Analysis
-
max time kernel
92s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
21/03/2025, 07:57
Behavioral task
behavioral1
Sample
34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe
Resource
win7-20241010-en
5 signatures
150 seconds
General
-
Target
34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe
-
Size
90KB
-
MD5
24c56282b153c72db527d0af5e1e371d
-
SHA1
800dfc31384b0317c3f145c4de36ca305fea8a5b
-
SHA256
34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02
-
SHA512
1e3f4ba03473b352b40afb983e0b055431ab517d8bd5aa359fe676a31d8527547d7a59dea6d3306b8dc26e5a11bee865860c8c29eca0eca8d67bdab0d64e5b8e
-
SSDEEP
1536:UU/UcxtbECiiPMVie9VdQkhDIyH1bf/6I+mQzcEBVqRhI/bDn3VclNg:UUscxtAViPMVie9VdQgH1bfiRmQrI6vN
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
Mutex
hshshhsh
Attributes
-
delay
1
-
install
true
-
install_file
6asd8sdad2183sada8213s.exe
-
install_folder
%Temp%
-
pastebin_config
https://pastebin.com/raw/LwwcrLg4
aes.plain
Signatures
-
Asyncrat family
-
resource yara_rule behavioral2/memory/4756-1-0x00000000003A0000-0x00000000003BA000-memory.dmp VenomRAT -
Venomrat family
-
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeDebugPrivilege 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe Token: SeIncreaseQuotaPrivilege 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe Token: SeSecurityPrivilege 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe Token: SeTakeOwnershipPrivilege 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe Token: SeLoadDriverPrivilege 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe Token: SeSystemProfilePrivilege 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe Token: SeSystemtimePrivilege 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe Token: SeProfSingleProcessPrivilege 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe Token: SeIncBasePriorityPrivilege 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe Token: SeCreatePagefilePrivilege 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe Token: SeBackupPrivilege 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe Token: SeRestorePrivilege 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe Token: SeShutdownPrivilege 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe Token: SeDebugPrivilege 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe Token: SeSystemEnvironmentPrivilege 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe Token: SeRemoteShutdownPrivilege 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe Token: SeUndockPrivilege 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe Token: SeManageVolumePrivilege 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe Token: 33 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe Token: 34 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe Token: 35 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe Token: 36 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe Token: SeIncreaseQuotaPrivilege 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe Token: SeSecurityPrivilege 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe Token: SeTakeOwnershipPrivilege 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe Token: SeLoadDriverPrivilege 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe Token: SeSystemProfilePrivilege 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe Token: SeSystemtimePrivilege 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe Token: SeProfSingleProcessPrivilege 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe Token: SeIncBasePriorityPrivilege 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe Token: SeCreatePagefilePrivilege 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe Token: SeBackupPrivilege 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe Token: SeRestorePrivilege 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe Token: SeShutdownPrivilege 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe Token: SeDebugPrivilege 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe Token: SeSystemEnvironmentPrivilege 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe Token: SeRemoteShutdownPrivilege 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe Token: SeUndockPrivilege 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe Token: SeManageVolumePrivilege 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe Token: 33 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe Token: 34 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe Token: 35 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe Token: 36 4756 34f2ec981f0c1dfaa3f04ea26266a0732a3767560847d7ab912b340b90fbbd02.exe