Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2025, 18:49
Behavioral task
behavioral1
Sample
addad.exe
Resource
win7-20241010-en
7 signatures
150 seconds
General
-
Target
addad.exe
-
Size
74KB
-
MD5
ab2c109605f569b5534e2a09960cb874
-
SHA1
8efa0aa703687e4b87bb697dd7fd1f813e5c6515
-
SHA256
93acde43deba4bb15654027d4acfb4500e963aa4303ed27c46d7c00a274d0ff8
-
SHA512
29bcbfe06cc286cc97ae240b0cce2a3fe4228e2e1e0642adc945f94972395fb3efd716329f25839685929ef92b9a62fb045e79263863f368ea680af185fa5234
-
SSDEEP
1536:gUUPcxVteCW7PMVKeM7a9IEl1bm/gwKQrQzcyLVclN:gUmcxV4x7PMVz3l1bm4wxQjBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
127.0.0.1:4449
Mutex
dehblkcccgfoe
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
resource yara_rule behavioral2/memory/2420-1-0x00000000008F0000-0x0000000000908000-memory.dmp VenomRAT -
Venomrat family
-
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2420 addad.exe 2420 addad.exe 2420 addad.exe 2420 addad.exe 2420 addad.exe 2420 addad.exe 2420 addad.exe 2420 addad.exe 2420 addad.exe 2420 addad.exe 2420 addad.exe 2420 addad.exe 2420 addad.exe 2420 addad.exe 2420 addad.exe 2420 addad.exe 2420 addad.exe 2420 addad.exe 2420 addad.exe 2420 addad.exe 2420 addad.exe 2420 addad.exe 2420 addad.exe 2420 addad.exe 2420 addad.exe 2420 addad.exe 2420 addad.exe 2420 addad.exe 2420 addad.exe 2420 addad.exe 2420 addad.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2420 addad.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2420 addad.exe