Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-01-2025 19:37
Static task
static1
Behavioral task
behavioral1
Sample
e53d0063932826c931e98c9c3a9ac20f0ccab9724d4ed646711f61a3a16ee1f0.exe
Resource
win7-20240903-en
General
-
Target
e53d0063932826c931e98c9c3a9ac20f0ccab9724d4ed646711f61a3a16ee1f0.exe
-
Size
472KB
-
MD5
d48749ab6904e01401b9550cc7767174
-
SHA1
c468b69ee0e1a471d0f1e4751c12f7f32e2ce946
-
SHA256
e53d0063932826c931e98c9c3a9ac20f0ccab9724d4ed646711f61a3a16ee1f0
-
SHA512
7388c3fdfd989343474281712c115e914f17442755441f9bfb0f64b9f922e1eec765d2374f93ccf60d856ff966464974033e66fceb78a5ff86228a5cfc4ce925
-
SSDEEP
12288:zdR/L2wA8UePhGtFUof97VpKV9jQ9T3dD/:LL3AfesCs3h/
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
8.218.196.187:4449
127.0.0.1:4449
vidjpdoqlri
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2764 set thread context of 2748 2764 e53d0063932826c931e98c9c3a9ac20f0ccab9724d4ed646711f61a3a16ee1f0.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e53d0063932826c931e98c9c3a9ac20f0ccab9724d4ed646711f61a3a16ee1f0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regasm.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 2748 regasm.exe 2748 regasm.exe 2748 regasm.exe 2748 regasm.exe 2748 regasm.exe 2748 regasm.exe 2748 regasm.exe 2748 regasm.exe 2748 regasm.exe 2748 regasm.exe 2748 regasm.exe 2748 regasm.exe 2748 regasm.exe 2748 regasm.exe 2748 regasm.exe 2748 regasm.exe 2748 regasm.exe 2748 regasm.exe 2748 regasm.exe 2748 regasm.exe 2748 regasm.exe 2748 regasm.exe 2748 regasm.exe 2748 regasm.exe 2748 regasm.exe 2748 regasm.exe 2748 regasm.exe 2748 regasm.exe 2748 regasm.exe 2748 regasm.exe 2748 regasm.exe 2748 regasm.exe 2748 regasm.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2764 e53d0063932826c931e98c9c3a9ac20f0ccab9724d4ed646711f61a3a16ee1f0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2748 regasm.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2764 e53d0063932826c931e98c9c3a9ac20f0ccab9724d4ed646711f61a3a16ee1f0.exe 2748 regasm.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2748 2764 e53d0063932826c931e98c9c3a9ac20f0ccab9724d4ed646711f61a3a16ee1f0.exe 30 PID 2764 wrote to memory of 2748 2764 e53d0063932826c931e98c9c3a9ac20f0ccab9724d4ed646711f61a3a16ee1f0.exe 30 PID 2764 wrote to memory of 2748 2764 e53d0063932826c931e98c9c3a9ac20f0ccab9724d4ed646711f61a3a16ee1f0.exe 30 PID 2764 wrote to memory of 2748 2764 e53d0063932826c931e98c9c3a9ac20f0ccab9724d4ed646711f61a3a16ee1f0.exe 30 PID 2764 wrote to memory of 2748 2764 e53d0063932826c931e98c9c3a9ac20f0ccab9724d4ed646711f61a3a16ee1f0.exe 30 PID 2764 wrote to memory of 2748 2764 e53d0063932826c931e98c9c3a9ac20f0ccab9724d4ed646711f61a3a16ee1f0.exe 30 PID 2764 wrote to memory of 2748 2764 e53d0063932826c931e98c9c3a9ac20f0ccab9724d4ed646711f61a3a16ee1f0.exe 30 PID 2764 wrote to memory of 2748 2764 e53d0063932826c931e98c9c3a9ac20f0ccab9724d4ed646711f61a3a16ee1f0.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\e53d0063932826c931e98c9c3a9ac20f0ccab9724d4ed646711f61a3a16ee1f0.exe"C:\Users\Admin\AppData\Local\Temp\e53d0063932826c931e98c9c3a9ac20f0ccab9724d4ed646711f61a3a16ee1f0.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2748
-