Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
24/03/2025, 18:46
Behavioral task
behavioral1
Sample
CrackedDefault.exe
Resource
win7-20250207-en
General
-
Target
CrackedDefault.exe
-
Size
74KB
-
MD5
ee3fa50b70d2796ef1e27f5ece10edbf
-
SHA1
b41fe73491b0a2c2ae2059da96a523c3f5b587ae
-
SHA256
ee497caf223652c226571906ea5623d4a51ddc303d3e1d59443b8da17b7d29da
-
SHA512
4696604820ee75d2a171d6500a04bc4a26449fde6dc170b39f9734944a7fc26e3b4e03cb2d13ae87a9d0270666223c6fd6b3f7f3144b82c3a7392cd656ee2acb
-
SSDEEP
1536:aUXNwcxKHXwzCtmPMVOAxFI6H1bi/5Qzc+LVclN:aUXicxK8WmPMVOAPH1biRQXBY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Def
qmcwkkwaroj
-
c2_url_file
https://paste.ee/r/oBfRfDEZ/0
-
delay
1
-
install
true
-
install_file
System.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
resource yara_rule behavioral2/memory/2252-1-0x0000000000DE0000-0x0000000000DF8000-memory.dmp VenomRAT behavioral2/files/0x000700000001e6c3-12.dat VenomRAT -
Venomrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000700000001e6c3-12.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation CrackedDefault.exe -
Executes dropped EXE 1 IoCs
pid Process 4332 System.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 3968 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4524 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 2252 CrackedDefault.exe 2252 CrackedDefault.exe 2252 CrackedDefault.exe 2252 CrackedDefault.exe 2252 CrackedDefault.exe 2252 CrackedDefault.exe 2252 CrackedDefault.exe 2252 CrackedDefault.exe 2252 CrackedDefault.exe 2252 CrackedDefault.exe 2252 CrackedDefault.exe 2252 CrackedDefault.exe 2252 CrackedDefault.exe 2252 CrackedDefault.exe 2252 CrackedDefault.exe 2252 CrackedDefault.exe 2252 CrackedDefault.exe 2252 CrackedDefault.exe 2252 CrackedDefault.exe 2252 CrackedDefault.exe 2252 CrackedDefault.exe 2252 CrackedDefault.exe 2252 CrackedDefault.exe 4332 System.exe 4332 System.exe 4332 System.exe 4332 System.exe 4332 System.exe 4332 System.exe 4332 System.exe 4332 System.exe 4332 System.exe 4332 System.exe 4332 System.exe 4332 System.exe 4332 System.exe 4332 System.exe 4332 System.exe 4332 System.exe 4332 System.exe 4332 System.exe 4332 System.exe 4332 System.exe 4332 System.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2252 CrackedDefault.exe Token: SeDebugPrivilege 4332 System.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4332 System.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2252 wrote to memory of 1332 2252 CrackedDefault.exe 90 PID 2252 wrote to memory of 1332 2252 CrackedDefault.exe 90 PID 2252 wrote to memory of 2700 2252 CrackedDefault.exe 91 PID 2252 wrote to memory of 2700 2252 CrackedDefault.exe 91 PID 2700 wrote to memory of 3968 2700 cmd.exe 94 PID 2700 wrote to memory of 3968 2700 cmd.exe 94 PID 1332 wrote to memory of 4524 1332 cmd.exe 95 PID 1332 wrote to memory of 4524 1332 cmd.exe 95 PID 2700 wrote to memory of 4332 2700 cmd.exe 96 PID 2700 wrote to memory of 4332 2700 cmd.exe 96 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\CrackedDefault.exe"C:\Users\Admin\AppData\Local\Temp\CrackedDefault.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "System" /tr '"C:\Users\Admin\AppData\Roaming\System.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "System" /tr '"C:\Users\Admin\AppData\Roaming\System.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:4524
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp9A3C.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:3968
-
-
C:\Users\Admin\AppData\Roaming\System.exe"C:\Users\Admin\AppData\Roaming\System.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4332
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150B
MD55ece186ce9dc0d3c823b64fbc6ff63f1
SHA11b8f32e26296afa55b2d0aedc36cc310656ccaa9
SHA256203d8fa1403772a2193b5098ddedb8bc2c98c7a9f8f80a01ef9a60bb60da73a4
SHA512d8c868d505114b24e33840bca3118e25bb65ca703a7c31706f7cb5d6f7cb79c7d067e1133a6b17dab5d0c0dcd0292f01f47934eb880a4fe828205549735d3be0
-
Filesize
8B
MD5cf759e4c5f14fe3eec41b87ed756cea8
SHA1c27c796bb3c2fac929359563676f4ba1ffada1f5
SHA256c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761
SHA512c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b
-
Filesize
74KB
MD5ee3fa50b70d2796ef1e27f5ece10edbf
SHA1b41fe73491b0a2c2ae2059da96a523c3f5b587ae
SHA256ee497caf223652c226571906ea5623d4a51ddc303d3e1d59443b8da17b7d29da
SHA5124696604820ee75d2a171d6500a04bc4a26449fde6dc170b39f9734944a7fc26e3b4e03cb2d13ae87a9d0270666223c6fd6b3f7f3144b82c3a7392cd656ee2acb