Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 02:51
Static task
static1
Behavioral task
behavioral1
Sample
31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7.exe
Resource
win7-20241010-en
General
-
Target
31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7.exe
-
Size
950KB
-
MD5
a8a4aa9c047894582f100213370da8de
-
SHA1
e7b4d9747c787599947d9944cc90ed36c31984b4
-
SHA256
31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7
-
SHA512
235b0a604d73ea9a45c3db63693cf1a6ee3f38ea783c22568af233252a41c7018dd77b96f70020e2e97c0f2843b316b270a023d95983c55cdc72c6ecc86df0c9
-
SSDEEP
24576:Gu6J33O0c+JY5UZ+XC0kGso6Fat0svhWWY:Iu0c++OCvkGs9Fat0sv7Y
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
87.120.120.15:4449
ykpleyrgtopul
-
delay
10
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vitrailist.vbs vitrailist.exe -
Executes dropped EXE 1 IoCs
pid Process 4008 vitrailist.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023caf-9.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4008 set thread context of 552 4008 vitrailist.exe 83 -
Program crash 1 IoCs
pid pid_target Process procid_target 888 552 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vitrailist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4008 vitrailist.exe 4008 vitrailist.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeDebugPrivilege 552 RegSvcs.exe Token: SeIncreaseQuotaPrivilege 552 RegSvcs.exe Token: SeSecurityPrivilege 552 RegSvcs.exe Token: SeTakeOwnershipPrivilege 552 RegSvcs.exe Token: SeLoadDriverPrivilege 552 RegSvcs.exe Token: SeSystemProfilePrivilege 552 RegSvcs.exe Token: SeSystemtimePrivilege 552 RegSvcs.exe Token: SeProfSingleProcessPrivilege 552 RegSvcs.exe Token: SeIncBasePriorityPrivilege 552 RegSvcs.exe Token: SeCreatePagefilePrivilege 552 RegSvcs.exe Token: SeBackupPrivilege 552 RegSvcs.exe Token: SeRestorePrivilege 552 RegSvcs.exe Token: SeShutdownPrivilege 552 RegSvcs.exe Token: SeDebugPrivilege 552 RegSvcs.exe Token: SeSystemEnvironmentPrivilege 552 RegSvcs.exe Token: SeRemoteShutdownPrivilege 552 RegSvcs.exe Token: SeUndockPrivilege 552 RegSvcs.exe Token: SeManageVolumePrivilege 552 RegSvcs.exe Token: 33 552 RegSvcs.exe Token: 34 552 RegSvcs.exe Token: 35 552 RegSvcs.exe Token: 36 552 RegSvcs.exe Token: SeIncreaseQuotaPrivilege 552 RegSvcs.exe Token: SeSecurityPrivilege 552 RegSvcs.exe Token: SeTakeOwnershipPrivilege 552 RegSvcs.exe Token: SeLoadDriverPrivilege 552 RegSvcs.exe Token: SeSystemProfilePrivilege 552 RegSvcs.exe Token: SeSystemtimePrivilege 552 RegSvcs.exe Token: SeProfSingleProcessPrivilege 552 RegSvcs.exe Token: SeIncBasePriorityPrivilege 552 RegSvcs.exe Token: SeCreatePagefilePrivilege 552 RegSvcs.exe Token: SeBackupPrivilege 552 RegSvcs.exe Token: SeRestorePrivilege 552 RegSvcs.exe Token: SeShutdownPrivilege 552 RegSvcs.exe Token: SeDebugPrivilege 552 RegSvcs.exe Token: SeSystemEnvironmentPrivilege 552 RegSvcs.exe Token: SeRemoteShutdownPrivilege 552 RegSvcs.exe Token: SeUndockPrivilege 552 RegSvcs.exe Token: SeManageVolumePrivilege 552 RegSvcs.exe Token: 33 552 RegSvcs.exe Token: 34 552 RegSvcs.exe Token: 35 552 RegSvcs.exe Token: 36 552 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 1124 31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7.exe 1124 31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7.exe 1124 31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7.exe 4008 vitrailist.exe 4008 vitrailist.exe -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 1124 31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7.exe 1124 31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7.exe 1124 31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7.exe 4008 vitrailist.exe 4008 vitrailist.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1124 wrote to memory of 4008 1124 31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7.exe 82 PID 1124 wrote to memory of 4008 1124 31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7.exe 82 PID 1124 wrote to memory of 4008 1124 31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7.exe 82 PID 4008 wrote to memory of 552 4008 vitrailist.exe 83 PID 4008 wrote to memory of 552 4008 vitrailist.exe 83 PID 4008 wrote to memory of 552 4008 vitrailist.exe 83 PID 4008 wrote to memory of 552 4008 vitrailist.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7.exe"C:\Users\Admin\AppData\Local\Temp\31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\savagenesses\vitrailist.exe"C:\Users\Admin\AppData\Local\Temp\31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 552 -s 13044⤵
- Program crash
PID:888
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 552 -ip 5521⤵PID:5104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
950KB
MD5a8a4aa9c047894582f100213370da8de
SHA1e7b4d9747c787599947d9944cc90ed36c31984b4
SHA25631c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7
SHA512235b0a604d73ea9a45c3db63693cf1a6ee3f38ea783c22568af233252a41c7018dd77b96f70020e2e97c0f2843b316b270a023d95983c55cdc72c6ecc86df0c9