Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
08-02-2025 15:11
Static task
static1
Behavioral task
behavioral1
Sample
b037843ef212f9907c4c2f22167379db44aa02d7c647c53278b4d8d784343537.exe
Resource
win7-20240729-en
General
-
Target
b037843ef212f9907c4c2f22167379db44aa02d7c647c53278b4d8d784343537.exe
-
Size
243KB
-
MD5
d88a06a393582a79ab6da48982ec87ae
-
SHA1
e5cc4271431fa138f4594847c20a5be3f6c919e4
-
SHA256
b037843ef212f9907c4c2f22167379db44aa02d7c647c53278b4d8d784343537
-
SHA512
41c75993633bf8d1f2dd9ab956ed40510a1d7678214a5311aed096c0e4678d6df57542908c4329f2424e9cb488f15cd554b06b151e909f7c70e4ce9d9a9191ac
-
SSDEEP
3072:KHkVhd52JYWsfVrhbjAY1GSEuywqamd/4bWSHqYubGtHshmRgSPG9oMNLxb:KHkVhd52JdYhbt1GCE2bUwZe+PElNh
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
89.23.100.93:4449
oonrejgwedvxwse
-
delay
1
-
install
true
-
install_file
calc.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
resource yara_rule behavioral2/memory/2016-1-0x0000000000470000-0x0000000000488000-memory.dmp VenomRAT behavioral2/memory/2016-5-0x0000000000400000-0x000000000043F000-memory.dmp VenomRAT behavioral2/memory/1180-18-0x0000000002040000-0x0000000002058000-memory.dmp VenomRAT behavioral2/memory/1180-22-0x0000000000400000-0x000000000043F000-memory.dmp VenomRAT -
Venomrat family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 56 2844 Process not Found -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1639772215-809007892-4072230623-1000\Control Panel\International\Geo\Nation b037843ef212f9907c4c2f22167379db44aa02d7c647c53278b4d8d784343537.exe -
Executes dropped EXE 1 IoCs
pid Process 1180 calc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b037843ef212f9907c4c2f22167379db44aa02d7c647c53278b4d8d784343537.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language calc.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2476 MicrosoftEdgeUpdate.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3332 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3756 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2016 b037843ef212f9907c4c2f22167379db44aa02d7c647c53278b4d8d784343537.exe 2016 b037843ef212f9907c4c2f22167379db44aa02d7c647c53278b4d8d784343537.exe 2016 b037843ef212f9907c4c2f22167379db44aa02d7c647c53278b4d8d784343537.exe 2016 b037843ef212f9907c4c2f22167379db44aa02d7c647c53278b4d8d784343537.exe 2016 b037843ef212f9907c4c2f22167379db44aa02d7c647c53278b4d8d784343537.exe 2016 b037843ef212f9907c4c2f22167379db44aa02d7c647c53278b4d8d784343537.exe 2016 b037843ef212f9907c4c2f22167379db44aa02d7c647c53278b4d8d784343537.exe 2016 b037843ef212f9907c4c2f22167379db44aa02d7c647c53278b4d8d784343537.exe 2016 b037843ef212f9907c4c2f22167379db44aa02d7c647c53278b4d8d784343537.exe 2016 b037843ef212f9907c4c2f22167379db44aa02d7c647c53278b4d8d784343537.exe 2016 b037843ef212f9907c4c2f22167379db44aa02d7c647c53278b4d8d784343537.exe 2016 b037843ef212f9907c4c2f22167379db44aa02d7c647c53278b4d8d784343537.exe 2016 b037843ef212f9907c4c2f22167379db44aa02d7c647c53278b4d8d784343537.exe 2016 b037843ef212f9907c4c2f22167379db44aa02d7c647c53278b4d8d784343537.exe 2016 b037843ef212f9907c4c2f22167379db44aa02d7c647c53278b4d8d784343537.exe 2016 b037843ef212f9907c4c2f22167379db44aa02d7c647c53278b4d8d784343537.exe 2016 b037843ef212f9907c4c2f22167379db44aa02d7c647c53278b4d8d784343537.exe 2016 b037843ef212f9907c4c2f22167379db44aa02d7c647c53278b4d8d784343537.exe 2016 b037843ef212f9907c4c2f22167379db44aa02d7c647c53278b4d8d784343537.exe 2016 b037843ef212f9907c4c2f22167379db44aa02d7c647c53278b4d8d784343537.exe 2016 b037843ef212f9907c4c2f22167379db44aa02d7c647c53278b4d8d784343537.exe 1180 calc.exe 1180 calc.exe 1180 calc.exe 1180 calc.exe 1180 calc.exe 1180 calc.exe 1180 calc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2016 b037843ef212f9907c4c2f22167379db44aa02d7c647c53278b4d8d784343537.exe Token: SeDebugPrivilege 1180 calc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1180 calc.