Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
16-05-2022 01:54
Static task
static1
Behavioral task
behavioral1
Sample
83d0c88d59c8e466d87f6f0634b5ee11effb4ab278b09af094fdf634e1ecb7f1.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
83d0c88d59c8e466d87f6f0634b5ee11effb4ab278b09af094fdf634e1ecb7f1.exe
Resource
win10v2004-20220414-en
General
-
Target
83d0c88d59c8e466d87f6f0634b5ee11effb4ab278b09af094fdf634e1ecb7f1.exe
-
Size
56KB
-
MD5
b82f453f91e18565385e4a7126506fa2
-
SHA1
54f76a03a48481f8286a3977cb1302e6dce7e592
-
SHA256
83d0c88d59c8e466d87f6f0634b5ee11effb4ab278b09af094fdf634e1ecb7f1
-
SHA512
3f91dcd61061c51da061b8ed680acc7caef964ad61403b3143a4d20caf4546324b150fe26a2f8b6dc83ca4ae02579d2c7ef9a88414f07873409dd87038c87569
Malware Config
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
RevengeRat Executable 6 IoCs
Processes:
resource yara_rule behavioral2/memory/1848-131-0x0000000000400000-0x0000000000414000-memory.dmp revengerat behavioral2/memory/1848-133-0x0000000000400000-0x0000000000414000-memory.dmp revengerat C:\Windows\SysWOW64\system manager.exe revengerat C:\Windows\SysWOW64\system manager.exe revengerat behavioral2/memory/1944-150-0x0000000000780000-0x0000000000794000-memory.dmp revengerat behavioral2/memory/1944-153-0x0000000000780000-0x0000000000794000-memory.dmp revengerat -
Executes dropped EXE 1 IoCs
Processes:
system manager.exepid process 4668 system manager.exe -
Drops file in System32 directory 2 IoCs
Processes:
RegSvcs.exedescription ioc process File created C:\Windows\SysWOW64\system manager.exe RegSvcs.exe File opened for modification C:\Windows\SysWOW64\system manager.exe RegSvcs.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
83d0c88d59c8e466d87f6f0634b5ee11effb4ab278b09af094fdf634e1ecb7f1.exeRegSvcs.exesystem manager.exedescription pid process target process PID 1580 set thread context of 1848 1580 83d0c88d59c8e466d87f6f0634b5ee11effb4ab278b09af094fdf634e1ecb7f1.exe RegSvcs.exe PID 1848 set thread context of 4924 1848 RegSvcs.exe RegSvcs.exe PID 4668 set thread context of 1944 4668 system manager.exe RegSvcs.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2200 1944 WerFault.exe RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
83d0c88d59c8e466d87f6f0634b5ee11effb4ab278b09af094fdf634e1ecb7f1.exeRegSvcs.exesystem manager.exedescription pid process Token: SeDebugPrivilege 1580 83d0c88d59c8e466d87f6f0634b5ee11effb4ab278b09af094fdf634e1ecb7f1.exe Token: SeDebugPrivilege 1848 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1848 RegSvcs.exe Token: SeDebugPrivilege 4668 system manager.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
83d0c88d59c8e466d87f6f0634b5ee11effb4ab278b09af094fdf634e1ecb7f1.exeRegSvcs.exesystem manager.exedescription pid process target process PID 1580 wrote to memory of 1848 1580 83d0c88d59c8e466d87f6f0634b5ee11effb4ab278b09af094fdf634e1ecb7f1.exe RegSvcs.exe PID 1580 wrote to memory of 1848 1580 83d0c88d59c8e466d87f6f0634b5ee11effb4ab278b09af094fdf634e1ecb7f1.exe RegSvcs.exe PID 1580 wrote to memory of 1848 1580 83d0c88d59c8e466d87f6f0634b5ee11effb4ab278b09af094fdf634e1ecb7f1.exe RegSvcs.exe PID 1580 wrote to memory of 1848 1580 83d0c88d59c8e466d87f6f0634b5ee11effb4ab278b09af094fdf634e1ecb7f1.exe RegSvcs.exe PID 1580 wrote to memory of 1848 1580 83d0c88d59c8e466d87f6f0634b5ee11effb4ab278b09af094fdf634e1ecb7f1.exe RegSvcs.exe PID 1580 wrote to memory of 