Analysis
-
max time kernel
151s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
27-05-2022 18:43
Static task
static1
Behavioral task
behavioral1
Sample
052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe
Resource
win10v2004-20220414-en
General
-
Target
052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe
-
Size
577KB
-
MD5
1711710d30ed4194ccfde68c6b6f3b22
-
SHA1
4f399c035bb370610940a96b3aab90eab884a925
-
SHA256
052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1
-
SHA512
fbb943b1a20a4fbe0d1d5da5b5b874cb7b728354fc24c4ab1b0d827220052d7b34117980f7a1e993814b83bc02264a8af916a0fd909cbdd065cb11b396fc9353
Malware Config
Extracted
revengerat
Extracted
revengerat
Guest
93.155.97.82:333
93.155.97.82:1604
neudria.ddns.net:333
neudria.ddns.net:1604
RV_MUTEX-ZFbTXZMONFueOci
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
RevengeRat Executable 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1656-70-0x00000000041F0000-0x00000000041F8000-memory.dmp revengerat behavioral1/memory/2032-74-0x0000000000400000-0x0000000000408000-memory.dmp revengerat behavioral1/memory/2032-75-0x0000000000400000-0x0000000000408000-memory.dmp revengerat behavioral1/memory/2032-76-0x0000000000405E0E-mapping.dmp revengerat behavioral1/memory/2032-81-0x0000000000400000-0x0000000000408000-memory.dmp revengerat behavioral1/memory/2032-79-0x0000000000400000-0x0000000000408000-memory.dmp revengerat -
Looks for VMWare Tools registry key 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe -
Drops startup file 1 IoCs
Processes:
cscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StreamX.Lnk cscript.exe -
Loads dropped DLL 1 IoCs
Processes:
cscript.exepid process 912 cscript.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exedescription pid process target process PID 1656 set thread context of 2032 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe RegAsm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exepid process 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exeRegAsm.exedescription pid process Token: SeDebugPrivilege 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe Token: SeDebugPrivilege 2032 RegAsm.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.execmd.exedescription pid process target process PID 1656 wrote to memory of 912 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe cscript.exe PID 1656 wrote to memory of 912 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe cscript.exe PID 1656 wrote to memory of 912 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe cscript.exe PID 1656 wrote to memory of 912 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe cscript.exe PID 1656 wrote to memory of 2032 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe RegAsm.exe PID 1656 wrote to memory of 2032 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe RegAsm.exe PID 1656 wrote to memory of 2032 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe RegAsm.exe PID 1656 wrote to memory of 2032 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe RegAsm.exe PID 1656 wrote to memory of 2032 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe RegAsm.exe PID 1656 wrote to memory of 2032 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe RegAsm.exe PID 1656 wrote to memory of 2032 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe RegAsm.exe PID 1656 wrote to memory of 2032 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe RegAsm.exe PID 1656 wrote to memory of 2032 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe RegAsm.exe PID 1656 wrote to memory of 2032 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe RegAsm.exe PID 1656 wrote to memory of 2032 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe RegAsm.exe PID 1656 wrote to memory of 1344 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe cmd.exe PID 1656 wrote to memory of 1344 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe cmd.exe PID 1656 wrote to memory of 1344 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe cmd.exe PID 1656 wrote to memory of 1344 1656 052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe cmd.exe PID 1344 wrote to memory of 1352 1344 cmd.exe choice.exe PID 1344 wrote to memory of 1352 1344 cmd.exe choice.exe PID 1344 wrote to memory of 1352 1344 cmd.exe choice.exe PID 1344 wrote to memory of 1352 1344 cmd.exe choice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe"C:\Users\Admin\AppData\Local\Temp\052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\System32\cscript.exe" //B //Nologo C:\Users\Admin\StreamX.vbs2⤵
