Analysis

  • max time kernel
    4294211s
  • max time network
    178s
  • platform
    windows7_x64
  • resource
    win7-20220311-en
  • submitted
    19-03-2022 16:48

General

  • Target

    c411b538758c6a43014cc15b7eb76dfbc036f9960463f464980f1b8e7f392da5.exe

  • Size

    158KB

  • MD5

    31a1ca812ea498de949a1fbf05fa6acc

  • SHA1

    cfa6b8f13e9388a068f66614f1afb615112a3dc1

  • SHA256

    c411b538758c6a43014cc15b7eb76dfbc036f9960463f464980f1b8e7f392da5

  • SHA512

    e076f2c1dfcced6a1b0798fb557d9af4a5b6d142a64f866c1dd36d497a4b1a765322faa392210ae704f5092c90067ddcd0104de79d7d83e59fa0ed0337e1b89f

Malware Config

Extracted

Family

revengerat

Botnet

000000000

C2

github-58677.portmap.io:58677

github-58677.portmap.io:3333

anunankis1.duckdns.org:58677

anunankis1.duckdns.org:3333

anunankis10.duckdns.org:58677

anunankis10.duckdns.org:3333

Mutex

RV_MUTEX

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • RevengeRat Executable 4 IoCs
  • Executes dropped EXE 4 IoCs
  • Drops startup file 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c411b538758c6a43014cc15b7eb76dfbc036f9960463f464980f1b8e7f392da5.exe
    "C:\Users\Admin\AppData\Local\Temp\c411b538758c6a43014cc15b7eb76dfbc036f9960463f464980f1b8e7f392da5.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1616
    • C:\Users\Admin\AppData\Local\Temp\c411b538758c6a43014cc15b7eb76dfbc036f9960463f464980f1b8e7f392da5.exe
      "C:\Users\Admin\AppData\Local\Temp\c411b538758c6a43014cc15b7eb76dfbc036f9960463f464980f1b8e7f392da5.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1688
      • C:\Users\Admin\AppData\Roaming\svchost.exe
        "C:\Users\Admin\AppData\Roaming\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:984
        • C:\Users\Admin\AppData\Roaming\svchost.exe
          "C:\Users\Admin\AppData\Roaming\svchost.exe"
          4⤵
          • Executes dropped EXE
          • Drops startup file
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1472
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\svchost.exe"
            5⤵
            • Creates scheduled task(s)
            PID:1544
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {76FCDA92-C326-4145-A910-6FE016942D68} S-1-5-21-2199625441-3471261906-229485034-1000:DRLQIXCW\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:828
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      C:\Users\Admin\AppData\Roaming\svchost.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1276
      • C:\Users\Admin\AppData\Roaming\svchost.exe
        "C:\Users\Admin\AppData\Roaming\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1196

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\svchost.exe
    MD5

    31a1ca812ea498de949a1fbf05fa6acc

    SHA1

    cfa6b8f13e9388a068f66614f1afb615112a3dc1

    SHA256

    c411b538758c6a43014cc15b7eb76dfbc036f9960463f464980f1b8e7f392da5

    SHA512

    e076f2c1dfcced6a1b0798fb557d9af4a5b6d142a64f866c1dd36d497a4b1a765322faa392210ae704f5092c90067ddcd0104de79d7d83e59fa0ed0337e1b89f

  • C:\Users\Admin\AppData\Roaming\svchost.exe
    MD5

    31a1ca812ea498de949a1fbf05fa6acc

    SHA1

    cfa6b8f13e9388a068f66614f1afb615112a3dc1

    SHA256

    c411b538758c6a43014cc15b7eb76dfbc036f9960463f464980f1b8e7f392da5

    SHA512

    e076f2c1dfcced6a1b0798fb557d9af4a5b6d142a64f866c1dd36d497a4b1a765322faa392210ae704f5092c90067ddcd0104de79d7d83e59fa0ed0337e1b89f

  • C:\Users\Admin\AppData\Roaming\svchost.exe
    MD5

    31a1ca812ea498de949a1fbf05fa6acc

    SHA1

    cfa6b8f13e9388a068f66614f1afb615112a3dc1

    SHA256

    c411b538758c6a43014cc15b7eb76dfbc036f9960463f464980f1b8e7f392da5

    SHA512

    e076f2c1dfcced6a1b0798fb557d9af4a5b6d142a64f866c1dd36d497a4b1a765322faa392210ae704f5092c90067ddcd0104de79d7d83e59fa0ed0337e1b89f

  • C:\Users\Admin\AppData\Roaming\svchost.exe
    MD5

    31a1ca812ea498de949a1fbf05fa6acc

    SHA1

    cfa6b8f13e9388a068f66614f1afb615112a3dc1

    SHA256

    c411b538758c6a43014cc15b7eb76dfbc036f9960463f464980f1b8e7f392da5

    SHA512

    e076f2c1dfcced6a1b0798fb557d9af4a5b6d142a64f866c1dd36d497a4b1a765322faa392210ae704f5092c90067ddcd0104de79d7d83e59fa0ed0337e1b89f

  • C:\Users\Admin\AppData\Roaming\svchost.exe
    MD5

    31a1ca812ea498de949a1fbf05fa6acc

    SHA1

    cfa6b8f13e9388a068f66614f1afb615112a3dc1

    SHA256

    c411b538758c6a43014cc15b7eb76dfbc036f9960463f464980f1b8e7f392da5

    SHA512

    e076f2c1dfcced6a1b0798fb557d9af4a5b6d142a64f866c1dd36d497a4b1a765322faa392210ae704f5092c90067ddcd0104de79d7d83e59fa0ed0337e1b89f

  • \Users\Admin\AppData\Roaming\svchost.exe
    MD5

    31a1ca812ea498de949a1fbf05fa6acc

    SHA1

    cfa6b8f13e9388a068f66614f1afb615112a3dc1

    SHA256

    c411b538758c6a43014cc15b7eb76dfbc036f9960463f464980f1b8e7f392da5

    SHA512

    e076f2c1dfcced6a1b0798fb557d9af4a5b6d142a64f866c1dd36d497a4b1a765322faa392210ae704f5092c90067ddcd0104de79d7d83e59fa0ed0337e1b89f

  • memory/984-83-0x0000000074040000-0x000000007472E000-memory.dmp
    Filesize

    6.9MB

  • memory/984-73-0x0000000000BD0000-0x0000000000BFE000-memory.dmp
    Filesize

    184KB

  • memory/1196-103-0x0000000073950000-0x000000007403E000-memory.dmp
    Filesize

    6.9MB

  • memory/1276-99-0x0000000073950000-0x000000007403E000-memory.dmp
    Filesize

    6.9MB

  • memory/1472-87-0x0000000073950000-0x000000007403E000-memory.dmp
    Filesize

    6.9MB

  • memory/1472-88-0x0000000004D90000-0x0000000004D91000-memory.dmp
    Filesize

    4KB

  • memory/1616-67-0x0000000074040000-0x000000007472E000-memory.dmp
    Filesize

    6.9MB

  • memory/1616-54-0x0000000001030000-0x000000000105E000-memory.dmp
    Filesize

    184KB

  • memory/1616-55-0x0000000000270000-0x0000000000278000-memory.dmp
    Filesize

    32KB

  • memory/1688-62-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/1688-69-0x0000000000370000-0x0000000000371000-memory.dmp
    Filesize

    4KB

  • memory/1688-68-0x0000000074040000-0x000000007472E000-memory.dmp
    Filesize

    6.9MB

  • memory/1688-66-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/1688-64-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/1688-60-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/1688-58-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/1688-56-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB