Analysis
-
max time kernel
149s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-06-2022 03:22
Static task
static1
Behavioral task
behavioral1
Sample
308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849.exe
Resource
win10v2004-20220414-en
General
-
Target
308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849.exe
-
Size
59KB
-
MD5
574684c7708d5026e2cc84df0bf873f7
-
SHA1
3f2332101004dae325affce9f3867a34ac03a82a
-
SHA256
308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849
-
SHA512
beec7b8759df71d4adcf9c134a2374cc91d1ca35f84e5345d94899ca05570daeb63270f3d8f8012f06e654ee317cb626a3f26af5ac71d8dec6bc87e7b467380b
Malware Config
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
RevengeRat Executable 12 IoCs
Processes:
resource yara_rule behavioral1/memory/1788-60-0x0000000000400000-0x0000000000416000-memory.dmp revengerat behavioral1/memory/1788-59-0x0000000000400000-0x0000000000416000-memory.dmp revengerat behavioral1/memory/1788-61-0x0000000000400000-0x0000000000416000-memory.dmp revengerat behavioral1/memory/1788-62-0x000000000041065E-mapping.dmp revengerat behavioral1/memory/1788-65-0x0000000000400000-0x0000000000416000-memory.dmp revengerat \Windows\SysWOW64\Runtime Broker.exe revengerat \Windows\SysWOW64\Runtime Broker.exe revengerat C:\Windows\SysWOW64\Runtime Broker.exe revengerat C:\Windows\SysWOW64\Runtime Broker.exe revengerat behavioral1/memory/996-93-0x000000000041065E-mapping.dmp revengerat \Windows\SysWOW64\Runtime Broker.exe revengerat C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Runtime Broker.exe revengerat -
Executes dropped EXE 1 IoCs
Processes:
Runtime Broker.exepid process 824 Runtime Broker.exe -
Drops startup file 7 IoCs
Processes:
MSBuild.exevbc.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Runtime Broker.exe MSBuild.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Runtime Broker.exe MSBuild.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Runtime Broker.vbs MSBuild.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Runtime Broker.js MSBuild.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Runtime Broker.lnk MSBuild.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Runtime Broker.URL MSBuild.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Runtime Broker.exe vbc.exe -
Loads dropped DLL 3 IoCs
Processes:
MSBuild.exeMSBuild.exepid process 1788 MSBuild.exe 1788 MSBuild.exe 996 MSBuild.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
MSBuild.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run\Runtime Broker = "C:\\Windows\\SysWOW64\\Runtime Broker.exe" MSBuild.exe -
Drops file in System32 directory 4 IoCs
Processes:
MSBuild.exeMSBuild.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Runtime Broker.exe MSBuild.exe File opened for modification C:\Windows\SysWOW64\Runtime Broker.exe MSBuild.exe File created C:\Windows\SysWOW64\Runtime Broker.exe MSBuild.exe File created C:\Windows\SysWOW64\Runtime Broker.exe MSBuild.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849.exeMSBuild.exeRuntime Broker.exeMSBuild.exedescription pid process target process PID 1672 set thread context of 1788 1672 308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849.exe MSBuild.exe PID 1788 set thread context of 1284 1788 MSBuild.exe MSBuild.exe PID 824 set thread context of 996 824 Runtime Broker.exe MSBuild.exe PID 996 set thread context of 1584 996 MSBuild.exe MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 1640 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849.exeMSBuild.exeRuntime Broker.exeMSBuild.exepowershell.exedescription pid process Token: SeDebugPrivilege 1672 308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849.exe Token: SeDebugPrivilege 1788 MSBuild.exe Token: SeDebugPrivilege 824 Runtime Broker.exe Token: SeDebugPrivilege 996 MSBuild.exe Token: SeDebugPrivilege 1640 powershell.exe -
