Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
11-03-2022 04:13
Static task
static1
Behavioral task
behavioral1
Sample
3ef00155baeabbeb0ef1c43d331acc59cf051bfe03257679afe23555743ec898.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
3ef00155baeabbeb0ef1c43d331acc59cf051bfe03257679afe23555743ec898.exe
Resource
win10v2004-en-20220113
General
-
Target
3ef00155baeabbeb0ef1c43d331acc59cf051bfe03257679afe23555743ec898.exe
-
Size
3.4MB
-
MD5
a0831b1b18e7f3fc23ab72b2d4ee8bff
-
SHA1
bf53a73c0b14425c4c2df960613c22a5bdd5a172
-
SHA256
3ef00155baeabbeb0ef1c43d331acc59cf051bfe03257679afe23555743ec898
-
SHA512
78db962ba5bdfc66a11df57190e56fc6c006d1048467537b96a1d1f54b6335258910cbacc1ca5de3532130bbcf80816fa0ef6fab07bf056c25b3c38535342f8c
Malware Config
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
RevengeRat Executable 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\svchost .exe revengerat C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\svchost .exe revengerat -
Executes dropped EXE 3 IoCs
Processes:
CDS.execrypted.exesvchost .exepid process 940 CDS.exe 2476 crypted.exe 4364 svchost .exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
CDS.execrypted.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation CDS.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation crypted.exe -
Loads dropped DLL 1 IoCs
Processes:
CDS.exepid process 940 CDS.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
3ef00155baeabbeb0ef1c43d331acc59cf051bfe03257679afe23555743ec898.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3ef00155baeabbeb0ef1c43d331acc59cf051bfe03257679afe23555743ec898.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3ef00155baeabbeb0ef1c43d331acc59cf051bfe03257679afe23555743ec898.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
CDS.exepid process 940 CDS.exe 940 CDS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
AUDIODG.EXEdescription pid process Token: 33 1340 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1340 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
CDS.exepid process 940 CDS.exe 940 CDS.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
3ef00155baeabbeb0ef1c43d331acc59cf051bfe03257679afe23555743ec898.exeCDS.execrypted.exesvchost .exefondue.exedescription pid process target process PID 608 wrote to memory of 940 608 3ef00155baeabbeb0ef1c43d331acc59cf051bfe03257679afe23555743ec898.exe CDS.exe PID 608 wrote to memory of 940 608 3ef00155baeabbeb0ef1c43d331acc59cf051bfe03257679afe23555743ec898.exe CDS.exe PID 608 wrote to memory of 940 608 3ef00155baeabbeb0ef1c43d331acc59cf051bfe03257679afe23555743ec898.exe CDS.exe PID 940 wrote to memory of 2476 940 CDS.exe crypted.exe PID 940 wrote to memory of 2476 940 CDS.exe crypted.exe PID 940 wrote to memory of 2476 940 CDS.exe crypted.exe PID 2476 wrote to memory of 4364 2476 crypted.exe svchost .exe PID 2476 wrote to memory of 4364 2476 crypted.exe svchost .exe PID 2476 wrote to memory of 4364 2476 crypted.exe svchost .exe PID 4364 wrote to memory of 3716 4364 svchost .exe fondue.exe PID 4364 wrote to memory of 3716 4364 svchost .exe fondue.exe PID 4364 wrote to memory of 3716 4364 svchost .exe fondue.exe PID 3716 wrote to memory of 3448 3716 fondue.exe FonDUE.EXE PID 3716 wrote to memory of 3448 3716 fondue.exe FonDUE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ef00155baeabbeb0ef1c43d331acc59cf051bfe03257679afe23555743ec898.exe"C:\Users\Admin\AppData\Local\Temp\3ef00155baeabbeb0ef1c43d331acc59cf051bfe03257679afe23555743ec898.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:608 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CDS.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CDS.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\crypted.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\crypted.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\svchost .exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\svchost .exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\fondue.exe"C:\Windows\system32\fondue.exe" /enable-feature:NetFx3 /caller-name:mscoreei.dll5⤵
