Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2025 18:37
Static task
static1
Behavioral task
behavioral1
Sample
175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe
Resource
win7-20240903-en
General
-
Target
175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe
-
Size
492KB
-
MD5
03675c1d7bd0f0dd4f91a4d86249a69a
-
SHA1
13acf91b9467df368059be73f3448d4d49b637e4
-
SHA256
175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010
-
SHA512
138fb15c2411f233b39b652d51b0901d686d78fd5e85cabd4559d672b084a4febbf67726f334eaaa2514f0aa75d2b2e5758336a29483521c0cf9ca740e79e334
-
SSDEEP
12288:VdR/L2wA8UePh0KtiKZ6Jk6J9aQqAmkeyI8b9M:dL3AfeqnazAmtyI8b9M
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
8.218.196.187:4449
127.0.0.1:4449
vidjpdoqlri
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3672 set thread context of 4684 3672 175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regasm.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 4684 regasm.exe 4684 regasm.exe 4684 regasm.exe 4684 regasm.exe 4684 regasm.exe 4684 regasm.exe 4684 regasm.exe 4684 regasm.exe 4684 regasm.exe 4684 regasm.exe 4684 regasm.exe 4684 regasm.exe 4684 regasm.exe 4684 regasm.exe 4684 regasm.exe 4684 regasm.exe 4684 regasm.exe 4684 regasm.exe 4684 regasm.exe 4684 regasm.exe 4684 regasm.exe 4684 regasm.exe 4684 regasm.exe 4684 regasm.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3672 175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4684 regasm.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3672 175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe 4684 regasm.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3672 wrote to memory of 4684 3672 175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe 83 PID 3672 wrote to memory of 4684 3672 175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe 83 PID 3672 wrote to memory of 4684 3672 175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe 83 PID 3672 wrote to memory of 4684 3672 175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe"C:\Users\Admin\AppData\Local\Temp\175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4684
-