Suspicious use of WriteProcessMemory 52 IoCs
Processes:
308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849.exeMSBuild.exeRuntime Broker.exeMSBuild.exevbc.exedescription pid process target process PID 1672 wrote to memory of 1788 1672 308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849.exe MSBuild.exe PID 1672 wrote to memory of 1788 1672 308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849.exe MSBuild.exe PID 1672 wrote to memory of 1788 1672 308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849.exe MSBuild.exe PID 1672 wrote to memory of 1788 1672 308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849.exe MSBuild.exe PID 1672 wrote to memory of 1788 1672 308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849.exe MSBuild.exe PID 1672 wrote to memory of 1788 1672 308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849.exe MSBuild.exe PID 1672 wrote to memory of 1788 1672 308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849.exe MSBuild.exe PID 1672 wrote to memory of 1788 1672 308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849.exe MSBuild.exe PID 1672 wrote to memory of 1788 1672 308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849.exe MSBuild.exe PID 1788 wrote to memory of 1284 1788 MSBuild.exe MSBuild.exe PID 1788 wrote to memory of 1284 1788 MSBuild.exe MSBuild.exe PID 1788 wrote to memory of 1284 1788 MSBuild.exe MSBuild.exe PID 1788 wrote to memory of 1284 1788 MSBuild.exe MSBuild.exe PID 1788 wrote to memory of 1284 1788 MSBuild.exe MSBuild.exe PID 1788 wrote to memory of 1284 1788 MSBuild.exe MSBuild.exe PID 1788 wrote to memory of 1284 1788 MSBuild.exe MSBuild.exe PID 1788 wrote to memory of 1284 1788 MSBuild.exe MSBuild.exe PID 1788 wrote to memory of 1284 1788 MSBuild.exe MSBuild.exe PID 1788 wrote to memory of 824 1788 MSBuild.exe Runtime Broker.exe PID 1788 wrote to memory of 824 1788 MSBuild.exe Runtime Broker.exe PID 1788 wrote to memory of 824 1788 MSBuild.exe Runtime Broker.exe PID 1788 wrote to memory of 824 1788 MSBuild.exe Runtime Broker.exe PID 824 wrote to memory of 996 824 Runtime Broker.exe MSBuild.exe PID 824 wrote to memory of 996 824 Runtime Broker.exe MSBuild.exe PID 824 wrote to memory of 996 824 Runtime Broker.exe MSBuild.exe PID 824 wrote to memory of 996 824 Runtime Broker.exe MSBuild.exe PID 824 wrote to memory of 996 824 Runtime Broker.exe MSBuild.exe PID 824 wrote to memory of 996 824 Runtime Broker.exe MSBuild.exe PID 824 wrote to memory of 996 824 Runtime Broker.exe MSBuild.exe PID 824 wrote to memory of 996 824 Runtime Broker.exe MSBuild.exe PID 824 wrote to memory of 996 824 Runtime Broker.exe MSBuild.exe PID 996 wrote to memory of 1584 996 MSBuild.exe MSBuild.exe PID 996 wrote to memory of 1584 996 MSBuild.exe MSBuild.exe PID 996 wrote to memory of 1584 996 MSBuild.exe MSBuild.exe PID 996 wrote to memory of 1584 996 MSBuild.exe MSBuild.exe PID 996 wrote to memory of 1584 996 MSBuild.exe MSBuild.exe PID 996 wrote to memory of 1584 996 MSBuild.exe MSBuild.exe PID 996 wrote to memory of 1584 996 MSBuild.exe MSBuild.exe PID 996 wrote to memory of 1584 996 MSBuild.exe MSBuild.exe PID 996 wrote to memory of 1584 996 MSBuild.exe MSBuild.exe PID 996 wrote to memory of 668 996 MSBuild.exe vbc.exe PID 996 wrote to memory of 668 996 MSBuild.exe vbc.exe PID 996 wrote to memory of 668 996 MSBuild.exe vbc.exe PID 996 wrote to memory of 668 996 MSBuild.exe vbc.exe PID 668 wrote to memory of 1664 668 vbc.exe cvtres.exe PID 668 wrote to memory of 1664 668 vbc.exe cvtres.exe PID 668 wrote to memory of 1664 668 vbc.exe cvtres.exe PID 668 wrote to memory of 1664 668 vbc.exe cvtres.exe PID 996 wrote to memory of 1640 996 MSBuild.exe powershell.exe PID 996 wrote to memory of 1640 996 MSBuild.exe powershell.exe PID 996 wrote to memory of 1640 996 MSBuild.exe powershell.exe PID 996 wrote to memory of 1640 996 MSBuild.