Analysis

  • max time kernel
    4294215s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20220223-en
  • submitted
    07-03-2022 11:10

General

  • Target

    111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe

  • Size

    99KB

  • MD5

    36f59c964d963935ae77621ca6e57a41

  • SHA1

    a81fba0cedfba66d84ffe2d2fd0b3803b099cbfc

  • SHA256

    111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd

  • SHA512

    b7518ef642eb62c836ba8ea4256d815c877490b1e68906c2f099f7f484380eba22e6cbec6bcb61af4611f52218306993a356017f0c196fada2d6380f2bcd4c63

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • RevengeRat Executable 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe
    "C:\Users\Admin\AppData\Local\Temp\111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:804
    • C:\Users\Admin\AppData\Local\Temp\111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe
      "{path}"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:572

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/572-67-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/572-65-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/572-73-0x00000000003C0000-0x00000000003C1000-memory.dmp

    Filesize

    4KB

  • memory/572-72-0x0000000074E50000-0x000000007553E000-memory.dmp

    Filesize

    6.9MB

  • memory/572-71-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/572-59-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/572-63-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/572-61-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/572-69-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/804-54-0x0000000001370000-0x0000000001392000-memory.dmp

    Filesize

    136KB

  • memory/804-55-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

  • memory/804-58-0x0000000000290000-0x000000000029C000-memory.dmp

    Filesize

    48KB

  • memory/804-57-0x0000000004950000-0x0000000004951000-memory.dmp

    Filesize

    4KB

  • memory/804-56-0x0000000074E90000-0x000000007557E000-memory.dmp

    Filesize

    6.9MB