Analysis
-
max time kernel
130s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
07-03-2022 11:10
Static task
static1
Behavioral task
behavioral1
Sample
111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe
Resource
win10v2004-en-20220113
General
-
Target
111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe
-
Size
99KB
-
MD5
36f59c964d963935ae77621ca6e57a41
-
SHA1
a81fba0cedfba66d84ffe2d2fd0b3803b099cbfc
-
SHA256
111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd
-
SHA512
b7518ef642eb62c836ba8ea4256d815c877490b1e68906c2f099f7f484380eba22e6cbec6bcb61af4611f52218306993a356017f0c196fada2d6380f2bcd4c63
Malware Config
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
RevengeRat Executable 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1704-136-0x0000000000390000-0x00000000003A6000-memory.dmp revengerat behavioral2/memory/1704-139-0x0000000000390000-0x00000000003A6000-memory.dmp revengerat behavioral2/memory/1704-142-0x0000000000390000-0x00000000003A6000-memory.dmp revengerat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exedescription pid process target process PID 376 set thread context of 1704 376 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1200 1704 WerFault.exe 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exedescription pid process target process PID 376 wrote to memory of 1704 376 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe PID 376 wrote to memory of 1704 376 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe PID 376 wrote to memory of 1704 376 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe PID 376 wrote to memory of 1704 376 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe PID 376 wrote to memory of 1704 376 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe PID 376 wrote to memory of 1704 376 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe PID 376 wrote to memory of 1704 376 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe PID 376 wrote to memory of 1704 376 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe PID 376 wrote to memory of 1704 376 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe 111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe"C:\Users\Admin\AppData\Local\Temp\111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Users\Admin\AppData\Local\Temp\111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd.exe"{path}"2⤵PID:1704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1704 -s 2003⤵
- Program crash
PID:1200
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1704 -ip 17041⤵PID:2180