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849.exe"C:\Users\Admin\AppData\Local\Temp\308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
-
C:\Windows\SysWOW64\Runtime Broker.exe"C:\Windows\system32\Runtime Broker.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"5⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\g2el3jnr\g2el3jnr.cmdline"5⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4E50.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcCB86B860191148B69849F072CD4D518.TMP"6⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Bypass -Command [System.Reflection.Assembly]::LoadWithPartialName('System.Windows.Forms'); [System.Windows.Forms.MessageBox]::Show('An error has occured. Please check your network connection and try again.','Error',0,64)5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RES4E50.tmpFilesize
1KB
MD51b830adaa951f65b1d40e439e68fd2e0
SHA1240af2d458fbc3b3e4b8be1144493b776826eefa
SHA256fcee8af1148aa5b8579f9f50a7f48022ab7821a31766b133d60c47c87b6f3000
SHA512cba48a01e77b2b25ca456a5b5b8056c21ab6dddabf2b9b7bbdf51b9ec858dda3a48b01cc62098a2fff7970c71fdeb8d75eda8c184545406f8ff6dba49e59c3f1
-
C:\Users\Admin\AppData\Local\Temp\TClgZbl.txtFilesize
38B
MD5be91c70e14c266673639d11c977277c2
SHA16bf9d1b5fbbff110f22c45b31fc97f809b662085
SHA25603f10b635ccef9dbda36a44acef477884951ed6cb6bbb259f007e448bc8247f7
SHA512da4ea42b4173ef864742e5501f287590f14f297de99b578deb675002b05a46f64b68b9740197fb7d7f0882b803f9327fd963c65b0aa39f189cc3dcab15e903a3
-
C:\Users\Admin\AppData\Local\Temp\TClgZbl.txtFilesize
102B
MD51718208f896b88ffc888b81dbdabd99c
SHA1de6ceb079a302b8b62065b7e4713cc4ce7e1e896
SHA2568ad42699a1d2c5ec710b5d115471e925c3124841d8d96306fb37e04f6bcf28bb
SHA512f9fb833ea843e9acb0602e2b9910a83a9e8c0876b8650e350823fbe60ab00f2f2723dc72d3976890bbeb45be947dd89dbe41a0d1d2feba1eb242754f3272c81c
-
C:\Users\Admin\AppData\Local\Temp\g2el3jnr\g2el3jnr.0.vbFilesize
148B
MD54a35458c5bdea8dc5f97e3f6c372118e
SHA14b45d9ba074f6fc4c18e83042c7cae82cf878002
SHA256e08be9d9122f794377db464d0f227725abb48ba066356644180e6422f1cf3aeb
SHA5123e5dc48c199f61394a82051f7c8ee2dcf7906fa0d545515d658b79ff7a6081edc4248350c78a699035960f8fdf3860b4377c069261e3e378f49558a18c57eb88
-
C:\Users\Admin\AppData\Local\Temp\g2el3jnr\g2el3jnr.cmdlineFilesize
211B
MD56bea2ef5164d5c082f6f77efeae2baf3
SHA1204b5f55d1c2684e27bb292d7369c440728cefba
SHA256c907ef482d0fd1d95b4aceb88a34536dc07349a806aa669634eda2963004e9ad
SHA5124b8c60f0d9bd05f7a3a6468b7be99dd50c5d1348074b575ba384a6f43a62f29eb6a0aa2926051ba451b96c24eab02885fa123113050321c774a668b1a5f24266
-
C:\Users\Admin\AppData\Local\Temp\vbcCB86B860191148B69849F072CD4D518.TMPFilesize
1KB
MD5e6132e74bebb81d249cd2fc7ecd361f8
SHA1eecac3bcb7d1e4f578eb7a78cdfcf81bf4fa4646
SHA25657c75a89ad2f52797ca82cedd96226df71a389fd2bda6acd9fb5c5791a74b8c6
SHA5122d4f243ca4da178702bb6381e12ae9f8bcfe8ed8baa370c9a1d6124b27b2f6f7d65aeba988338d28f8671d868517438b922d56edfee40fbfbed76e741c68575a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Runtime Broker.exeFilesize
59KB
MD5574684c7708d5026e2cc84df0bf873f7
SHA13f2332101004dae325affce9f3867a34ac03a82a