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\system32\FonDUE.EXE"C:\Windows\sysnative\FonDUE.EXE" /enable-feature:NetFx3 /caller-name:mscoreei.dll6⤵PID:3448
-
-
-
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x444 0x2ec1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1340
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
340b294efc691d1b20c64175d565ebc7
SHA181cb9649bd1c9a62ae79e781818fc24d15c29ce7
SHA25672566894059452101ea836bbff9ede5069141eeb52022ab55baa24e1666825c9
SHA5121395a8e175c63a1a1ff459a9dac437156c74299272e020e7e078a087969251a8534f17244a529acbc1b6800a97d4c0abfa3c88f6fcb88423f56dfaae9b49fc3d
-
MD5
3e7ecaeb51c2812d13b07ec852d74aaf
SHA1e9bdab93596ffb0f7f8c65243c579180939acb26
SHA256e7e942993864e8b18780ef10a415f7b93924c6378248c52f0c96895735222b96
SHA512635cd5173b595f1905af9eeea65037601cf8496d519c506b6d082662d438c26a1bfe653eaf6edcb117ccf8767975c37ab0238ca4c77574e2706f9b238a15ad4d
-
MD5
424bf196deaeb4ddcafb78e137fa560a
SHA1007738e9486c904a3115daa6e8ba2ee692af58c8
SHA2560963cef2f742a31b2604fe975f4471ae6a76641490fe60805db744fef9bdd5d2
SHA512a9be6dd5b2ed84baea34e0f1b1e8f5388ce3662c5dcb6a80c2d175be95f9598312837420c07b52cdfaa9e94bcffd8c7a2b9db2b551dfac171bce4b92f466e797
-
MD5
424bf196deaeb4ddcafb78e137fa560a
SHA1007738e9486c904a3115daa6e8ba2ee692af58c8
SHA2560963cef2f742a31b2604fe975f4471ae6a76641490fe60805db744fef9bdd5d2
SHA512a9be6dd5b2ed84baea34e0f1b1e8f5388ce3662c5dcb6a80c2d175be95f9598312837420c07b52cdfaa9e94bcffd8c7a2b9db2b551dfac171bce4b92f466e797
-
MD5
2603651c31712cd66e76ca0f4c9501a9
SHA187cebfa0012cc4921c422012c90240148e43cfc8
SHA256237c21113107da961ea74c6ed94622f37f3d6914d93c1581f3498e6a70ad1139
SHA5126ec898583c9f11dc3be728e91f4dd73fc85c7b4a7c0f5a2ed5c174aeb8eacee35cf305aaad305a14c27dd0fe5338cec793e032a5af66a462ecdfd2534c1365e4
-
MD5
c24a867d37fa97e89dadb45c3e4c6354
SHA1fbef4040731505a2cdc5033443264af3a63a8b6c
SHA2564a0910362b77d913eac9e9e9c5318e0c00d00b41b949edbb3d1b9d618ada8762
SHA512bac83149ecf57c263ef71a940e271bc8e7f06c24a8513dec903c83b81798f002a265743d6ef0e1da85ca249bd441e715b5df9012b1202cc6a63d06f3740973f8
-
MD5
c24a867d37fa97e89dadb45c3e4c6354
SHA1fbef4040731505a2cdc5033443264af3a63a8b6c
SHA2564a0910362b77d913eac9e9e9c5318e0c00d00b41b949edbb3d1b9d618ada8762
SHA512bac83149ecf57c263ef71a940e271bc8e7f06c24a8513dec903c83b81798f002a265743d6ef0e1da85ca249bd441e715b5df9012b1202cc6a63d06f3740973f8
-
MD5
68934a3e9455fa72420237eb05902327
SHA17cb6efb98ba5972a9b5090dc2e517fe14d12cb04
SHA256fcbcf165908dd18a9e49f7ff27810176db8e9f63b4352213741664245224f8aa
SHA512719fa67eef49c4b2a2b83f0c62bddd88c106aaadb7e21ae057c8802b700e36f81fe3f144812d8b05d66dc663d908b25645e153262cf6d457aa34e684af9e328d
-
MD5
c3256800dce47c14acc83ccca4c3e2ac
SHA19d126818c66991dbc3813a65eddb88bbcf77f30a
SHA256f26f4f66022acc96d0319c09814ebeda60f4ab96b63b6262045dc786dc7c5866
SHA5126865a98ad8a6bd02d1ba35a28b36b6306af393f5e9ad767cd6da027bb021f7399d629423f510c44436ac3e4603b6c606493edf8b14d21fabf3eab16d37bd0d25
-
MD5
c3256800dce47c14acc83ccca4c3e2ac
SHA19d126818c66991dbc3813a65eddb88bbcf77f30a
SHA256f26f4f66022acc96d0319c09814ebeda60f4ab96b63b6262045dc786dc7c5866
SHA5126865a98ad8a6bd02d1ba35a28b36b6306af393f5e9ad767cd6da027bb021f7399d629423f510c44436ac3e4603b6c606493edf8b14d21fabf3eab16d37bd0d25
-
MD5
a2759f9c14db433576e4e7d6d6577c9c
SHA1724922f4428a6c5084a4792441d232bd137dce03
SHA2567ff2eacfe2858e07955bed332fce208a07c7f42392f624cf5c09ea47d239f7f2
SHA51262bb8132a95b14085194d982ff84aae11d5c5ca27c10f8477f6838477f316af78a2c091387298ea07915402047f077e56f741c79e9168ebd1ad1eb4b903ca633
-
MD5
a2759f9c14db433576e4e7d6d6577c9c
SHA1724922f4428a6c5084a4792441d232bd137dce03
SHA2567ff2eacfe2858e07955bed332fce208a07c7f42392f624cf5c09ea47d239f7f2
SHA51262bb8132a95b14085194d982ff84aae11d5c5ca27c10f8477f6838477f316af78a2c091387298ea07915402047f077e56f741c79e9168ebd1ad1eb4b903ca633