Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-01-2025 18:37
Static task
static1
Behavioral task
behavioral1
Sample
175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe
Resource
win7-20240903-en
General
-
Target
175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe
-
Size
492KB
-
MD5
03675c1d7bd0f0dd4f91a4d86249a69a
-
SHA1
13acf91b9467df368059be73f3448d4d49b637e4
-
SHA256
175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010
-
SHA512
138fb15c2411f233b39b652d51b0901d686d78fd5e85cabd4559d672b084a4febbf67726f334eaaa2514f0aa75d2b2e5758336a29483521c0cf9ca740e79e334
-
SSDEEP
12288:VdR/L2wA8UePh0KtiKZ6Jk6J9aQqAmkeyI8b9M:dL3AfeqnazAmtyI8b9M
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
8.218.196.187:4449
127.0.0.1:4449
vidjpdoqlri
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2288 set thread context of 2116 2288 175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regasm.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 2116 regasm.exe 2116 regasm.exe 2116 regasm.exe 2116 regasm.exe 2116 regasm.exe 2116 regasm.exe 2116 regasm.exe 2116 regasm.exe 2116 regasm.exe 2116 regasm.exe 2116 regasm.exe 2116 regasm.exe 2116 regasm.exe 2116 regasm.exe 2116 regasm.exe 2116 regasm.exe 2116 regasm.exe 2116 regasm.exe 2116 regasm.exe 2116 regasm.exe 2116 regasm.exe 2116 regasm.exe 2116 regasm.exe 2116 regasm.exe 2116 regasm.exe 2116 regasm.exe 2116 regasm.exe 2116 regasm.exe 2116 regasm.exe 2116 regasm.exe 2116 regasm.exe 2116 regasm.exe 2116 regasm.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2288 175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe 2288 175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2116 regasm.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2288 175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe 2116 regasm.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2092 2288 175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe 30 PID 2288 wrote to memory of 2092 2288 175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe 30 PID 2288 wrote to memory of 2092 2288 175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe 30 PID 2288 wrote to memory of 2092 2288 175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe 30 PID 2288 wrote to memory of 2092 2288 175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe 30 PID 2288 wrote to memory of 2092 2288 175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe 30 PID 2288 wrote to memory of 2092 2288 175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe 30 PID 2288 wrote to memory of 2092 2288 175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe 30 PID 2288 wrote to memory of 2116 2288 175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe 31 PID 2288 wrote to memory of 2116 2288 175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe 31 PID 2288 wrote to memory of 2116 2288 175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe 31 PID 2288 wrote to memory of 2116 2288 175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe 31 PID 2288 wrote to memory of 2116 2288 175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe 31 PID 2288 wrote to memory of 2116 2288 175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe 31 PID 2288 wrote to memory of 2116 2288 175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe 31 PID 2288 wrote to memory of 2116 2288 175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe"C:\Users\Admin\AppData\Local\Temp\175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"2⤵PID:2092
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2116
-