Analysis
-
max time kernel
11s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
06-01-2025 18:42
Static task
static1
1 signatures
General
-
Target
175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe
-
Size
492KB
-
MD5
03675c1d7bd0f0dd4f91a4d86249a69a
-
SHA1
13acf91b9467df368059be73f3448d4d49b637e4
-
SHA256
175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010
-
SHA512
138fb15c2411f233b39b652d51b0901d686d78fd5e85cabd4559d672b084a4febbf67726f334eaaa2514f0aa75d2b2e5758336a29483521c0cf9ca740e79e334
-
SSDEEP
12288:VdR/L2wA8UePh0KtiKZ6Jk6J9aQqAmkeyI8b9M:dL3AfeqnazAmtyI8b9M
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
8.218.196.187:4449
127.0.0.1:4449
Mutex
vidjpdoqlri
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3700 set thread context of 2900 3700 175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe 77 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regasm.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2900 regasm.exe 2900 regasm.exe 2900 regasm.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3700 175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2900 regasm.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3700 175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe 2900 regasm.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3700 wrote to memory of 2900 3700 175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe 77 PID 3700 wrote to memory of 2900 3700 175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe 77 PID 3700 wrote to memory of 2900 3700 175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe 77 PID 3700 wrote to memory of 2900 3700 175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe"C:\Users\Admin\AppData\Local\Temp\175b9ab6fec60b890beea9ee142ce6cedc00d213ab8bf95b129d690061388010.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2900
-