Analysis
-
max time kernel
33s -
max time network
44s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2025, 19:31
Behavioral task
behavioral1
Sample
d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral2
Sample
d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe
Resource
win11-20250411-en
General
-
Target
d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe
-
Size
64KB
-
MD5
f0bc806f92a08b14dd568e811cd3a8ac
-
SHA1
d9dba094c1f26453831541c1501394c783705e4e
-
SHA256
d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20
-
SHA512
38cccfb9d258acfb61683646d7eca5c3a9e5d76b7d241bb5fa88eedbac68458051928ba53f4e6b9a1c9148ed7fad11121c9b0b21751a50c4c60bac5f4a4e5c4f
-
SSDEEP
768:NyG15SlluPvpiPz1Aif9JGXHFhrIeaVk1+gGCv7mqb2nNpwH1ouRSLPakhPGdT4P:UGNv+VsqkmGbbCw2C+GdT4pqKmY7
Malware Config
Extracted
asyncrat
5.0.5
Venom Clients
127.0.0.1:51048
january-proposal.gl.at.ply.gg:51048
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
true
-
install_file
Anydesk.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1900 d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe Token: SeSecurityPrivilege 1900 d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe Token: SeTakeOwnershipPrivilege 1900 d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe Token: SeLoadDriverPrivilege 1900 d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe Token: SeSystemProfilePrivilege 1900 d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe Token: SeSystemtimePrivilege 1900 d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe Token: SeProfSingleProcessPrivilege 1900 d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe Token: SeIncBasePriorityPrivilege 1900 d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe Token: SeCreatePagefilePrivilege 1900 d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe Token: SeBackupPrivilege 1900 d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe Token: SeRestorePrivilege 1900 d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe Token: SeShutdownPrivilege 1900 d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe Token: SeDebugPrivilege 1900 d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe Token: SeSystemEnvironmentPrivilege 1900 d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe Token: SeRemoteShutdownPrivilege 1900 d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe Token: SeUndockPrivilege 1900 d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe Token: SeManageVolumePrivilege 1900 d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe Token: 33 1900 d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe Token: 34 1900 d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe Token: 35 1900 d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe Token: 36 1900 d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe