Analysis
-
max time kernel
137s -
max time network
145s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
02-06-2021 08:10
Static task
static1
Behavioral task
behavioral1
Sample
Docs draft comfirm.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Docs draft comfirm.exe
Resource
win10v20210410
General
-
Target
Docs draft comfirm.exe
-
Size
634KB
-
MD5
06b489cf55e5fb333ae93d27b8cfc520
-
SHA1
1d6657688be52c19e80bf600e669b83380418c28
-
SHA256
f2144d80f6316ad2fc3d92b1371e6b10fc620ddf38dc3d231a307627bad15b71
-
SHA512
ce4f269964a19722b29e295a5ee5cb4dac0aca5522e3bb9c82e19970a489015e20104bcd78b5f9cd47cf84aceae7b36715095a07352984158f685f8d41ff09a0
Malware Config
Extracted
revengerat
EVAPIMP
canarybeachhotel.sa:2028
RV_MUTEX-QD45QIW83Y0M3H43IAX1P6
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Docs draft comfirm.exedescription pid process target process PID 1200 set thread context of 1604 1200 Docs draft comfirm.exe Docs draft comfirm.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Docs draft comfirm.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 Docs draft comfirm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CENTRALPROCESSOR\0\ProcessorNameString Docs draft comfirm.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
Docs draft comfirm.exedescription pid process target process PID 1200 wrote to memory of 1604 1200 Docs draft comfirm.exe Docs draft comfirm.exe PID 1200 wrote to memory of 1604 1200 Docs draft comfirm.exe Docs draft comfirm.exe PID 1200 wrote to memory of 1604 1200 Docs draft comfirm.exe Docs draft comfirm.exe PID 1200 wrote to memory of 1604 1200 Docs draft comfirm.exe Docs draft comfirm.exe PID 1200 wrote to memory of 1604 1200 Docs draft comfirm.exe Docs draft comfirm.exe PID 1200 wrote to memory of 1604 1200 Docs draft comfirm.exe Docs draft comfirm.exe PID 1200 wrote to memory of 1604 1200 Docs draft comfirm.exe Docs draft comfirm.exe PID 1200 wrote to memory of 1604 1200 Docs draft comfirm.exe Docs draft comfirm.exe PID 1200 wrote to memory of 1604 1200 Docs draft comfirm.exe Docs draft comfirm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Docs draft comfirm.exe"C:\Users\Admin\AppData\Local\Temp\Docs draft comfirm.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\Docs draft comfirm.exe"C:\Users\Admin\AppData\Local\Temp\Docs draft comfirm.exe"2⤵
- Checks processor information in registry
PID:1604
-