001_PDF_clean.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1480 schtasks.exe 1872 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4372 vbc.exe Token: SeDebugPrivilege 4728 vbc.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 5084 wrote to memory of 3820 5084 RV07QAROPHDFSRE_001_PDF_clean.exe 90 PID 5084 wrote to memory of 3820 5084 RV07QAROPHDFSRE_001_PDF_clean.exe 90 PID 5084 wrote to memory of 3820 5084 RV07QAROPHDFSRE_001_PDF_clean.exe 90 PID 3820 wrote to memory of 1480 3820 cmd.exe 92 PID 3820 wrote to memory of 1480 3820 cmd.exe 92 PID 3820 wrote to memory of 1480 3820 cmd.exe 92 PID 5084 wrote to memory of 4324 5084 RV07QAROPHDFSRE_001_PDF_clean.exe 93 PID 5084 wrote to memory of 4324 5084 RV07QAROPHDFSRE_001_PDF_clean.exe 93 PID 5084 wrote to memory of 4324 5084 RV07QAROPHDFSRE_001_PDF_clean.exe 93 PID 5084 wrote to memory of 4372 5084 RV07QAROPHDFSRE_001_PDF_clean.exe 95 PID 5084 wrote to memory of 4372 5084 RV07QAROPHDFSRE_001_PDF_clean.exe 95 PID 5084 wrote to memory of 4372 5084 RV07QAROPHDFSRE_001_PDF_clean.exe 95 PID 5084 wrote to memory of 4372 5084 RV07QAROPHDFSRE_001_PDF_clean.exe 95 PID 5084 wrote to memory of 4372 5084 RV07QAROPHDFSRE_001_PDF_clean.exe 95 PID 5084 wrote to memory of 4372 5084 RV07QAROPHDFSRE_001_PDF_clean.exe 95 PID 5084 wrote to memory of 4372 5084 RV07QAROPHDFSRE_001_PDF_clean.exe 95 PID 5084 wrote to memory of 4372 5084 RV07QAROPHDFSRE_001_PDF_clean.exe 95 PID 4836 wrote to memory of 5028 4836 redqo.exe 98 PID 4836 wrote to memory of 5028 4836 redqo.exe 98 PID 4836 wrote to memory of 5028 4836 redqo.exe 98 PID 4836 wrote to memory of 736 4836 redqo.exe 100 PID 4836 wrote to memory of 736 4836 redqo.exe 100 PID 4836 wrote to memory of 736 4836 redqo.exe 100 PID 5028 wrote to memory of 1872 5028 cmd.exe 102 PID 5028 wrote to memory of 1872 5028 cmd.exe 102 PID 5028 wrote to memory of 1872 5028 cmd.exe 102 PID 4836 wrote to memory of 4728 4836 redqo.exe 103 PID 4836 wrote to memory of 4728 4836 redqo.exe 103 PID 4836 wrote to memory of 4728 4836 redqo.exe 103 PID 4836 wrote to memory of 4728 4836 redqo.exe 103 PID 4836 wrote to memory of 4728 4836 redqo.exe 103 PID 4836 wrote to memory of 4728 4836 redqo.exe 103 PID 4836 wrote to memory of 4728 4836 redqo.exe 103 PID 4836 wrote to memory of 4728 4836 redqo.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\RV07QAROPHDFSRE_001_PDF_clean.exe"C:\Users\Admin\AppData\Local\Temp\RV07QAROPHDFSRE_001_PDF_clean.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\redqo.exe'" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\redqo.exe'" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1480
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\RV07QAROPHDFSRE_001_PDF_clean.exe" "C:\Users\Admin\AppData\Roaming\redqo.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4324
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4372
-
-
C:\Users\Admin\AppData\Roaming\redqo.exeC:\Users\Admin\AppData\Roaming\redqo.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\redqo.exe'" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\redqo.exe'" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1872
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\redqo.exe" "C:\Users\Admin\AppData\Roaming\redqo.exe"2⤵
- System Location Discovery: System Language Discovery
PID:736
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4728
-
-
C:\Users\Admin\AppData\Roaming\redqo.exeC:\Users\Admin\AppData\Roaming\redqo.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
612B
MD5ca95b0db0b212857216268544c58e741
SHA15c2fd4ee1dc02d9412a19454562129f97bf930b5
SHA256bdcf4429adc6ee689394b8ea1628e98bac4d0b7f8d735e5bf9e96218a41cd6f0
SHA512c3d83412ec5c6dd7398c7ec0ae73838eed3f9e6e539771066378d74479092bc18f73deac581c3e5f053487eef1ae432a565eec2aa706c7ddf16d5855cb0e70bb
-
Filesize
126KB
MD58dc1c167f8f69381b9c97e2959f0d531
SHA1a44d3def5a60ea19b2d5cc2dc89aca74c9c666c0
SHA256ae3b4897a288a41ec73e1a6b94ce89b982a35e4ee754208e035877ed27ad17a8
SHA512d61cd8bed549b69cdebbb26d0cfc26525165755b49d731e0268b293f8dfa99cc78f6a80897fd8db4b180b77ffb03501091f5dbd0811e11a639d74f59a97c323c