Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
07-06-2021 05:41
Static task
static1
Behavioral task
behavioral1
Sample
Swift MT103 & Bank Details,pdf.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Swift MT103 & Bank Details,pdf.exe
Resource
win10v20210410
General
-
Target
Swift MT103 & Bank Details,pdf.exe
-
Size
783KB
-
MD5
c7b6950fc14795d0c9df548d62ccbf78
-
SHA1
5c8bd970726639a931d011123c7dd7cb3bb91352
-
SHA256
f24016eadd5ac1e6ce3822d0ffb92459e9455fcf15fa93703e5cddb34151ad98
-
SHA512
e033ee11b5fabe72f9cbf11b9af8b701300ee4d6955ce1b6a72b25fcdcf29149e4d1d2e370a53d75a4180ece064d383f1622f141123abdeed8017e01b6c34009
Malware Config
Extracted
revengerat
BILLION
rej.rejgroups.com:4040
RV_MUTEX-Y6F7MMH6M66HDLJMYP6B6P
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Swift MT103 & Bank Details,pdf.exedescription pid process target process PID 360 set thread context of 1548 360 Swift MT103 & Bank Details,pdf.exe Swift MT103 & Bank Details,pdf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Swift MT103 & Bank Details,pdf.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 Swift MT103 & Bank Details,pdf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CENTRALPROCESSOR\0\ProcessorNameString Swift MT103 & Bank Details,pdf.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Swift MT103 & Bank Details,pdf.exedescription pid process Token: SeDebugPrivilege 360 Swift MT103 & Bank Details,pdf.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
Swift MT103 & Bank Details,pdf.exedescription pid process target process PID 360 wrote to memory of 732 360 Swift MT103 & Bank Details,pdf.exe schtasks.exe PID 360 wrote to memory of 732 360 Swift MT103 & Bank Details,pdf.exe schtasks.exe PID 360 wrote to memory of 732 360 Swift MT103 & Bank Details,pdf.exe schtasks.exe PID 360 wrote to memory of 732 360 Swift MT103 & Bank Details,pdf.exe schtasks.exe PID 360 wrote to memory of 1548 360 Swift MT103 & Bank Details,pdf.exe Swift MT103 & Bank Details,pdf.exe PID 360 wrote to memory of 1548 360 Swift MT103 & Bank Details,pdf.exe Swift MT103 & Bank Details,pdf.exe PID 360 wrote to memory of 1548 360 Swift MT103 & Bank Details,pdf.exe Swift MT103 & Bank Details,pdf.exe PID 360 wrote to memory of 1548 360 Swift MT103 & Bank Details,pdf.exe Swift MT103 & Bank Details,pdf.exe PID 360 wrote to memory of 1548 360 Swift MT103 & Bank Details,pdf.exe Swift MT103 & Bank Details,pdf.exe PID 360 wrote to memory of 1548 360 Swift MT103 & Bank Details,pdf.exe Swift MT103 & Bank Details,pdf.exe PID 360 wrote to memory of 1548 360 Swift MT103 & Bank Details,pdf.exe Swift MT103 & Bank Details,pdf.exe PID 360 wrote to memory of 1548 360 Swift MT103 & Bank Details,pdf.exe Swift MT103 & Bank Details,pdf.exe PID 360 wrote to memory of 1548 360 Swift MT103 & Bank Details,pdf.exe Swift MT103 & Bank Details,pdf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Swift MT103 & Bank Details,pdf.exe"C:\Users\Admin\AppData\Local\Temp\Swift MT103 & Bank Details,pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:360 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\dquwpruzUz" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFBEC.tmp"2⤵
- Creates scheduled task(s)
PID:732
-
-
C:\Users\Admin\AppData\Local\Temp\Swift MT103 & Bank Details,pdf.exe"C:\Users\Admin\AppData\Local\Temp\Swift MT103 & Bank Details,pdf.exe"2⤵
- Checks processor information in registry
PID:1548
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
97613dd2e0236c537a6506b531c8cf22
SHA15e5947523cbd2a7efa41a1e526bea38eb8bb9753
SHA2569f7eeb679c70bd300ccfa01b8f52fee7fc6e9e7255dafec3881c6c67db83a478
SHA5124983c0676491ec7dbc036f51853e22654cb381dfa52949b446918ced57a165c0e490118f308cd8958e77f23de9e8fd3a0635c3dcfb79491a966b80b07cffd3ee