Analysis
-
max time kernel
165s -
max time network
180s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
15-02-2022 10:22
Static task
static1
Behavioral task
behavioral1
Sample
8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe
Resource
win10v2004-en-20220113
General
-
Target
8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe
-
Size
252KB
-
MD5
cddfcb26e8cf825911344503abeed368
-
SHA1
d15ef21fe133d47b2305925acdf139bff417062e
-
SHA256
8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5
-
SHA512
1d1b3e7701cf7d03079d677245980acb92eb1c23076ea2ff3325f4efdaac82cbd62efb0be436320fee2882e1830a34b77960c4cd9ed42bcaa1c159d008fba472
Malware Config
Extracted
revengerat
Nov333
80.82.68.21:3333
RV_MUTEX-FtNHuiGGjjtnxDp
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Beds Protector Packer 1 IoCs
Detects Beds Protector packer used to load .NET malware.
Processes:
resource yara_rule behavioral1/memory/1524-56-0x00000000004B0000-0x00000000004EC000-memory.dmp beds_protector -
RevengeRat Executable 3 IoCs
Processes:
resource yara_rule behavioral1/memory/852-61-0x0000000000400000-0x0000000000408000-memory.dmp revengerat behavioral1/memory/852-62-0x0000000000400000-0x0000000000408000-memory.dmp revengerat behavioral1/memory/852-63-0x0000000000400000-0x0000000000408000-memory.dmp revengerat -
Drops startup file 2 IoCs
Processes:
8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exedescription pid process target process PID 1524 set thread context of 852 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
Processes:
8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exepid process 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exedescription pid process Token: SeDebugPrivilege 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe Token: SeDebugPrivilege 852 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exedescription pid process target process PID 1524 wrote to memory of 852 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe PID 1524 wrote to memory of 852 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe PID 1524 wrote to memory of 852 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe PID 1524 wrote to memory of 852 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe PID 1524 wrote to memory of 852 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe PID 1524 wrote to memory of 852 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe PID 1524 wrote to memory of 852 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe PID 1524 wrote to memory of 852 1524 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe 8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe"C:\Users\Admin\AppData\Local\Temp\8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe"C:\Users\Admin\AppData\Local\Temp\8bf630162e5a475cba1e37f56353169e57083b39b6e7a47ff30f63d228ce9bd5.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:852