Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
15-01-2025 01:22
Behavioral task
behavioral1
Sample
VenomServer.exe
Resource
win10ltsc2021-20250113-en
General
-
Target
VenomServer.exe
-
Size
93KB
-
MD5
2f730ef80818f9cc2e2a592badc24d2b
-
SHA1
d5d4d56727eb252067f4e67aa6658a2ba461a919
-
SHA256
727785cc92095e9d516041ac06b779e5beb08cd5b9f62716ac68651b673862ad
-
SHA512
ae8bbc90038e1cbc0eda7181fc190c7f87baedcb5f522d93309774b60b7d82a743896c3bd628badd3c851a80811c1dc278de3a9111a48995ea976b817c4e63e7
-
SSDEEP
1536:3VwC+xhUa9urgOBPRNvM4jEwzGi1dDwDzgS:3VmUa9urgObdGi1des
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall 2 TTPs 3 IoCs
pid Process 272 netsh.exe 4256 netsh.exe 4528 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1581648047-808845429-2272123689-1000\Control Panel\International\Geo\Nation VenomServer.exe -
Executes dropped EXE 1 IoCs
pid Process 1708 server.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\autorun.inf server.exe File opened for modification C:\autorun.inf server.exe File created F:\autorun.inf server.exe File opened for modification F:\autorun.inf server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VenomServer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe 1708 server.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1708 server.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 1708 server.exe Token: 33 1708 server.exe Token: SeIncBasePriorityPrivilege 1708 server.exe Token: 33 1708 server.exe Token: SeIncBasePriorityPrivilege 1708 server.exe Token: 33 1708 server.exe Token: SeIncBasePriorityPrivilege 1708 server.exe Token: 33 1708 server.exe Token: SeIncBasePriorityPrivilege 1708 server.exe Token: 33 1708 server.exe Token: SeIncBasePriorityPrivilege 1708 server.exe Token: 33 1708 server.exe Token: SeIncBasePriorityPrivilege 1708 server.exe Token: 33 1708 server.exe Token: SeIncBasePriorityPrivilege 1708 server.exe Token: 33 1708 server.exe Token: SeIncBasePriorityPrivilege 1708 server.exe Token: 33 1708 server.exe Token: SeIncBasePriorityPrivilege 1708 server.exe Token: 33 1708 server.exe Token: SeIncBasePriorityPrivilege 1708 server.exe Token: 33 1708 server.exe Token: SeIncBasePriorityPrivilege 1708 server.exe Token: 33 1708 server.exe Token: SeIncBasePriorityPrivilege 1708 server.exe Token: 33 1708 server.exe Token: SeIncBasePriorityPrivilege 1708 server.exe Token: 33 1708 server.exe Token: SeIncBasePriorityPrivilege 1708 server.exe Token: 33 1708 server.exe Token: SeIncBasePriorityPrivilege 1708 server.exe Token: 33 1708 server.exe Token: SeIncBasePriorityPrivilege 1708 server.exe Token: 33 1708 server.exe Token: SeIncBasePriorityPrivilege 1708 server.exe Token: 33 1708 server.exe Token: SeIncBasePriorityPrivilege 1708 server.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 392 wrote to memory of 1708 392 VenomServer.exe 81 PID 392 wrote to memory of 1708 392 VenomServer.exe 81 PID 392 wrote to memory of 1708 392 VenomServer.exe 81 PID 1708 wrote to memory of 272 1708 server.exe 82 PID 1708 wrote to memory of 272 1708 server.exe 82 PID 1708 wrote to memory of 272 1708 server.exe 82 PID 1708 wrote to memory of 4256 1708 server.exe 84 PID 1708 wrote to memory of 4256 1708 server.exe 84 PID 1708 wrote to memory of 4256 1708 server.exe 84 PID 1708 wrote to memory of 4528 1708 server.exe 85 PID 1708 wrote to memory of 4528 1708 server.exe 85 PID 1708 wrote to memory of 4528 1708 server.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\VenomServer.exe"C:\Users\Admin\AppData\Local\Temp\VenomServer.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"2⤵
- Executes dropped EXE
- Drops autorun.inf file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:272
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe"3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4256
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4528
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD52f730ef80818f9cc2e2a592badc24d2b
SHA1d5d4d56727eb252067f4e67aa6658a2ba461a919
SHA256727785cc92095e9d516041ac06b779e5beb08cd5b9f62716ac68651b673862ad
SHA512ae8bbc90038e1cbc0eda7181fc190c7f87baedcb5f522d93309774b60b7d82a743896c3bd628badd3c851a80811c1dc278de3a9111a48995ea976b817c4e63e7
-
Filesize
5B
MD5aa3cce4f6c83d5adfcfc45934b274cc6
SHA120e102f0ad9f95951786af279e5215d2ecf85126
SHA25657a8ff317e913b7e08c0a1758997ed0ffc2f1aba0a3b3310c7697bc207fd15e5
SHA512f9ec7cd14188f6f7cc00d64dfd7781fc425b7dd24d8fa70d9382cd127bbcc657c734812bc50ba0761393b1a89de9dc02f0d90e8377d6387f24e2d36c98d185cf