Analysis

  • max time kernel
    149s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-06-2022 03:22

General

  • Target

    308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849.exe

  • Size

    59KB

  • MD5

    574684c7708d5026e2cc84df0bf873f7

  • SHA1

    3f2332101004dae325affce9f3867a34ac03a82a

  • SHA256

    308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849

  • SHA512

    beec7b8759df71d4adcf9c134a2374cc91d1ca35f84e5345d94899ca05570daeb63270f3d8f8012f06e654ee317cb626a3f26af5ac71d8dec6bc87e7b467380b

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • RevengeRat Executable 12 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops startup file 7 IoCs
  • Loads dropped DLL 3 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849.exe
    "C:\Users\Admin\AppData\Local\Temp\308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1788
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
        3⤵
          PID:1284
        • C:\Windows\SysWOW64\Runtime Broker.exe
          "C:\Windows\system32\Runtime Broker.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:824
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
            4⤵
            • Drops startup file
            • Loads dropped DLL
            • Adds Run key to start application
            • Drops file in System32 directory
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:996
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
              5⤵
                PID:1584
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\g2el3jnr\g2el3jnr.cmdline"
                5⤵
                • Drops startup file
                • Suspicious use of WriteProcessMemory
                PID:668
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4E50.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcCB86B860191148B69849F072CD4D518.TMP"
                  6⤵
                    PID:1664
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -ExecutionPolicy Bypass -Command [System.Reflection.Assembly]::LoadWithPartialName('System.Windows.Forms'); [System.Windows.Forms.MessageBox]::Show('An error has occured. Please check your network connection and try again.','Error',0,64)
                  5⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1640

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Execution

        Scripting

        1
        T1064

        Persistence

        Registry Run Keys / Startup Folder

        1
        T1060

        Defense Evasion

        Scripting

        1
        T1064

        Modify Registry

        1
        T1112

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\RES4E50.tmp
          Filesize

          1KB

          MD5

          1b830adaa951f65b1d40e439e68fd2e0

          SHA1

          240af2d458fbc3b3e4b8be1144493b776826eefa

          SHA256

          fcee8af1148aa5b8579f9f50a7f48022ab7821a31766b133d60c47c87b6f3000

          SHA512

          cba48a01e77b2b25ca456a5b5b8056c21ab6dddabf2b9b7bbdf51b9ec858dda3a48b01cc62098a2fff7970c71fdeb8d75eda8c184545406f8ff6dba49e59c3f1

        • C:\Users\Admin\AppData\Local\Temp\TClgZbl.txt
          Filesize

          38B

          MD5

          be91c70e14c266673639d11c977277c2

          SHA1

          6bf9d1b5fbbff110f22c45b31fc97f809b662085

          SHA256

          03f10b635ccef9dbda36a44acef477884951ed6cb6bbb259f007e448bc8247f7

          SHA512

          da4ea42b4173ef864742e5501f287590f14f297de99b578deb675002b05a46f64b68b9740197fb7d7f0882b803f9327fd963c65b0aa39f189cc3dcab15e903a3

        • C:\Users\Admin\AppData\Local\Temp\TClgZbl.txt
          Filesize

          102B

          MD5

          1718208f896b88ffc888b81dbdabd99c

          SHA1

          de6ceb079a302b8b62065b7e4713cc4ce7e1e896

          SHA256

          8ad42699a1d2c5ec710b5d115471e925c3124841d8d96306fb37e04f6bcf28bb

          SHA512

          f9fb833ea843e9acb0602e2b9910a83a9e8c0876b8650e350823fbe60ab00f2f2723dc72d3976890bbeb45be947dd89dbe41a0d1d2feba1eb242754f3272c81c

        • C:\Users\Admin\AppData\Local\Temp\g2el3jnr\g2el3jnr.0.vb
          Filesize

          148B

          MD5

          4a35458c5bdea8dc5f97e3f6c372118e

          SHA1

          4b45d9ba074f6fc4c18e83042c7cae82cf878002

          SHA256

          e08be9d9122f794377db464d0f227725abb48ba066356644180e6422f1cf3aeb

          SHA512

          3e5dc48c199f61394a82051f7c8ee2dcf7906fa0d545515d658b79ff7a6081edc4248350c78a699035960f8fdf3860b4377c069261e3e378f49558a18c57eb88

