Analysis

  • max time kernel
    52s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    19-12-2020 12:40

General

  • Target

    df85f50f72f850fb70d6464e17053c4a.exe

  • Size

    23KB

  • MD5

    df85f50f72f850fb70d6464e17053c4a

  • SHA1

    13962c04bafe361466cce63abd389f9ce149debb

  • SHA256

    fe614080646708a020532d8dac57d96767d07ac9f605e86ba306dbfd8f9d51cf

  • SHA512

    da2800fd3b91d99b09f44a22a2b9cd9da523d4b366ae2c0d62eeb0fc33fb9e5a0ecb96b9a6212eec070897f74672d24d312194aa4c04ee6863c3f08388618b6e

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • RevengeRat Executable 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df85f50f72f850fb70d6464e17053c4a.exe
    "C:\Users\Admin\AppData\Local\Temp\df85f50f72f850fb70d6464e17053c4a.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1068
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c timeout 4
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:848
      • C:\Windows\SysWOW64\timeout.exe
        timeout 4
        3⤵
        • Delays execution with timeout.exe
        PID:1972
    • C:\Users\Admin\AppData\Local\Temp\df85f50f72f850fb70d6464e17053c4a.exe
      "C:\Users\Admin\AppData\Local\Temp\df85f50f72f850fb70d6464e17053c4a.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:436
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Roaming\System32
        3⤵
        • Modifies registry class
        PID:1172

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/436-9-0x000000000040F67E-mapping.dmp
  • memory/436-8-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/436-10-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/436-11-0x0000000074EE0000-0x00000000755CE000-memory.dmp
    Filesize

    6.9MB

  • memory/848-5-0x0000000000000000-mapping.dmp
  • memory/1068-2-0x0000000074EE0000-0x00000000755CE000-memory.dmp
    Filesize

    6.9MB

  • memory/1068-3-0x0000000000B40000-0x0000000000B41000-memory.dmp
    Filesize

    4KB

  • memory/1068-7-0x0000000000730000-0x0000000000754000-memory.dmp
    Filesize

    144KB

  • memory/1172-14-0x0000000000000000-mapping.dmp
  • memory/1972-6-0x0000000000000000-mapping.dmp