Analysis
-
max time kernel
151s -
max time network
65s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 13:29
Static task
static1
Behavioral task
behavioral1
Sample
REORDER_.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
REORDER_.exe
Resource
win10v2004-20220414-en
General
-
Target
REORDER_.exe
-
Size
339KB
-
MD5
965a50b0cb0e05ba3fb39aa2dfb64980
-
SHA1
f9d0711a8f6f430ec3bfc597be43592cebdc649e
-
SHA256
cac726f6b0bcb60af61033a9a59ae886ee7466f65e20185cd44be43c80386e7d
-
SHA512
43c37e8457f55ed52b8e9ae3cce7fe4ea5403d27f58a674fa0ee976b99bda8704dedd4fe0caa4cb93d758349b02acea22faf0a0a672cc87ebb938878c6d7c3fb
Malware Config
Extracted
revengerat
Guest
lordiyke.duckdns.org:2336
RV_MUTEX-YqqNLCGRFbTXZM
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
RevengeRat Executable 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1812-60-0x0000000000400000-0x0000000000408000-memory.dmp revengerat behavioral1/memory/1812-61-0x0000000000405E1E-mapping.dmp revengerat behavioral1/memory/1812-63-0x0000000000400000-0x0000000000408000-memory.dmp revengerat behavioral1/memory/1812-65-0x0000000000400000-0x0000000000408000-memory.dmp revengerat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
REORDER_.exedescription pid process target process PID 1456 set thread context of 1812 1456 REORDER_.exe MSBuild.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
MSBuild.exedescription pid process Token: SeDebugPrivilege 1812 MSBuild.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
REORDER_.execmd.exeREORDER_.exedescription pid process target process PID 272 wrote to memory of 956 272 REORDER_.exe cmd.exe PID 272 wrote to memory of 956 272 REORDER_.exe cmd.exe PID 272 wrote to memory of 956 272 REORDER_.exe cmd.exe PID 272 wrote to memory of 956 272 REORDER_.exe cmd.exe PID 956 wrote to memory of 1380 956 cmd.exe schtasks.exe PID 956 wrote to memory of 1380 956 cmd.exe schtasks.exe PID 956 wrote to memory of 1380 956 cmd.exe schtasks.exe PID 956 wrote to memory of 1380 956 cmd.exe schtasks.exe PID 272 wrote to memory of 1324 272 REORDER_.exe MSBuild.exe PID 272 wrote to memory of 1324 272 REORDER_.exe MSBuild.exe PID 272 wrote to memory of 1324 272 REORDER_.exe MSBuild.exe PID 272 wrote to memory of 1324 272 REORDER_.exe MSBuild.exe PID 272 wrote to memory of 1456 272 REORDER_.exe REORDER_.exe PID 272 wrote to memory of 1456 272 REORDER_.exe REORDER_.exe PID 272 wrote to memory of 1456 272 REORDER_.exe REORDER_.exe PID 272 wrote to memory of 1456 272 REORDER_.exe REORDER_.exe PID 1456 wrote to memory of 1812 1456 REORDER_.exe MSBuild.exe PID 1456 wrote to memory of 1812 1456 REORDER_.exe MSBuild.exe PID 1456 wrote to memory of 1812 1456 REORDER_.exe MSBuild.exe PID 1456 wrote to memory of 1812 1456 REORDER_.exe MSBuild.exe PID 1456 wrote to memory of 1812 1456 REORDER_.exe MSBuild.exe PID 1456 wrote to memory of 1812 1456 REORDER_.exe MSBuild.exe PID 1456 wrote to memory of 1812 1456 REORDER_.exe MSBuild.exe PID 1456 wrote to memory of 1812 1456 REORDER_.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\REORDER_.exe"C:\Users\Admin\AppData\Local\Temp\REORDER_.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks /Create /TN Windowsupdator /XML "C:\Users\Admin\AppData\Local\Temp\f923d393131742579d889796201033a6.xml"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /TN Windowsupdator /XML "C:\Users\Admin\AppData\Local\Temp\f923d393131742579d889796201033a6.xml"3⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Users\Admin\AppData\Local\Temp\REORDER_.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\REORDER_.exe"C:\Users\Admin\AppData\Local\Temp\REORDER_.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Users\Admin\AppData\Local\Temp\REORDER_.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\f923d393131742579d889796201033a6.xmlFilesize
1KB
MD5e98af825c49270e6928d9f80badf4af8
SHA18e3d1db305b6170cceb4f763ee02cf12a198f814
SHA256ebbafd7c57e0f7de0e9bb84c2eea461244f82d40b0bc8a376bdc7ccd1e12e599
SHA512531d18c8e5d613977e753cfcb27c8ad355d2b3fdef24883520b3b91cad0a778dff6837dfbab65463c0b05d313fb5d3219c2b786e851584e701833c4e35b88504
-
memory/272-57-0x0000000000210000-0x000000000026A000-memory.dmpFilesize
360KB
-
memory/956-54-0x0000000000000000-mapping.dmp
-
memory/1380-55-0x0000000000000000-mapping.dmp
-
memory/1456-58-0x0000000000000000-mapping.dmp
-
memory/1456-59-0x0000000000210000-0x000000000026A000-memory.dmpFilesize
360KB
-
memory/1812-60-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/1812-61-0x0000000000405E1E-mapping.dmp
-
memory/1812-63-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/1812-65-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/1812-66-0x00000000753B1000-0x00000000753B3000-memory.dmpFilesize
8KB
-
memory/1812-67-0x0000000074460000-0x0000000074A0B000-memory.dmpFilesize
5.7MB