Analysis
-
max time kernel
147s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10-01-2025 07:51
Behavioral task
behavioral1
Sample
HelloWorldVB.exe
Resource
win7-20241010-en
windows7-x64
5 signatures
150 seconds
General
-
Target
HelloWorldVB.exe
-
Size
77KB
-
MD5
4b5b2ce8b9835b5ca970ded27e910c05
-
SHA1
f0af2a203b6056ee34cf9361c8f3c66eed4aa423
-
SHA256
e2afd594fb913068e316cd7b2b6e6cadeb8a05338734b3fd82c4b8099fcb7fed
-
SHA512
c74643b9360bb3aaa1417552cf96b33d2cfabe6a093c5d169702371d2668ee715eb0399500be465301b84e8e49c6cda7ac77f461d65a3fab3880321d058d7c97
-
SSDEEP
1536:gYKvH6s+6jGIwjSK/g1gZusDNtsugwbau78EC95QTS90K/:gR/6s+6fwhK+us/rn7JC957
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2568-1-0x0000000000B20000-0x0000000000B3A000-memory.dmp VenomRAT -
Venomrat family
-
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 2568 HelloWorldVB.exe 2568 HelloWorldVB.exe 2568 HelloWorldVB.exe 2568 HelloWorldVB.exe 2568 HelloWorldVB.exe 2568 HelloWorldVB.exe 2568 HelloWorldVB.exe 2568 HelloWorldVB.exe 2568 HelloWorldVB.exe 2568 HelloWorldVB.exe 2568 HelloWorldVB.exe 2568 HelloWorldVB.exe 2568 HelloWorldVB.exe 2568 HelloWorldVB.exe 2568 HelloWorldVB.exe 2568 HelloWorldVB.exe 2568 HelloWorldVB.exe 2568 HelloWorldVB.exe 2568 HelloWorldVB.exe 2568 HelloWorldVB.exe 2568 HelloWorldVB.exe 2568 HelloWorldVB.exe 2568 HelloWorldVB.exe 2568 HelloWorldVB.exe 2568 HelloWorldVB.exe 2568 HelloWorldVB.exe 2568 HelloWorldVB.exe 2568 HelloWorldVB.exe 2568 HelloWorldVB.exe 2568 HelloWorldVB.exe 2568 HelloWorldVB.exe 2568 HelloWorldVB.exe 2568 HelloWorldVB.exe 2568 HelloWorldVB.exe 2568 HelloWorldVB.exe 2568 HelloWorldVB.exe 2568 HelloWorldVB.exe 2568 HelloWorldVB.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2568 HelloWorldVB.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2568 HelloWorldVB.exe