Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    18-04-2022 10:58

General

  • Target

    2503591813db469e7a22ecdfc233b7e91a85821c6f2beaf05e406f722dae2e55.exe

  • Size

    70KB

  • MD5

    407b61f6bd7985c856ba370dde95daee

  • SHA1

    45023210e16863ce86957c11178eca2f7a9a184c

  • SHA256

    2503591813db469e7a22ecdfc233b7e91a85821c6f2beaf05e406f722dae2e55

  • SHA512

    511ff1d524ce06dfbc9f32283b0c2e9a7068a01d8cc6bbe6a70980661fc8a377c0d4241251516d6c3c01fd1113e595fa319f9e53ca0c93574a180d7bdec071a2

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • RevengeRat Executable 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2503591813db469e7a22ecdfc233b7e91a85821c6f2beaf05e406f722dae2e55.exe
    "C:\Users\Admin\AppData\Local\Temp\2503591813db469e7a22ecdfc233b7e91a85821c6f2beaf05e406f722dae2e55.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1360
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1168
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe"
        3⤵
          PID:1760

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tawrHJfWfh.txt

      Filesize

      102B

      MD5

      a2844417eb0b3d2fe296515b95e35159

      SHA1

      ef993d8459beacf5e70292f26919e9519207563f

      SHA256

      a5d619d7dea87e1723c1285e8dc9e600c9f7dd4e523f059918b9c7be443856ec

      SHA512

      3381f1665fafb324189145ec8995e23bcbb3c015096a81da32e027ebd489e946d4b79650636df2af8d7eef21523435fd5bb8631c8d258d9f8a077a545e9e35bb

    • memory/1168-131-0x0000000000000000-mapping.dmp

    • memory/1168-132-0x0000000000400000-0x0000000000416000-memory.dmp

      Filesize

      88KB

    • memory/1168-134-0x0000000000400000-0x0000000000416000-memory.dmp

      Filesize

      88KB

    • memory/1168-139-0x0000000074850000-0x0000000074E01000-memory.dmp

      Filesize

      5.7MB

    • memory/1360-130-0x00000000747B0000-0x0000000074D61000-memory.dmp

      Filesize

      5.7MB

    • memory/1760-135-0x0000000000000000-mapping.dmp

    • memory/1760-136-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/1760-138-0x0000000074850000-0x0000000074E01000-memory.dmp

      Filesize

      5.7MB