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2016 wrote to memory of 1332 2016 b037843ef212f9907c4c2f22167379db44aa02d7c647c53278b4d8d784343537.exe 90 PID 2016 wrote to memory of 1332 2016 b037843ef212f9907c4c2f22167379db44aa02d7c647c53278b4d8d784343537.exe 90 PID 2016 wrote to memory of 1332 2016 b037843ef212f9907c4c2f22167379db44aa02d7c647c53278b4d8d784343537.exe 90 PID 2016 wrote to memory of 3452 2016 b037843ef212f9907c4c2f22167379db44aa02d7c647c53278b4d8d784343537.exe 92 PID 2016 wrote to memory of 3452 2016 b037843ef212f9907c4c2f22167379db44aa02d7c647c53278b4d8d784343537.exe 92 PID 2016 wrote to memory of 3452 2016 b037843ef212f9907c4c2f22167379db44aa02d7c647c53278b4d8d784343537.exe 92 PID 1332 wrote to memory of 3756 1332 cmd.exe 94 PID 1332 wrote to memory of 3756 1332 cmd.exe 94 PID 1332 wrote to memory of 3756 1332 cmd.exe 94 PID 3452 wrote to memory of 3332 3452 cmd.exe 95 PID 3452 wrote to memory of 3332 3452 cmd.exe 95 PID 3452 wrote to memory of 3332 3452 cmd.exe 95 PID 3452 wrote to memory of 1180 3452 cmd.exe 96 PID 3452 wrote to memory of 1180 3452 cmd.exe 96 PID 3452 wrote to memory of 1180 3452 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\b037843ef212f9907c4c2f22167379db44aa02d7c647c53278b4d8d784343537.exe"C:\Users\Admin\AppData\Local\Temp\b037843ef212f9907c4c2f22167379db44aa02d7c647c53278b4d8d784343537.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "calc" /tr '"C:\Users\Admin\AppData\Roaming\calc.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "calc" /tr '"C:\Users\Admin\AppData\Roaming\calc.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3756
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpD37C.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3332
-
-
C:\Users\Admin\AppData\Roaming\calc.exe"C:\Users\Admin\AppData\Roaming\calc.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1180
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIyIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDY4ODkiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxOTM2NTgwOTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MTc3MzA2ODQ4Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
942B
MD508fd55ab7b211d3fba9ba080bb93fc07
SHA13519a855c1d90857159c68422848785d68a89591
SHA256eb1d1fa6b376f369681435d4e310dc2e6e832877a6e2880640727f9390559614
SHA51261c362ac9ac9809532be0383eb239e06290b1387bc6e49e0ab0045bd7e4b904032f8def000d4b1e4800b6387c193f4ab78f8c507138030490014104cecb726d7
-
Filesize
148B
MD5876761f020391d2e7c6be271634ed365
SHA147d3eed1934900d0cda4f496b1e4f0182c42ec8d
SHA256effe91507879ad2fa6e95bb3773d5735f4ffb13391c3a9bdfeda093ac25f61e8
SHA512a288c45e93421df9032f7d728748a89451d2361db7c471fd44e00d04aa53fdd165c9ac146a214b1c5256e267acbcce63a40af95c64bc81e515853dcebf231681
-
Filesize
8B
MD5cf759e4c5f14fe3eec41b87ed756cea8
SHA1c27c796bb3c2fac929359563676f4ba1ffada1f5
SHA256c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761
SHA512c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b
-
Filesize
243KB
MD5d88a06a393582a79ab6da48982ec87ae
SHA1e5cc4271431fa138f4594847c20a5be3f6c919e4
SHA256b037843ef212f9907c4c2f22167379db44aa02d7c647c53278b4d8d784343537
SHA51241c75993633bf8d1f2dd9ab956ed40510a1d7678214a5311aed096c0e4678d6df57542908c4329f2424e9cb488f15cd554b06b151e909f7c70e4ce9d9a9191ac