Analysis
-
max time kernel
96s -
max time network
101s -
platform
windows11-21h2_x64 -
resource
win11-20250313-en -
resource tags
arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system -
submitted
30/03/2025, 14:55
Static task
static1
Behavioral task
behavioral1
Sample
MarlbotV4.exe
Resource
win11-20250313-en
General
-
Target
MarlbotV4.exe
-
Size
394.0MB
-
MD5
f3cbe54ca8c7aabd1322a7418981f519
-
SHA1
fb42365dcc73e577374be4a12cfd73466f58f068
-
SHA256
fa1453d9a47f699d10b4b35cbdfb63d78529b4ee73256e64362f25584520d6c5
-
SHA512
9f225a8ec5de4ace70159e0f6e759a9b616ad833997bc19c458504c1eda3db8ce5622542edc29c2685d045fac96b79ed1fb80a106687e856811a813d3dfca5f9
-
SSDEEP
1536:mUrwcx3bxACE/PMVSe9VdQuDI6H1bf/K0oQzcyLVclN:mUscx3bqv/PMVSe9VdQsH1bf0QjBY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
1st People
193.161.193.99:56266
75686758786
-
delay
1
-
install
false
-
install_file
12345
-
install_folder
%Temp%
Signatures
-
Asyncrat family
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe -
Modifies registry class 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3712238951-2226310826-298817577-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3712238951-2226310826-298817577-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3712238951-2226310826-298817577-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" BackgroundTransferHost.exe Key created \REGISTRY\USER\S-1-5-21-3712238951-2226310826-298817577-1000_Classes\Local Settings\MuiCache BackgroundTransferHost.exe Key created \REGISTRY\USER\S-1-5-21-3712238951-2226310826-298817577-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.WindowsTerminal_8wekyb3d8bbwe\StartTerminalOnLoginTask taskmgr.exe Key created \REGISTRY\USER\S-1-5-21-3712238951-2226310826-298817577-1000_Classes\Local Settings taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe 5180 MarlbotV4.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 5180 MarlbotV4.exe Token: SeDebugPrivilege 3144 taskmgr.exe Token: SeSystemProfilePrivilege 3144 taskmgr.exe Token: SeCreateGlobalPrivilege 3144 taskmgr.exe Token: 33 3144 taskmgr.exe Token: SeIncBasePriorityPrivilege 3144 taskmgr.exe -
Suspicious use of FindShellTrayWindow 63 IoCs
pid Process 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe -
Suspicious use of SendNotifyMessage 63 IoCs
pid Process 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5180 MarlbotV4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\MarlbotV4.exe"C:\Users\Admin\AppData\Local\Temp\MarlbotV4.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5180
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.131⤵
- Modifies registry class
PID:5940
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3144
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5300
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\c8916d43-1697-4b1a-8c05-1d505e6661c5.down_data
Filesize555KB
MD55683c0028832cae4ef93ca39c8ac5029
SHA1248755e4e1db552e0b6f8651b04ca6d1b31a86fb
SHA256855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e
SHA512aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3