Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16/01/2025, 12:02
Behavioral task
behavioral1
Sample
6c4aff551902c406ab8e01ed1b12ed853c62210fc1063d87a9eaf122d891d871.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
6c4aff551902c406ab8e01ed1b12ed853c62210fc1063d87a9eaf122d891d871.exe
Resource
win10v2004-20241007-en
General
-
Target
6c4aff551902c406ab8e01ed1b12ed853c62210fc1063d87a9eaf122d891d871.exe
-
Size
63KB
-
MD5
de4fed672c3cd3aaaf7ddddb4b729081
-
SHA1
829f926a6fafad3bcaa8850acd57b83dcf413e19
-
SHA256
6c4aff551902c406ab8e01ed1b12ed853c62210fc1063d87a9eaf122d891d871
-
SHA512
41f961b33dc7431bc3c11bba91391f8b037e0eb12dc8f3f6a168eeeb01652928c41bcc508e5e3eec3c2b749adbcb05dae7e761014c484fe9139661865c4ae47e
-
SSDEEP
1536:ihODHQtSfGafqCg7mOxjGbbswVLdMCGiDpqKmY7N:ihODHQtSzfc7bhGbbsidMggzE
Malware Config
Extracted
asyncrat
5.0.5
Venom Clients
127.0.0.1:35000
88.167.109.19:35000
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
true
-
install_file
serv.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2748 6c4aff551902c406ab8e01ed1b12ed853c62210fc1063d87a9eaf122d891d871.exe Token: SeSecurityPrivilege 2748 6c4aff551902c406ab8e01ed1b12ed853c62210fc1063d87a9eaf122d891d871.exe Token: SeTakeOwnershipPrivilege 2748 6c4aff551902c406ab8e01ed1b12ed853c62210fc1063d87a9eaf122d891d871.exe Token: SeLoadDriverPrivilege 2748 6c4aff551902c406ab8e01ed1b12ed853c62210fc1063d87a9eaf122d891d871.exe Token: SeSystemProfilePrivilege 2748 6c4aff551902c406ab8e01ed1b12ed853c62210fc1063d87a9eaf122d891d871.exe Token: SeSystemtimePrivilege 2748 6c4aff551902c406ab8e01ed1b12ed853c62210fc1063d87a9eaf122d891d871.exe Token: SeProfSingleProcessPrivilege 2748 6c4aff551902c406ab8e01ed1b12ed853c62210fc1063d87a9eaf122d891d871.exe Token: SeIncBasePriorityPrivilege 2748 6c4aff551902c406ab8e01ed1b12ed853c62210fc1063d87a9eaf122d891d871.exe Token: SeCreatePagefilePrivilege 2748 6c4aff551902c406ab8e01ed1b12ed853c62210fc1063d87a9eaf122d891d871.exe Token: SeBackupPrivilege 2748 6c4aff551902c406ab8e01ed1b12ed853c62210fc1063d87a9eaf122d891d871.exe Token: SeRestorePrivilege 2748 6c4aff551902c406ab8e01ed1b12ed853c62210fc1063d87a9eaf122d891d871.exe Token: SeShutdownPrivilege 2748 6c4aff551902c406ab8e01ed1b12ed853c62210fc1063d87a9eaf122d891d871.exe Token: SeDebugPrivilege 2748 6c4aff551902c406ab8e01ed1b12ed853c62210fc1063d87a9eaf122d891d871.exe Token: SeSystemEnvironmentPrivilege 2748 6c4aff551902c406ab8e01ed1b12ed853c62210fc1063d87a9eaf122d891d871.exe Token: SeRemoteShutdownPrivilege 2748 6c4aff551902c406ab8e01ed1b12ed853c62210fc1063d87a9eaf122d891d871.exe Token: SeUndockPrivilege 2748 6c4aff551902c406ab8e01ed1b12ed853c62210fc1063d87a9eaf122d891d871.exe Token: SeManageVolumePrivilege 2748 6c4aff551902c406ab8e01ed1b12ed853c62210fc1063d87a9eaf122d891d871.exe Token: 33 2748 6c4aff551902c406ab8e01ed1b12ed853c62210fc1063d87a9eaf122d891d871.exe Token: 34 2748 6c4aff551902c406ab8e01ed1b12ed853c62210fc1063d87a9eaf122d891d871.exe Token: 35 2748 6c4aff551902c406ab8e01ed1b12ed853c62210fc1063d87a9eaf122d891d871.exe Token: 36 2748 6c4aff551902c406ab8e01ed1b12ed853c62210fc1063d87a9eaf122d891d871.exe