Analysis
-
max time kernel
4294221s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
19-03-2022 23:03
Static task
static1
Behavioral task
behavioral1
Sample
fb2da9f629fd5c61ab198a079218e281b5c32be693b733cb63eaaf07203a2b65.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
fb2da9f629fd5c61ab198a079218e281b5c32be693b733cb63eaaf07203a2b65.exe
Resource
win10v2004-en-20220113
General
-
Target
fb2da9f629fd5c61ab198a079218e281b5c32be693b733cb63eaaf07203a2b65.exe
-
Size
556KB
-
MD5
5dac4954e8c9d4415b14e0e80fc1b409
-
SHA1
324235096176442eead12015467597c175f1b002
-
SHA256
fb2da9f629fd5c61ab198a079218e281b5c32be693b733cb63eaaf07203a2b65
-
SHA512
ffdb33904be0297e97bd29b0e83a2a0ba9c2952219e8364edaf420cf8d3ae61ffc017e17b53f1acac3d57448715c5c6fc59adef6b127408493ac308b94ffe662
Malware Config
Extracted
revengerat
NyanCatRevenge
github-58677.portmap.io:58677
d9b2ac78f4944456
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
fb2da9f629fd5c61ab198a079218e281b5c32be693b733cb63eaaf07203a2b65.exedescription pid process target process PID 1556 set thread context of 1140 1556 fb2da9f629fd5c61ab198a079218e281b5c32be693b733cb63eaaf07203a2b65.exe fb2da9f629fd5c61ab198a079218e281b5c32be693b733cb63eaaf07203a2b65.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
fb2da9f629fd5c61ab198a079218e281b5c32be693b733cb63eaaf07203a2b65.exedescription pid process target process PID 1556 wrote to memory of 1140 1556 fb2da9f629fd5c61ab198a079218e281b5c32be693b733cb63eaaf07203a2b65.exe fb2da9f629fd5c61ab198a079218e281b5c32be693b733cb63eaaf07203a2b65.exe PID 1556 wrote to memory of 1140 1556 fb2da9f629fd5c61ab198a079218e281b5c32be693b733cb63eaaf07203a2b65.exe fb2da9f629fd5c61ab198a079218e281b5c32be693b733cb63eaaf07203a2b65.exe PID 1556 wrote to memory of 1140 1556 fb2da9f629fd5c61ab198a079218e281b5c32be693b733cb63eaaf07203a2b65.exe fb2da9f629fd5c61ab198a079218e281b5c32be693b733cb63eaaf07203a2b65.exe PID 1556 wrote to memory of 1140 1556 fb2da9f629fd5c61ab198a079218e281b5c32be693b733cb63eaaf07203a2b65.exe fb2da9f629fd5c61ab198a079218e281b5c32be693b733cb63eaaf07203a2b65.exe PID 1556 wrote to memory of 1140 1556 fb2da9f629fd5c61ab198a079218e281b5c32be693b733cb63eaaf07203a2b65.exe fb2da9f629fd5c61ab198a079218e281b5c32be693b733cb63eaaf07203a2b65.exe PID 1556 wrote to memory of 1140 1556 fb2da9f629fd5c61ab198a079218e281b5c32be693b733cb63eaaf07203a2b65.exe fb2da9f629fd5c61ab198a079218e281b5c32be693b733cb63eaaf07203a2b65.exe PID 1556 wrote to memory of 1140 1556 fb2da9f629fd5c61ab198a079218e281b5c32be693b733cb63eaaf07203a2b65.exe fb2da9f629fd5c61ab198a079218e281b5c32be693b733cb63eaaf07203a2b65.exe PID 1556 wrote to memory of 1140 1556 fb2da9f629fd5c61ab198a079218e281b5c32be693b733cb63eaaf07203a2b65.exe fb2da9f629fd5c61ab198a079218e281b5c32be693b733cb63eaaf07203a2b65.exe PID 1556 wrote to memory of 1140 1556 fb2da9f629fd5c61ab198a079218e281b5c32be693b733cb63eaaf07203a2b65.exe fb2da9f629fd5c61ab198a079218e281b5c32be693b733cb63eaaf07203a2b65.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb2da9f629fd5c61ab198a079218e281b5c32be693b733cb63eaaf07203a2b65.exe"C:\Users\Admin\AppData\Local\Temp\fb2da9f629fd5c61ab198a079218e281b5c32be693b733cb63eaaf07203a2b65.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\fb2da9f629fd5c61ab198a079218e281b5c32be693b733cb63eaaf07203a2b65.exe"C:\Users\Admin\AppData\Local\Temp\fb2da9f629fd5c61ab198a079218e281b5c32be693b733cb63eaaf07203a2b65.exe"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1140-68-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/1140-58-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/1140-60-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/1140-62-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/1140-64-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/1140-66-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/1140-70-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/1140-71-0x0000000074620000-0x0000000074D0E000-memory.dmpFilesize
6.9MB
-
memory/1140-72-0x00000000043A0000-0x00000000043A1000-memory.dmpFilesize
4KB
-
memory/1556-55-0x0000000000E60000-0x0000000000EF2000-memory.dmpFilesize
584KB
-
memory/1556-56-0x0000000000E10000-0x0000000000E11000-memory.dmpFilesize
4KB
-
memory/1556-57-0x0000000000440000-0x0000000000448000-memory.dmpFilesize
32KB
-
memory/1556-54-0x0000000074620000-0x0000000074D0E000-memory.dmpFilesize
6.9MB