Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250211-en -
resource tags
arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system -
submitted
12-02-2025 00:00
Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20240903-en
General
-
Target
Client.exe
-
Size
74KB
-
MD5
b4af5dfc0916f3dff6112968c8cb6221
-
SHA1
878f42206193d7b55263e73fd75a0533776780d0
-
SHA256
62915867b0680c2e894d51e2a44efffaf6bc648cb1119cdce08d2fae416e4f2d
-
SHA512
7a166e203abe354e189d194f7f37fc0ef9a225907e96a7423b883b5656b20a0683d4960c432691d59aff2a07977e8bd55f39dd292bdb0136dba41c64261d614d
-
SSDEEP
1536:EUEkcx4VHsC0SPMV7e9VdQuDI6H1bf/GLQzc2LVclN:EUxcx4GfSPMV7e9VdQsH1bfyQPBY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
127.0.0.1:4449
ifzepoatyluoqrnrhc
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
resource yara_rule behavioral2/memory/3880-1-0x0000000000210000-0x0000000000228000-memory.dmp VenomRAT -
Venomrat family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 35 232 Process not Found -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1496 MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 3880 Client.exe 3880 Client.exe 3880 Client.exe 3880 Client.exe 3880 Client.exe 3880 Client.exe 3880 Client.exe 3880 Client.exe 3880 Client.exe 3880 Client.exe 3880 Client.exe 3880 Client.exe 3880 Client.exe 3880 Client.exe 3880 Client.exe 3880 Client.exe 3880 Client.exe 3880 Client.exe 3880 Client.exe 3880 Client.exe 3880 Client.exe 3880 Client.exe 3880 Client.exe 3880 Client.exe 3880 Client.exe 3880 Client.exe 3880 Client.exe 3880 Client.exe 3880 Client.exe 3880 Client.exe 3880 Client.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3880 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3880 Client.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3880
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NkYxRDg2QTAtRjEyQi00MTU2LTlEN0MtNTcwMzg2MThBNTU0fSIgdXNlcmlkPSJ7NDgxMTE0OTQtQzg5Ri00M0RGLTkzNDQtOERCMkMwQTVGNjk4fSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7QTk1NDZBRDAtQzIzOS00MURCLThDRDUtMzBENzBBMTYzN0ZGfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0MS4xMjg4IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O0UreGJBejZZNnNVMTI4OWJTNnFsNFZSTGJramZCVUdUTUpzanJIcjQ0aUk9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIwIiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODMzNzEiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NDE5Mjc1MzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MzEyMzk0MjkyIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1496