Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
11-01-2025 02:51
Static task
static1
Behavioral task
behavioral1
Sample
31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7.exe
Resource
win7-20241010-en
General
-
Target
31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7.exe
-
Size
950KB
-
MD5
a8a4aa9c047894582f100213370da8de
-
SHA1
e7b4d9747c787599947d9944cc90ed36c31984b4
-
SHA256
31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7
-
SHA512
235b0a604d73ea9a45c3db63693cf1a6ee3f38ea783c22568af233252a41c7018dd77b96f70020e2e97c0f2843b316b270a023d95983c55cdc72c6ecc86df0c9
-
SSDEEP
24576:Gu6J33O0c+JY5UZ+XC0kGso6Fat0svhWWY:Iu0c++OCvkGs9Fat0sv7Y
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
87.120.120.15:4449
ykpleyrgtopul
-
delay
10
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vitrailist.vbs vitrailist.exe -
Executes dropped EXE 1 IoCs
pid Process 2924 vitrailist.exe -
Loads dropped DLL 1 IoCs
pid Process 2796 31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000d000000016fc9-8.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2924 set thread context of 2912 2924 vitrailist.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vitrailist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2924 vitrailist.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
description pid Process Token: SeDebugPrivilege 2912 RegSvcs.exe Token: SeIncreaseQuotaPrivilege 2912 RegSvcs.exe Token: SeSecurityPrivilege 2912 RegSvcs.exe Token: SeTakeOwnershipPrivilege 2912 RegSvcs.exe Token: SeLoadDriverPrivilege 2912 RegSvcs.exe Token: SeSystemProfilePrivilege 2912 RegSvcs.exe Token: SeSystemtimePrivilege 2912 RegSvcs.exe Token: SeProfSingleProcessPrivilege 2912 RegSvcs.exe Token: SeIncBasePriorityPrivilege 2912 RegSvcs.exe Token: SeCreatePagefilePrivilege 2912 RegSvcs.exe Token: SeBackupPrivilege 2912 RegSvcs.exe Token: SeRestorePrivilege 2912 RegSvcs.exe Token: SeShutdownPrivilege 2912 RegSvcs.exe Token: SeDebugPrivilege 2912 RegSvcs.exe Token: SeSystemEnvironmentPrivilege 2912 RegSvcs.exe Token: SeRemoteShutdownPrivilege 2912 RegSvcs.exe Token: SeUndockPrivilege 2912 RegSvcs.exe Token: SeManageVolumePrivilege 2912 RegSvcs.exe Token: 33 2912 RegSvcs.exe Token: 34 2912 RegSvcs.exe Token: 35 2912 RegSvcs.exe Token: SeIncreaseQuotaPrivilege 2912 RegSvcs.exe Token: SeSecurityPrivilege 2912 RegSvcs.exe Token: SeTakeOwnershipPrivilege 2912 RegSvcs.exe Token: SeLoadDriverPrivilege 2912 RegSvcs.exe Token: SeSystemProfilePrivilege 2912 RegSvcs.exe Token: SeSystemtimePrivilege 2912 RegSvcs.exe Token: SeProfSingleProcessPrivilege 2912 RegSvcs.exe Token: SeIncBasePriorityPrivilege 2912 RegSvcs.exe Token: SeCreatePagefilePrivilege 2912 RegSvcs.exe Token: SeBackupPrivilege 2912 RegSvcs.exe Token: SeRestorePrivilege 2912 RegSvcs.exe Token: SeShutdownPrivilege 2912 RegSvcs.exe Token: SeDebugPrivilege 2912 RegSvcs.exe Token: SeSystemEnvironmentPrivilege 2912 RegSvcs.exe Token: SeRemoteShutdownPrivilege 2912 RegSvcs.exe Token: SeUndockPrivilege 2912 RegSvcs.exe Token: SeManageVolumePrivilege 2912 RegSvcs.exe Token: 33 2912 RegSvcs.exe Token: 34 2912 RegSvcs.exe Token: 35 2912 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 2796 31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7.exe 2796 31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7.exe 2796 31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7.exe 2924 vitrailist.exe 2924 vitrailist.exe 2924 vitrailist.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 2796 31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7.exe 2796 31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7.exe 2796 31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7.exe 2924 vitrailist.exe 2924 vitrailist.exe 2924 vitrailist.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2796 wrote to memory of 2924 2796 31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7.exe 30 PID 2796 wrote to memory of 2924 2796 31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7.exe 30 PID 2796 wrote to memory of 2924 2796 31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7.exe 30 PID 2796 wrote to memory of 2924 2796 31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7.exe 30 PID 2924 wrote to memory of 2912 2924 vitrailist.exe 31 PID 2924 wrote to memory of 2912 2924 vitrailist.exe 31 PID 2924 wrote to memory of 2912 2924 vitrailist.exe 31 PID 2924 wrote to memory of 2912 2924 vitrailist.exe 31 PID 2924 wrote to memory of 2912 2924 vitrailist.exe 31 PID 2924 wrote to memory of 2912 2924 vitrailist.exe 31 PID 2924 wrote to memory of 2912 2924 vitrailist.exe 31 PID 2924 wrote to memory of 2912 2924 vitrailist.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7.exe"C:\Users\Admin\AppData\Local\Temp\31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\savagenesses\vitrailist.exe"C:\Users\Admin\AppData\Local\Temp\31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD58ed6d4156ac53d7e7f0d3a47017e941f
SHA1ee35bc4d136606b4a4b37481f7dc2ad2f5bd1160
SHA2562d855c5c944a2dd487185b52201423f2c69d1cf1464a97f18fe3ea800d70a716
SHA512a482e786b4b88aa417d26bc0106cf1fa53c1ad9c6a8a5100f9f7f0566a5e359c0c6e95c87798730844878bd6a565a4823c8204da49271c9183bca9828f005a49
-
Filesize
950KB
MD5a8a4aa9c047894582f100213370da8de
SHA1e7b4d9747c787599947d9944cc90ed36c31984b4
SHA25631c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7
SHA512235b0a604d73ea9a45c3db63693cf1a6ee3f38ea783c22568af233252a41c7018dd77b96f70020e2e97c0f2843b316b270a023d95983c55cdc72c6ecc86df0c9