Analysis

  • max time kernel
    146s
  • max time network
    100s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    18-04-2022 10:58

General

  • Target

    2503591813db469e7a22ecdfc233b7e91a85821c6f2beaf05e406f722dae2e55.exe

  • Size

    70KB

  • MD5

    407b61f6bd7985c856ba370dde95daee

  • SHA1

    45023210e16863ce86957c11178eca2f7a9a184c

  • SHA256

    2503591813db469e7a22ecdfc233b7e91a85821c6f2beaf05e406f722dae2e55

  • SHA512

    511ff1d524ce06dfbc9f32283b0c2e9a7068a01d8cc6bbe6a70980661fc8a377c0d4241251516d6c3c01fd1113e595fa319f9e53ca0c93574a180d7bdec071a2

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • RevengeRat Executable 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2503591813db469e7a22ecdfc233b7e91a85821c6f2beaf05e406f722dae2e55.exe
    "C:\Users\Admin\AppData\Local\Temp\2503591813db469e7a22ecdfc233b7e91a85821c6f2beaf05e406f722dae2e55.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1324
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:536
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe"
        3⤵
          PID:1608

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tawrHJfWfh.txt

      Filesize

      102B

      MD5

      a2844417eb0b3d2fe296515b95e35159

      SHA1

      ef993d8459beacf5e70292f26919e9519207563f

      SHA256

      a5d619d7dea87e1723c1285e8dc9e600c9f7dd4e523f059918b9c7be443856ec

      SHA512

      3381f1665fafb324189145ec8995e23bcbb3c015096a81da32e027ebd489e946d4b79650636df2af8d7eef21523435fd5bb8631c8d258d9f8a077a545e9e35bb

    • memory/536-57-0x0000000000400000-0x0000000000416000-memory.dmp

      Filesize

      88KB

    • memory/536-56-0x0000000000400000-0x0000000000416000-memory.dmp

      Filesize

      88KB

    • memory/536-59-0x0000000000400000-0x0000000000416000-memory.dmp

      Filesize

      88KB

    • memory/536-60-0x0000000000400000-0x0000000000416000-memory.dmp

      Filesize

      88KB

    • memory/536-61-0x0000000000400000-0x0000000000416000-memory.dmp

      Filesize

      88KB

    • memory/536-63-0x000000000040F0EE-mapping.dmp

    • memory/536-62-0x0000000000400000-0x0000000000416000-memory.dmp

      Filesize

      88KB

    • memory/536-65-0x0000000000400000-0x0000000000416000-memory.dmp

      Filesize

      88KB

    • memory/536-86-0x0000000074790000-0x0000000074D3B000-memory.dmp

      Filesize

      5.7MB

    • memory/1324-55-0x0000000074D40000-0x00000000752EB000-memory.dmp

      Filesize

      5.7MB

    • memory/1324-54-0x0000000076011000-0x0000000076013000-memory.dmp

      Filesize

      8KB

    • memory/1608-71-0x0000000000090000-0x000000000009A000-memory.dmp

      Filesize

      40KB

    • memory/1608-68-0x0000000000090000-0x000000000009A000-memory.dmp

      Filesize

      40KB

    • memory/1608-73-0x000000000040587E-mapping.dmp

    • memory/1608-67-0x0000000000090000-0x000000000009A000-memory.dmp

      Filesize

      40KB

    • memory/1608-75-0x0000000000090000-0x000000000009A000-memory.dmp

      Filesize

      40KB

    • memory/1608-76-0x0000000000090000-0x000000000009A000-memory.dmp

      Filesize

      40KB

    • memory/1608-80-0x0000000000090000-0x000000000009A000-memory.dmp

      Filesize

      40KB

    • memory/1608-83-0x0000000000090000-0x000000000009A000-memory.dmp

      Filesize

      40KB

    • memory/1608-85-0x0000000074790000-0x0000000074D3B000-memory.dmp

      Filesize

      5.7MB

    • memory/1608-70-0x0000000000090000-0x000000000009A000-memory.dmp

      Filesize

      40KB