Analysis
-
max time kernel
2s -
platform
windows11-21h2_x64 -
resource
win11-20250411-en -
resource tags
arch:x64arch:x86image:win11-20250411-enlocale:en-usos:windows11-21h2-x64system -
submitted
21/04/2025, 19:31
Behavioral task
behavioral1
Sample
d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral2
Sample
d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe
Resource
win11-20250411-en
General
-
Target
d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe
-
Size
64KB
-
MD5
f0bc806f92a08b14dd568e811cd3a8ac
-
SHA1
d9dba094c1f26453831541c1501394c783705e4e
-
SHA256
d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20
-
SHA512
38cccfb9d258acfb61683646d7eca5c3a9e5d76b7d241bb5fa88eedbac68458051928ba53f4e6b9a1c9148ed7fad11121c9b0b21751a50c4c60bac5f4a4e5c4f
-
SSDEEP
768:NyG15SlluPvpiPz1Aif9JGXHFhrIeaVk1+gGCv7mqb2nNpwH1ouRSLPakhPGdT4P:UGNv+VsqkmGbbCw2C+GdT4pqKmY7
Malware Config
Extracted
asyncrat
5.0.5
Venom Clients
127.0.0.1:51048
january-proposal.gl.at.ply.gg:51048
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
true
-
install_file
Anydesk.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2552 d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe Token: SeSecurityPrivilege 2552 d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe Token: SeTakeOwnershipPrivilege 2552 d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe Token: SeLoadDriverPrivilege 2552 d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe Token: SeSystemProfilePrivilege 2552 d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe Token: SeSystemtimePrivilege 2552 d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe Token: SeProfSingleProcessPrivilege 2552 d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe Token: SeIncBasePriorityPrivilege 2552 d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe Token: SeCreatePagefilePrivilege 2552 d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe Token: SeBackupPrivilege 2552 d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe Token: SeRestorePrivilege 2552 d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe Token: SeShutdownPrivilege 2552 d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe Token: SeDebugPrivilege 2552 d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe Token: SeSystemEnvironmentPrivilege 2552 d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe Token: SeRemoteShutdownPrivilege 2552 d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe Token: SeUndockPrivilege 2552 d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe Token: SeManageVolumePrivilege 2552 d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe Token: 33 2552 d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe Token: 34 2552 d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe Token: 35 2552 d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe Token: 36 2552 d35d9050fd7852e8e658c538e32f596f491f90bbe92dbe3aa2306c9805055e20.exe