SHA256308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849
SHA512beec7b8759df71d4adcf9c134a2374cc91d1ca35f84e5345d94899ca05570daeb63270f3d8f8012f06e654ee317cb626a3f26af5ac71d8dec6bc87e7b467380b
-
C:\Windows\SysWOW64\Runtime Broker.exeFilesize
59KB
MD5574684c7708d5026e2cc84df0bf873f7
SHA13f2332101004dae325affce9f3867a34ac03a82a
SHA256308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849
SHA512beec7b8759df71d4adcf9c134a2374cc91d1ca35f84e5345d94899ca05570daeb63270f3d8f8012f06e654ee317cb626a3f26af5ac71d8dec6bc87e7b467380b
-
C:\Windows\SysWOW64\Runtime Broker.exeFilesize
59KB
MD5574684c7708d5026e2cc84df0bf873f7
SHA13f2332101004dae325affce9f3867a34ac03a82a
SHA256308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849
SHA512beec7b8759df71d4adcf9c134a2374cc91d1ca35f84e5345d94899ca05570daeb63270f3d8f8012f06e654ee317cb626a3f26af5ac71d8dec6bc87e7b467380b
-
\Windows\SysWOW64\Runtime Broker.exeFilesize
59KB
MD5574684c7708d5026e2cc84df0bf873f7
SHA13f2332101004dae325affce9f3867a34ac03a82a
SHA256308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849
SHA512beec7b8759df71d4adcf9c134a2374cc91d1ca35f84e5345d94899ca05570daeb63270f3d8f8012f06e654ee317cb626a3f26af5ac71d8dec6bc87e7b467380b
-
\Windows\SysWOW64\Runtime Broker.exeFilesize
59KB
MD5574684c7708d5026e2cc84df0bf873f7
SHA13f2332101004dae325affce9f3867a34ac03a82a
SHA256308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849
SHA512beec7b8759df71d4adcf9c134a2374cc91d1ca35f84e5345d94899ca05570daeb63270f3d8f8012f06e654ee317cb626a3f26af5ac71d8dec6bc87e7b467380b
-
\Windows\SysWOW64\Runtime Broker.exeFilesize
59KB
MD5574684c7708d5026e2cc84df0bf873f7
SHA13f2332101004dae325affce9f3867a34ac03a82a
SHA256308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849
SHA512beec7b8759df71d4adcf9c134a2374cc91d1ca35f84e5345d94899ca05570daeb63270f3d8f8012f06e654ee317cb626a3f26af5ac71d8dec6bc87e7b467380b
-
memory/668-112-0x0000000000000000-mapping.dmp
-
memory/824-82-0x0000000000000000-mapping.dmp
-
memory/824-95-0x0000000074240000-0x00000000747EB000-memory.dmpFilesize
5.7MB
-
memory/824-88-0x0000000074240000-0x00000000747EB000-memory.dmpFilesize
5.7MB
-
memory/996-93-0x000000000041065E-mapping.dmp
-
memory/1284-67-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/1284-71-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/1284-66-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/1284-76-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/1284-78-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/1284-69-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/1284-73-0x0000000000439A92-mapping.dmp
-
memory/1284-72-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/1584-104-0x0000000000439A92-mapping.dmp
-
memory/1640-122-0x000000006EDC0000-0x000000006F36B000-memory.dmpFilesize
5.7MB
-
memory/1640-121-0x000000006EDC0000-0x000000006F36B000-memory.dmpFilesize
5.7MB
-
memory/1640-119-0x0000000000000000-mapping.dmp
-
memory/1664-116-0x0000000000000000-mapping.dmp
-
memory/1672-64-0x0000000074860000-0x0000000074E0B000-memory.dmpFilesize
5.7MB
-
memory/1672-54-0x00000000763C1000-0x00000000763C3000-memory.dmpFilesize
8KB
-
memory/1672-55-0x0000000074860000-0x0000000074E0B000-memory.dmpFilesize
5.7MB
-
memory/1788-59-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1788-60-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1788-57-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1788-56-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1788-61-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1788-62-0x000000000041065E-mapping.dmp
-
memory/1788-65-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB