Analysis
-
max time kernel
174s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
08-02-2022 17:19
Static task
static1
Behavioral task
behavioral1
Sample
bf34977eea90dc8bd7b5269b47ab2a49cdc0a63276171dffadd91936ba26bd9b.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
bf34977eea90dc8bd7b5269b47ab2a49cdc0a63276171dffadd91936ba26bd9b.exe
Resource
win10v2004-en-20220112
General
-
Target
bf34977eea90dc8bd7b5269b47ab2a49cdc0a63276171dffadd91936ba26bd9b.exe
-
Size
410KB
-
MD5
67e0931fe20e34f2afa338cedfa66748
-
SHA1
1123279edbeca2d1eba565e57edf1ac2f19f056e
-
SHA256
bf34977eea90dc8bd7b5269b47ab2a49cdc0a63276171dffadd91936ba26bd9b
-
SHA512
f03396efa39bf92cb713df3fe94510b42ad2ab709efb4957d6e0ebca56d46b14c9cda063a7fb4b39bdbe1587ade5ed22b881864be5ec93dafbe103e28964f599
Malware Config
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
RevengeRat Executable 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Google Chrome.exe revengerat C:\Users\Admin\AppData\Local\Temp\Google Chrome.exe revengerat -
Executes dropped EXE 2 IoCs
Processes:
1.exeGoogle Chrome.exepid process 3460 1.exe 3548 Google Chrome.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
bf34977eea90dc8bd7b5269b47ab2a49cdc0a63276171dffadd91936ba26bd9b.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation bf34977eea90dc8bd7b5269b47ab2a49cdc0a63276171dffadd91936ba26bd9b.exe -
Drops file in Windows directory 2 IoCs
Processes:
svchost.exeTiWorker.exedescription ioc process File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\DeliveryOptimization\State\keyValueLKG.dat svchost.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
MusNotifyIcon.exedescription ioc process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MusNotifyIcon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MusNotifyIcon.exe -
Modifies data under HKEY_USERS 51 IoCs
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4124" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CacheSizeBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LANConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\GroupConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkUsageBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthID = "2" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.006537" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DODownloadMode = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\KVFileExpirationTime = "132889996585361810" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CDNConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadCount = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "6.756335" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Settings svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthlyUploadRestriction = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadPendingCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "3908" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLinkLocalBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkBps = "1157726" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PeerInfoCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\InternetConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadPendingCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCdnBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LinkLocalConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkBps = "0" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\GeoVersion_EndpointFullUri = "https://geover.prod.do.dsp.mp.microsoft.com/geoversion" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCacheHostBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyGroupBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\FrDownloadRatePct = "90" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DownloadMode_BackCompat = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCdnBytes = "90228624" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkCnt = "4" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthID = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadRatePct = "100" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\Geo_EndpointFullUri = "https://geo.prod.do.dsp.mp.microsoft.com/geo" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkUsageBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\BkDownloadRatePct = "45" svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
TiWorker.exedescription pid process Token: SeSecurityPrivilege 2576 TiWorker.exe Token: SeRestorePrivilege 2576 TiWorker.exe Token: SeBackupPrivilege 2576 TiWorker.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
1.exepid process 3460 1.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
bf34977eea90dc8bd7b5269b47ab2a49cdc0a63276171dffadd91936ba26bd9b.exe1.exeGoogle Chrome.exefondue.exedescription pid process target process PID 1728 wrote to memory of 3460 1728 bf34977eea90dc8bd7b5269b47ab2a49cdc0a63276171dffadd91936ba26bd9b.exe 1.exe PID 1728 wrote to memory of 3460 1728 bf34977eea90dc8bd7b5269b47ab2a49cdc0a63276171dffadd91936ba26bd9b.exe 1.exe PID 1728 wrote to memory of 3460 1728 bf34977eea90dc8bd7b5269b47ab2a49cdc0a63276171dffadd91936ba26bd9b.exe 1.exe PID 1728 wrote to memory of 3548 1728 bf34977eea90dc8bd7b5269b47ab2a49cdc0a63276171dffadd91936ba26bd9b.exe Google Chrome.exe PID 1728 wrote to memory of 3548 1728 bf34977eea90dc8bd7b5269b47ab2a49cdc0a63276171dffadd91936ba26bd9b.exe Google Chrome.exe PID 1728 wrote to memory of 3548 1728 bf34977eea90dc8bd7b5269b47ab2a49cdc0a63276171dffadd91936ba26bd9b.exe Google Chrome.exe PID 3460 wrote to memory of 992 3460 1.exe cmd.exe PID 3460 wrote to memory of 992 3460 1.exe cmd.exe PID 3548 wrote to memory of 3272 3548 Google Chrome.exe fondue.exe PID 3548 wrote to memory of 3272 3548 Google Chrome.exe fondue.exe PID 3548 wrote to memory of 3272 3548 Google Chrome.exe fondue.exe PID 3272 wrote to memory of 3496 3272 fondue.exe FonDUE.EXE PID 3272 wrote to memory of 3496 3272 fondue.exe FonDUE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf34977eea90dc8bd7b5269b47ab2a49cdc0a63276171dffadd91936ba26bd9b.exe"C:\Users\Admin\AppData\Local\Temp\bf34977eea90dc8bd7b5269b47ab2a49cdc0a63276171dffadd91936ba26bd9b.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\356B.tmp\35CA.bat C:\Users\Admin\AppData\Local\Temp\1.exe"3⤵PID:992
-
C:\Users\Admin\AppData\Local\Temp\Google Chrome.exe"C:\Users\Admin\AppData\Local\Temp\Google Chrome.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\fondue.exe"C:\Windows\system32\fondue.exe" /enable-feature:NetFx3 /caller-name:mscoreei.dll3⤵
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Windows\system32\FonDUE.EXE"C:\Windows\sysnative\FonDUE.EXE" /enable-feature:NetFx3 /caller-name:mscoreei.dll4⤵PID:3496
-
C:\Windows\system32\MusNotifyIcon.exe%systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 131⤵
- Checks processor information in registry
PID:3796
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2264
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2576
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
a3fac04d2b602593e891fe8ed94ae41e
SHA1147ca2b095939fa754a7dd7501f08c3c3c814cc5
SHA2564aea50c98f1f732e37ce483073573023fe0f032394958a0dd80ab6464c69af71
SHA51220671feb188de7ee0adf949aead4dd96230eb45017acfd6f18142dc726d08c817ee9e55941892f22e2c6a3eb1aa6b396dd2374ec1b8f5ad87970fdca5ecca859
-
MD5
a3fac04d2b602593e891fe8ed94ae41e
SHA1147ca2b095939fa754a7dd7501f08c3c3c814cc5
SHA2564aea50c98f1f732e37ce483073573023fe0f032394958a0dd80ab6464c69af71
SHA51220671feb188de7ee0adf949aead4dd96230eb45017acfd6f18142dc726d08c817ee9e55941892f22e2c6a3eb1aa6b396dd2374ec1b8f5ad87970fdca5ecca859
-
MD5
333da68f3a2be23a4c9c6ea70567b59c
SHA1912013ba40764b9e44dd0d2bf3e80aed9f1e74ea
SHA2568f17fc9b10ef14a8b0674df229d299b82e069740e3eb11ed88d7428bfcde4a46
SHA512dad3f5ec620c0387850328913367ff61bcd44b6c5df4523fa88fa65467f22a9888ff1316beb15e3ae59606a5ad804d328ef227b9fed8db32576adbf47b0a076e
-
MD5
3b3ad8bd549b9281d23e2a389f8d4612
SHA125bb6cb9f1e2c8d51b03f46e611955ae4c43b5eb
SHA25652a161b50e1d5287dd740d5f4c962b9a654eb632ed4b98fc85378ca72d1a21ff
SHA51217157688ff48d3d26b23a8fc2b158ab28b74a453e8a54a536c3b4c6d01689addb0394a68ff4986b7448bc9fa5072cae22690637f127092b5696bd3a76f2424b2
-
MD5
3b3ad8bd549b9281d23e2a389f8d4612
SHA125bb6cb9f1e2c8d51b03f46e611955ae4c43b5eb
SHA25652a161b50e1d5287dd740d5f4c962b9a654eb632ed4b98fc85378ca72d1a21ff
SHA51217157688ff48d3d26b23a8fc2b158ab28b74a453e8a54a536c3b4c6d01689addb0394a68ff4986b7448bc9fa5072cae22690637f127092b5696bd3a76f2424b2