Resubmissions

06-02-2025 14:12

250206-rh1kwaypdk 10

27-01-2025 23:39

250127-3ndh3szje1 10

27-01-2025 23:31

250127-3hqapayrby 10

27-01-2025 23:17

250127-29nqhayngz 10

Analysis

  • max time kernel
    242s
  • max time network
    251s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    27-01-2025 23:39

General

  • Target

    Venom RAT + HVNC + Stealer + Grabber.exe

  • Size

    14.2MB

  • MD5

    3b3a304c6fc7a3a1d9390d7cbff56634

  • SHA1

    e8bd5244e6362968f5017680da33f1e90ae63dd7

  • SHA256

    7331368c01b2a16bda0f013f376a039e6aeb4cb2dd8b0c2afc7ca208fb544c58

  • SHA512

    7f1beacb6449b3b3e108016c8264bb9a21ecba526c2778794f16a7f9c817c0bbd5d4cf0c208d706d25c54322a875da899ab047aab1e07684f6b7b6083981abe5

  • SSDEEP

    196608:Nja6chUZX81lbFklbYJygrP7aIBhLkNPFCZZwiJl1NLIsPA8fxvuIMzd/95UhS14:qT+P+Zw6NLIsFfskh1BmXG04

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

127.0.0.1:4449

Mutex

ewbfdjhdsdfpjk

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Async RAT payload 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 63 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 15 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Venom RAT + HVNC + Stealer + Grabber.exe
    "C:\Users\Admin\AppData\Local\Temp\Venom RAT + HVNC + Stealer + Grabber.exe"
    1⤵
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:2624
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:2292
    • C:\Users\Admin\Desktop\Client.exe
      "C:\Users\Admin\Desktop\Client.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:660
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c Shutdown /s /f /t 00
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1340
        • C:\Windows\system32\shutdown.exe
          Shutdown /s /f /t 00
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4316
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x4 /state0:0xa3a0b055 /state1:0x41c64e6d
      1⤵
      • Modifies data under HKEY_USERS
      • Suspicious use of SetWindowsHookEx
      PID:2364

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Server\Venom_RAT_+_HVNC_+_Steale_Url_hfvp5p1rhhwhiply0vdltrgybx1zwz4h\6.0.3.1\qacjfzar.newcfg

      Filesize

      2KB

      MD5

      fd7794c3066e5a39416a25ba93515187

      SHA1

      78bbd2f666c2944849ef25c5b2570a7e44fac5f8

      SHA256

      e7084c0eb6e88191879a75e75ca9cc96ae9b880b8b47729e0f52b73089fb68cd

      SHA512

      987293bc6417054acddd43d431ae4e0fe4afe45aeb7bb4342fea34b42100d2bb549517423ab0eb6ee4c88c0c9a00ce25fdd9228c237492a6a5e1d80aaf1f7b65

    • C:\Users\Admin\AppData\Local\Server\Venom_RAT_+_HVNC_+_Steale_Url_hfvp5p1rhhwhiply0vdltrgybx1zwz4h\6.0.3.1\user.config

      Filesize

      1KB

      MD5

      3fb8d2a2cd510948957ef43af5de1a6a

      SHA1

      165c56b69c45db04546436b8cfcd21bf543fe1e3

      SHA256

      095a2b7ce003847ea27f3eb98eca1c5bf9098c194c137c550bed549fe8d46306

      SHA512

      ddf025953f0487612cab831866ce03285aa810a406d0a92d4491a2d26c7eaba2c4108c230309732a7ab6184c1578419164afe2fdc8e0179d8584bfbc7e75f1c6

    • C:\Users\Admin\AppData\Local\Server\Venom_RAT_+_HVNC_+_Steale_Url_hfvp5p1rhhwhiply0vdltrgybx1zwz4h\6.0.3.1\user.config

      Filesize

      1KB

      MD5

      ec49b7f5618d420d4c61a527d52c2638

      SHA1

      4c627db09339ea9d8266671a866140c5c9377c89

      SHA256

      1e5fc255b1d6ff6b9fcb242f9aade5db7d5ce869a7bad4a216cf92c90f239def

      SHA512

      d33bbc0e55aa55a52b12a476d570bc2f2bb649313d416d94cd7bf73c0e76bdbf016b8cecf2eb3aaafb490e36238a8bec3e41e88201b65d032daaed757ddabd6c

    • C:\Users\Admin\Desktop\Client.exe

      Filesize

      74KB

      MD5

      01aa901a3358036bdc2c4e81f358f08f

      SHA1

      56f005bf39a26ea6e7fc9723831ab74dd88e7f30

      SHA256

      9648ff5387313b77589afe1cac9e6671c1dd3f46429a9cccab9711131742acce

      SHA512

      93633214ad60d2a98a9c7a98d8c1ad9cfdca58ae1b984f403d43a8e159fa8e16cad6d3724e02b1c45b91033b1668b1d6a4169ed5f9c7bc3678517457315d46bb