1848 1580 83d0c88d59c8e466d87f6f0634b5ee11effb4ab278b09af094fdf634e1ecb7f1.exe RegSvcs.exe PID 1580 wrote to memory of 1848 1580 83d0c88d59c8e466d87f6f0634b5ee11effb4ab278b09af094fdf634e1ecb7f1.exe RegSvcs.exe PID 1580 wrote to memory of 1848 1580 83d0c88d59c8e466d87f6f0634b5ee11effb4ab278b09af094fdf634e1ecb7f1.exe RegSvcs.exe PID 1848 wrote to memory of 4924 1848 RegSvcs.exe RegSvcs.exe PID 1848 wrote to memory of 4924 1848 RegSvcs.exe RegSvcs.exe PID 1848 wrote to memory of 4924 1848 RegSvcs.exe RegSvcs.exe PID 1848 wrote to memory of 4924 1848 RegSvcs.exe RegSvcs.exe PID 1848 wrote to memory of 4924 1848 RegSvcs.exe RegSvcs.exe PID 1848 wrote to memory of 4924 1848 RegSvcs.exe RegSvcs.exe PID 1848 wrote to memory of 4924 1848 RegSvcs.exe RegSvcs.exe PID 1848 wrote to memory of 4924 1848 RegSvcs.exe RegSvcs.exe PID 1848 wrote to memory of 4668 1848 RegSvcs.exe system manager.exe PID 1848 wrote to memory of 4668 1848 RegSvcs.exe system manager.exe PID 1848 wrote to memory of 4668 1848 RegSvcs.exe system manager.exe PID 4668 wrote to memory of 1944 4668 system manager.exe RegSvcs.exe PID 4668 wrote to memory of 1944 4668 system manager.exe RegSvcs.exe PID 4668 wrote to memory of 1944 4668 system manager.exe RegSvcs.exe PID 4668 wrote to memory of 1944 4668 system manager.exe RegSvcs.exe PID 4668 wrote to memory of 1944 4668 system manager.exe RegSvcs.exe PID 4668 wrote to memory of 1944 4668 system manager.exe RegSvcs.exe PID 4668 wrote to memory of 1944 4668 system manager.exe RegSvcs.exe PID 4668 wrote to memory of 1944 4668 system manager.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\83d0c88d59c8e466d87f6f0634b5ee11effb4ab278b09af094fdf634e1ecb7f1.exe"C:\Users\Admin\AppData\Local\Temp\83d0c88d59c8e466d87f6f0634b5ee11effb4ab278b09af094fdf634e1ecb7f1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:4924
-
C:\Windows\SysWOW64\system manager.exe"C:\Windows\system32\system manager.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵PID:1944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 2005⤵
- Program crash
PID:2200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1944 -ip 19441⤵PID:5008
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
142B
MD58c0458bb9ea02d50565175e38d577e35
SHA1f0b50702cd6470f3c17d637908f83212fdbdb2f2
SHA256c578e86db701b9afa3626e804cf434f9d32272ff59fb32fa9a51835e5a148b53
SHA512804a47494d9a462ffa6f39759480700ecbe5a7f3a15ec3a6330176ed9c04695d2684bf6bf85ab86286d52e7b727436d0bb2e8da96e20d47740b5ce3f856b5d0f
-
Filesize
102B
MD57782df1f6b43838e055d99b4668d2bfc
SHA15a4adcc361c16779064eb1554e214ee380cdc99d
SHA256bbae3d71bcab18621ee719be9b2d016add16a726067e3948ed9183d8bc9ed41a
SHA5121085d9b9383cfeeb098a45dcd116f15371cb5aa7cc6915f626b61903eb90323076f7c97cb6f7d6e0748bfc976db7146babbc2b1f00bfa6da923e0fce33e08e04
-
Filesize
56KB
MD5b82f453f91e18565385e4a7126506fa2
SHA154f76a03a48481f8286a3977cb1302e6dce7e592
SHA25683d0c88d59c8e466d87f6f0634b5ee11effb4ab278b09af094fdf634e1ecb7f1
SHA5123f91dcd61061c51da061b8ed680acc7caef964ad61403b3143a4d20caf4546324b150fe26a2f8b6dc83ca4ae02579d2c7ef9a88414f07873409dd87038c87569
-
Filesize
56KB
MD5b82f453f91e18565385e4a7126506fa2
SHA154f76a03a48481f8286a3977cb1302e6dce7e592
SHA25683d0c88d59c8e466d87f6f0634b5ee11effb4ab278b09af094fdf634e1ecb7f1
SHA5123f91dcd61061c51da061b8ed680acc7caef964ad61403b3143a4d20caf4546324b150fe26a2f8b6dc83ca4ae02579d2c7ef9a88414f07873409dd87038c87569