- Drops startup file
- Loads dropped DLL
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 33⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\StreamX.exeFilesize
577KB
MD51711710d30ed4194ccfde68c6b6f3b22
SHA14f399c035bb370610940a96b3aab90eab884a925
SHA256052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1
SHA512fbb943b1a20a4fbe0d1d5da5b5b874cb7b728354fc24c4ab1b0d827220052d7b34117980f7a1e993814b83bc02264a8af916a0fd909cbdd065cb11b396fc9353
-
C:\Users\Admin\StreamX.vbsFilesize
275B
MD5cf428ca413e6966414f8bd4e04ee48cb
SHA11db80df27ddfd1d81d181bc70c312dd3d4388bff
SHA25615845597e335f71cad5e9b680bd6f1c7de7ba676dbb275b20b67c8fb9c6fc22e
SHA512befce47732be9891c364db21c740deb0985c03114b1c1a3f83db03d3c0445a45558005125e25d8c897737f6c99e163b07b8fa28985387bf429cad7af00992f08
-
\Users\Admin\StreamX.exeFilesize
577KB
MD51711710d30ed4194ccfde68c6b6f3b22
SHA14f399c035bb370610940a96b3aab90eab884a925
SHA256052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1
SHA512fbb943b1a20a4fbe0d1d5da5b5b874cb7b728354fc24c4ab1b0d827220052d7b34117980f7a1e993814b83bc02264a8af916a0fd909cbdd065cb11b396fc9353
-
memory/912-59-0x0000000000000000-mapping.dmp
-
memory/1344-78-0x0000000000000000-mapping.dmp
-
memory/1352-83-0x0000000000000000-mapping.dmp
-
memory/1656-67-0x00000000708F0000-0x00000000709EC000-memory.dmpFilesize
1008KB
-
memory/1656-68-0x00000000701B0000-0x00000000708EE000-memory.dmpFilesize
7.2MB
-
memory/1656-63-0x0000000073740000-0x0000000073F20000-memory.dmpFilesize
7.9MB
-
memory/1656-56-0x0000000001DF0000-0x0000000001E2E000-memory.dmpFilesize
248KB
-
memory/1656-55-0x0000000075A61000-0x0000000075A63000-memory.dmpFilesize
8KB
-
memory/1656-66-0x00000000709F0000-0x0000000071746000-memory.dmpFilesize
13.3MB
-
memory/1656-58-0x0000000072160000-0x00000000734EF000-memory.dmpFilesize
19.6MB
-
memory/1656-57-0x0000000001ED0000-0x0000000001EF8000-memory.dmpFilesize
160KB
-
memory/1656-69-0x000000006FF90000-0x00000000700B3000-memory.dmpFilesize
1.1MB
-
memory/1656-70-0x00000000041F0000-0x00000000041F8000-memory.dmpFilesize
32KB
-
memory/1656-94-0x0000000071750000-0x0000000072160000-memory.dmpFilesize
10.1MB
-
memory/1656-93-0x0000000072160000-0x00000000734EF000-memory.dmpFilesize
19.6MB
-
memory/1656-54-0x0000000000380000-0x0000000000416000-memory.dmpFilesize
600KB
-
memory/1656-84-0x000000006F880000-0x000000006FA51000-memory.dmpFilesize
1.8MB
-
memory/1656-60-0x0000000071750000-0x0000000072160000-memory.dmpFilesize
10.1MB
-
memory/2032-74-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2032-81-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2032-79-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2032-76-0x0000000000405E0E-mapping.dmp
-
memory/2032-75-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2032-85-0x000000006EFE0000-0x000000006F58B000-memory.dmpFilesize
5.7MB
-
memory/2032-86-0x000000006E440000-0x000000006EF38000-memory.dmpFilesize
11.0MB
-
memory/2032-87-0x000000006DC40000-0x000000006E3DC000-memory.dmpFilesize
7.6MB
-
memory/2032-88-0x000000006DAB0000-0x000000006DC38000-memory.dmpFilesize
1.5MB
-
memory/2032-89-0x000000006CED0000-0x000000006DAAE000-memory.dmpFilesize
11.9MB
-
memory/2032-90-0x000000006CD30000-0x000000006CECB000-memory.dmpFilesize
1.6MB
-
memory/2032-91-0x000000006CC30000-0x000000006CD21000-memory.dmpFilesize
964KB
-
memory/2032-92-0x000000006C6F0000-0x000000006CC26000-memory.dmpFilesize
5.2MB
-
memory/2032-72-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2032-71-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2032-95-0x000000006EFE0000-0x000000006F58B000-memory.dmpFilesize
5.7MB
-
memory/2032-96-0x000000006E440000-0x000000006EF38000-memory.dmpFilesize
11.0MB
-
memory/2032-97-0x000000006DC40000-0x000000006E3DC000-memory.dmpFilesize
7.6MB