    • memory/660-125-0x000000001C290000-0x000000001C2F6000-memory.dmp

      Filesize

      408KB

    • memory/660-107-0x000000001C140000-0x000000001C18C000-memory.dmp

      Filesize

      304KB

    • memory/660-104-0x000000001C440000-0x000000001C45E000-memory.dmp

      Filesize

      120KB

    • memory/660-103-0x0000000002800000-0x000000000280E000-memory.dmp

      Filesize

      56KB

    • memory/660-102-0x000000001C4C0000-0x000000001C536000-memory.dmp

      Filesize

      472KB

    • memory/660-71-0x0000000000670000-0x0000000000688000-memory.dmp

      Filesize

      96KB

    • memory/2624-10-0x000002CCB2F40000-0x000002CCB32DC000-memory.dmp

      Filesize

      3.6MB

    • memory/2624-9-0x000002CCB3B20000-0x000002CCB41B2000-memory.dmp

      Filesize

      6.6MB

    • memory/2624-12-0x000002CCAF7D0000-0x000002CCAF7F0000-memory.dmp

      Filesize

      128KB

    • memory/2624-13-0x00007FFA87760000-0x00007FFA88222000-memory.dmp

      Filesize

      10.8MB

    • memory/2624-14-0x000002CCB4AE0000-0x000002CCB4CF2000-memory.dmp

      Filesize

      2.1MB

    • memory/2624-15-0x00007FFA87763000-0x00007FFA87765000-memory.dmp

      Filesize

      8KB

    • memory/2624-16-0x00007FFA87760000-0x00007FFA88222000-memory.dmp

      Filesize

      10.8MB

    • memory/2624-17-0x000002CCB44A0000-0x000002CCB454A000-memory.dmp

      Filesize

      680KB

    • memory/2624-18-0x00007FFA87760000-0x00007FFA88222000-memory.dmp

      Filesize

      10.8MB

    • memory/2624-21-0x00007FFA87760000-0x00007FFA88222000-memory.dmp

      Filesize

      10.8MB

    • memory/2624-22-0x000002CCB0610000-0x000002CCB061A000-memory.dmp

      Filesize

      40KB

    • memory/2624-23-0x00007FFA87760000-0x00007FFA88222000-memory.dmp

      Filesize

      10.8MB

    • memory/2624-26-0x00007FFA87760000-0x00007FFA88222000-memory.dmp

      Filesize

      10.8MB

    • memory/2624-27-0x00007FFA87760000-0x00007FFA88222000-memory.dmp

      Filesize

      10.8MB

    • memory/2624-28-0x00007FFA87760000-0x00007FFA88222000-memory.dmp

      Filesize

      10.8MB

    • memory/2624-29-0x000002CCB7720000-0x000002CCB7844000-memory.dmp

      Filesize

      1.1MB

    • memory/2624-0-0x00007FFA87763000-0x00007FFA87765000-memory.dmp

      Filesize

      8KB

    • memory/2624-11-0x000002CCB4650000-0x000002CCB4AD4000-memory.dmp

      Filesize

      4.5MB

    • memory/2624-48-0x00007FFA87760000-0x00007FFA88222000-memory.dmp

      Filesize

      10.8MB

    • memory/2624-8-0x000002CCB3360000-0x000002CCB3B1E000-memory.dmp

      Filesize

      7.7MB

    • memory/2624-6-0x000002CCAFF80000-0x000002CCB0058000-memory.dmp

      Filesize

      864KB

    • memory/2624-74-0x000002CCB7C30000-0x000002CCB7CE2000-memory.dmp

      Filesize

      712KB

    • memory/2624-75-0x000002CCB7BA0000-0x000002CCB7BC2000-memory.dmp

      Filesize

      136KB

    • memory/2624-7-0x000002CCAF500000-0x000002CCAF550000-memory.dmp

      Filesize

      320KB

    • memory/2624-5-0x00007FFA87760000-0x00007FFA88222000-memory.dmp

      Filesize

      10.8MB

    • memory/2624-4-0x000002CCAF570000-0x000002CCAF7C2000-memory.dmp

      Filesize

      2.3MB

    • memory/2624-3-0x000002CCAF830000-0x000002CCAFD42000-memory.dmp

      Filesize

      5.1MB

    • memory/2624-110-0x000002CCBAF00000-0x000002CCBAF4A000-memory.dmp

      Filesize

      296KB

    • memory/2624-109-0x000002CCB8870000-0x000002CCB888A000-memory.dmp

      Filesize

      104KB

    • memory/2624-108-0x000002CCBAEB0000-0x000002CCBAEF8000-memory.dmp

      Filesize

      288KB

    • memory/2624-2-0x000002CCB0620000-0x000002CCB1A24000-memory.dmp

      Filesize

      20.0MB

    • memory/2624-1-0x000002CC93F40000-0x000002CC94D74000-memory.dmp

      Filesize

      14.2MB

    • memory/2624-126-0x00007FFA87760000-0x00007FFA88222000-memory.dmp

      Filesize

      10.8MB