Analysis
-
max time kernel
51s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
19-12-2020 12:40
Static task
static1
Behavioral task
behavioral1
Sample
df85f50f72f850fb70d6464e17053c4a.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
df85f50f72f850fb70d6464e17053c4a.exe
Resource
win10v20201028
General
-
Target
df85f50f72f850fb70d6464e17053c4a.exe
-
Size
23KB
-
MD5
df85f50f72f850fb70d6464e17053c4a
-
SHA1
13962c04bafe361466cce63abd389f9ce149debb
-
SHA256
fe614080646708a020532d8dac57d96767d07ac9f605e86ba306dbfd8f9d51cf
-
SHA512
da2800fd3b91d99b09f44a22a2b9cd9da523d4b366ae2c0d62eeb0fc33fb9e5a0ecb96b9a6212eec070897f74672d24d312194aa4c04ee6863c3f08388618b6e
Malware Config
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
RevengeRat Executable 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3440-10-0x0000000000400000-0x0000000000416000-memory.dmp revengerat behavioral2/memory/3440-11-0x000000000040F67E-mapping.dmp revengerat behavioral2/memory/3440-12-0x0000000000400000-0x0000000000416000-memory.dmp revengerat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
df85f50f72f850fb70d6464e17053c4a.exedescription pid process target process PID 496 set thread context of 3440 496 df85f50f72f850fb70d6464e17053c4a.exe df85f50f72f850fb70d6464e17053c4a.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 912 timeout.exe -
Modifies registry class 2 IoCs
Processes:
df85f50f72f850fb70d6464e17053c4a.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings df85f50f72f850fb70d6464e17053c4a.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
df85f50f72f850fb70d6464e17053c4a.exedf85f50f72f850fb70d6464e17053c4a.exedescription pid process Token: SeDebugPrivilege 496 df85f50f72f850fb70d6464e17053c4a.exe Token: SeDebugPrivilege 3440 df85f50f72f850fb70d6464e17053c4a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 2160 OpenWith.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
df85f50f72f850fb70d6464e17053c4a.execmd.exedescription pid process target process PID 496 wrote to memory of 3336 496 df85f50f72f850fb70d6464e17053c4a.exe cmd.exe PID 496 wrote to memory of 3336 496 df85f50f72f850fb70d6464e17053c4a.exe cmd.exe PID 496 wrote to memory of 3336 496 df85f50f72f850fb70d6464e17053c4a.exe cmd.exe PID 3336 wrote to memory of 912 3336 cmd.exe timeout.exe PID 3336 wrote to memory of 912 3336 cmd.exe timeout.exe PID 3336 wrote to memory of 912 3336 cmd.exe timeout.exe PID 496 wrote to memory of 3440 496 df85f50f72f850fb70d6464e17053c4a.exe df85f50f72f850fb70d6464e17053c4a.exe PID 496 wrote to memory of 3440 496 df85f50f72f850fb70d6464e17053c4a.exe df85f50f72f850fb70d6464e17053c4a.exe PID 496 wrote to memory of 3440 496 df85f50f72f850fb70d6464e17053c4a.exe df85f50f72f850fb70d6464e17053c4a.exe PID 496 wrote to memory of 3440 496 df85f50f72f850fb70d6464e17053c4a.exe df85f50f72f850fb70d6464e17053c4a.exe PID 496 wrote to memory of 3440 496 df85f50f72f850fb70d6464e17053c4a.exe df85f50f72f850fb70d6464e17053c4a.exe PID 496 wrote to memory of 3440 496 df85f50f72f850fb70d6464e17053c4a.exe df85f50f72f850fb70d6464e17053c4a.exe PID 496 wrote to memory of 3440 496 df85f50f72f850fb70d6464e17053c4a.exe df85f50f72f850fb70d6464e17053c4a.exe PID 496 wrote to memory of 3440 496 df85f50f72f850fb70d6464e17053c4a.exe df85f50f72f850fb70d6464e17053c4a.exe PID 496 wrote to memory of 3440 496 df85f50f72f850fb70d6464e17053c4a.exe df85f50f72f850fb70d6464e17053c4a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\df85f50f72f850fb70d6464e17053c4a.exe"C:\Users\Admin\AppData\Local\Temp\df85f50f72f850fb70d6464e17053c4a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 42⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\df85f50f72f850fb70d6464e17053c4a.exe"C:\Users\Admin\AppData\Local\Temp\df85f50f72f850fb70d6464e17053c4a.exe"2⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\df85f50f72f850fb70d6464e17053c4a.exe.logMD5
cdbd9fe47c260bed799dafd0bdfc3329
SHA17ec62a94a8d4392bf444dbe0b46a127ff25d9e71
SHA2569f6dff49933c3303e611592c026350bd51269eff8dc54ddab1ded9673217762b
SHA512e6c395f40f2deda16e7a445487e789778d2bf31531dc0b821c9bf830a5395129a64278941415c7684ff65b5e58987ac52f9cd2345c7ed51ef502ea46b658bc0d
-
memory/496-3-0x0000000000FF0000-0x0000000000FF1000-memory.dmpFilesize
4KB
-
memory/496-5-0x0000000005800000-0x0000000005801000-memory.dmpFilesize
4KB
-
memory/496-2-0x0000000073AD0000-0x00000000741BE000-memory.dmpFilesize
6.9MB
-
memory/496-8-0x0000000006BE0000-0x0000000006BE1000-memory.dmpFilesize
4KB
-
memory/496-9-0x0000000006430000-0x0000000006454000-memory.dmpFilesize
144KB
-
memory/912-7-0x0000000000000000-mapping.dmp
-
memory/3336-6-0x0000000000000000-mapping.dmp
-
memory/3440-11-0x000000000040F67E-mapping.dmp
-
memory/3440-12-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/3440-14-0x0000000073AE0000-0x00000000741CE000-memory.dmpFilesize
6.9MB
-
memory/3440-10-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/3440-19-0x0000000005630000-0x0000000005631000-memory.dmpFilesize
4KB