Analysis
-
max time kernel
4294215s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
07-03-2022 11:10
Static task
static1
Behavioral task
behavioral1
Sample
111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe
Resource
win10v2004-en-20220113
General
-
Target
111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe
-
Size
99KB
-
MD5
36f59c964d963935ae77621ca6e57a41
-
SHA1
a81fba0cedfba66d84ffe2d2fd0b3803b099cbfc
-
SHA256
111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd
-
SHA512
b7518ef642eb62c836ba8ea4256d815c877490b1e68906c2f099f7f484380eba22e6cbec6bcb61af4611f52218306993a356017f0c196fada2d6380f2bcd4c63
Malware Config
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
RevengeRat Executable 5 IoCs
Processes:
resource yara_rule behavioral1/memory/572-63-0x0000000000400000-0x0000000000416000-memory.dmp revengerat behavioral1/memory/572-65-0x0000000000400000-0x0000000000416000-memory.dmp revengerat behavioral1/memory/572-67-0x0000000000400000-0x0000000000416000-memory.dmp revengerat behavioral1/memory/572-69-0x0000000000400000-0x0000000000416000-memory.dmp revengerat behavioral1/memory/572-71-0x0000000000400000-0x0000000000416000-memory.dmp revengerat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exedescription pid process target process PID 804 set thread context of 572 804 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exedescription pid process Token: SeDebugPrivilege 572 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exedescription pid process target process PID 804 wrote to memory of 572 804 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe PID 804 wrote to memory of 572 804 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe PID 804 wrote to memory of 572 804 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe PID 804 wrote to memory of 572 804 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe PID 804 wrote to memory of 572 804 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe PID 804 wrote to memory of 572 804 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe PID 804 wrote to memory of 572 804 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe PID 804 wrote to memory of 572 804 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe PID 804 wrote to memory of 572 804 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe PID 804 wrote to memory of 572 804 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe"C:\Users\Admin\AppData\Local\Temp\111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Users\Admin\AppData\Local\Temp\111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe"{path}"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:572
-