Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2025, 19:12
Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20240903-en
General
-
Target
Client.exe
-
Size
74KB
-
MD5
ca869fce5d4ea896845c9faf30777df7
-
SHA1
23d7c3ed8b2d961b0c43c9dc09688f5f5c2412a0
-
SHA256
35195c489db28ef0062c2f87918bfebb2b49324dc1bc428b72abb6fb003f5aa7
-
SHA512
103f93419955fbb3401409b2109d59316c0f4e2d3ba474501d91d4f3b3feaef68fc770e97274663f1e904870a7e3d77515c6d8f43bcf3b27b4510b2a419cb1c9
-
SSDEEP
1536:8UUPcxVteCW7PMVee9VdQuDI6H1bf/Eq14bTzQzcBLVclN:8UmcxV4x7PMVee9VdQsH1bf/0QYBY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
132.145.75.68:5450
nbonbvmijrwjbil
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
UAC bypass 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\consentpromptbehavioradmin = "0" Client.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\enablelua = "0" Client.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\promptonsecuredesktop = "0" Client.exe -
resource yara_rule behavioral2/memory/5316-1-0x0000000000520000-0x0000000000538000-memory.dmp VenomRAT -
Venomrat family
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks whether UAC is enabled 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\enablelua = "0" Client.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\enablelua Client.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 5316 Client.exe 5316 Client.exe 5316 Client.exe 5316 Client.exe 5316 Client.exe 5316 Client.exe 5316 Client.exe 5316 Client.exe 5316 Client.exe 5316 Client.exe 5316 Client.exe 5316 Client.exe 5316 Client.exe 5316 Client.exe 5316 Client.exe 5316 Client.exe 5316 Client.exe 5316 Client.exe 5316 Client.exe 5316 Client.exe 5316 Client.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5316 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5316 Client.exe -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\consentpromptbehavioradmin = "0" Client.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\enablelua = "0" Client.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\promptonsecuredesktop = "0" Client.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.