Analysis
-
max time kernel
143s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
30-05-2022 21:44
Static task
static1
Behavioral task
behavioral1
Sample
08812395ae9ee8cced9280aa0da4186a06d69e9bc2a1aef970ca383f504a4779.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
08812395ae9ee8cced9280aa0da4186a06d69e9bc2a1aef970ca383f504a4779.exe
Resource
win10v2004-20220414-en
General
-
Target
08812395ae9ee8cced9280aa0da4186a06d69e9bc2a1aef970ca383f504a4779.exe
-
Size
345KB
-
MD5
b4f7d6c32fd88f6f0743eb92dead9508
-
SHA1
148dc196a6c47cf25e09b626d061c9ea1d5ba531
-
SHA256
08812395ae9ee8cced9280aa0da4186a06d69e9bc2a1aef970ca383f504a4779
-
SHA512
119fd596fbfe7e97a5bfdb2d39e681e038adcf31aaeea7c4c884a908dc6736ec36991b55e69a374832553bb41bfae02b35264b54a5ed076bde0db7bfa25f3a42
Malware Config
Extracted
revengerat
Guest
185.29.10.15:6984
RV_MUTEX-LuSAtYBxGgZH
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
RevengeRat Executable 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4196-138-0x0000000000400000-0x0000000000408000-memory.dmp revengerat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
08812395ae9ee8cced9280aa0da4186a06d69e9bc2a1aef970ca383f504a4779.exedescription pid process target process PID 4388 set thread context of 4196 4388 08812395ae9ee8cced9280aa0da4186a06d69e9bc2a1aef970ca383f504a4779.exe 08812395ae9ee8cced9280aa0da4186a06d69e9bc2a1aef970ca383f504a4779.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
08812395ae9ee8cced9280aa0da4186a06d69e9bc2a1aef970ca383f504a4779.exe08812395ae9ee8cced9280aa0da4186a06d69e9bc2a1aef970ca383f504a4779.exedescription pid process Token: SeDebugPrivilege 4388 08812395ae9ee8cced9280aa0da4186a06d69e9bc2a1aef970ca383f504a4779.exe Token: SeDebugPrivilege 4196 08812395ae9ee8cced9280aa0da4186a06d69e9bc2a1aef970ca383f504a4779.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
08812395ae9ee8cced9280aa0da4186a06d69e9bc2a1aef970ca383f504a4779.exedescription pid process target process PID 4388 wrote to memory of 4196 4388 08812395ae9ee8cced9280aa0da4186a06d69e9bc2a1aef970ca383f504a4779.exe 08812395ae9ee8cced9280aa0da4186a06d69e9bc2a1aef970ca383f504a4779.exe PID 4388 wrote to memory of 4196 4388 08812395ae9ee8cced9280aa0da4186a06d69e9bc2a1aef970ca383f504a4779.exe 08812395ae9ee8cced9280aa0da4186a06d69e9bc2a1aef970ca383f504a4779.exe PID 4388 wrote to memory of 4196 4388 08812395ae9ee8cced9280aa0da4186a06d69e9bc2a1aef970ca383f504a4779.exe 08812395ae9ee8cced9280aa0da4186a06d69e9bc2a1aef970ca383f504a4779.exe PID 4388 wrote to memory of 4196 4388 08812395ae9ee8cced9280aa0da4186a06d69e9bc2a1aef970ca383f504a4779.exe 08812395ae9ee8cced9280aa0da4186a06d69e9bc2a1aef970ca383f504a4779.exe PID 4388 wrote to memory of 4196 4388 08812395ae9ee8cced9280aa0da4186a06d69e9bc2a1aef970ca383f504a4779.exe 08812395ae9ee8cced9280aa0da4186a06d69e9bc2a1aef970ca383f504a4779.exe PID 4388 wrote to memory of 4196 4388 08812395ae9ee8cced9280aa0da4186a06d69e9bc2a1aef970ca383f504a4779.exe 08812395ae9ee8cced9280aa0da4186a06d69e9bc2a1aef970ca383f504a4779.exe PID 4388 wrote to memory of 4196 4388 08812395ae9ee8cced9280aa0da4186a06d69e9bc2a1aef970ca383f504a4779.exe 08812395ae9ee8cced9280aa0da4186a06d69e9bc2a1aef970ca383f504a4779.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\08812395ae9ee8cced9280aa0da4186a06d69e9bc2a1aef970ca383f504a4779.exe"C:\Users\Admin\AppData\Local\Temp\08812395ae9ee8cced9280aa0da4186a06d69e9bc2a1aef970ca383f504a4779.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\08812395ae9ee8cced9280aa0da4186a06d69e9bc2a1aef970ca383f504a4779.exe"C:\Users\Admin\AppData\Local\Temp\08812395ae9ee8cced9280aa0da4186a06d69e9bc2a1aef970ca383f504a4779.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4196