        • C:\Users\Admin\AppData\Local\Temp\g2el3jnr\g2el3jnr.cmdline
          Filesize

          211B

          MD5

          6bea2ef5164d5c082f6f77efeae2baf3

          SHA1

          204b5f55d1c2684e27bb292d7369c440728cefba

          SHA256

          c907ef482d0fd1d95b4aceb88a34536dc07349a806aa669634eda2963004e9ad

          SHA512

          4b8c60f0d9bd05f7a3a6468b7be99dd50c5d1348074b575ba384a6f43a62f29eb6a0aa2926051ba451b96c24eab02885fa123113050321c774a668b1a5f24266

        • C:\Users\Admin\AppData\Local\Temp\vbcCB86B860191148B69849F072CD4D518.TMP
          Filesize

          1KB

          MD5

          e6132e74bebb81d249cd2fc7ecd361f8

          SHA1

          eecac3bcb7d1e4f578eb7a78cdfcf81bf4fa4646

          SHA256

          57c75a89ad2f52797ca82cedd96226df71a389fd2bda6acd9fb5c5791a74b8c6

          SHA512

          2d4f243ca4da178702bb6381e12ae9f8bcfe8ed8baa370c9a1d6124b27b2f6f7d65aeba988338d28f8671d868517438b922d56edfee40fbfbed76e741c68575a

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Runtime Broker.exe
          Filesize

          59KB

          MD5

          574684c7708d5026e2cc84df0bf873f7

          SHA1

          3f2332101004dae325affce9f3867a34ac03a82a

          SHA256

          308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849

          SHA512

          beec7b8759df71d4adcf9c134a2374cc91d1ca35f84e5345d94899ca05570daeb63270f3d8f8012f06e654ee317cb626a3f26af5ac71d8dec6bc87e7b467380b

        • C:\Windows\SysWOW64\Runtime Broker.exe
          Filesize

          59KB

          MD5

          574684c7708d5026e2cc84df0bf873f7

          SHA1

          3f2332101004dae325affce9f3867a34ac03a82a

          SHA256

          308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849

          SHA512

          beec7b8759df71d4adcf9c134a2374cc91d1ca35f84e5345d94899ca05570daeb63270f3d8f8012f06e654ee317cb626a3f26af5ac71d8dec6bc87e7b467380b

        • C:\Windows\SysWOW64\Runtime Broker.exe
          Filesize

          59KB

          MD5

          574684c7708d5026e2cc84df0bf873f7

          SHA1

          3f2332101004dae325affce9f3867a34ac03a82a

          SHA256

          308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849

          SHA512

          beec7b8759df71d4adcf9c134a2374cc91d1ca35f84e5345d94899ca05570daeb63270f3d8f8012f06e654ee317cb626a3f26af5ac71d8dec6bc87e7b467380b

        • \Windows\SysWOW64\Runtime Broker.exe
          Filesize

          59KB

          MD5

          574684c7708d5026e2cc84df0bf873f7

          SHA1

          3f2332101004dae325affce9f3867a34ac03a82a

          SHA256

          308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849

          SHA512

          beec7b8759df71d4adcf9c134a2374cc91d1ca35f84e5345d94899ca05570daeb63270f3d8f8012f06e654ee317cb626a3f26af5ac71d8dec6bc87e7b467380b

        • \Windows\SysWOW64\Runtime Broker.exe
          Filesize

          59KB

          MD5

          574684c7708d5026e2cc84df0bf873f7

          SHA1

          3f2332101004dae325affce9f3867a34ac03a82a

          SHA256

          308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849

          SHA512

          beec7b8759df71d4adcf9c134a2374cc91d1ca35f84e5345d94899ca05570daeb63270f3d8f8012f06e654ee317cb626a3f26af5ac71d8dec6bc87e7b467380b

        • \Windows\SysWOW64\Runtime Broker.exe
          Filesize

          59KB

          MD5

          574684c7708d5026e2cc84df0bf873f7

          SHA1

          3f2332101004dae325affce9f3867a34ac03a82a

          SHA256

          308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849

          SHA512

          beec7b8759df71d4adcf9c134a2374cc91d1ca35f84e5345d94899ca05570daeb63270f3d8f8012f06e654ee317cb626a3f26af5ac71d8dec6bc87e7b467380b

        • memory/668-112-0x0000000000000000-mapping.dmp
        • memory/824-82-0x0000000000000000-mapping.dmp
        • memory/824-95-0x0000000074240000-0x00000000747EB000-memory.dmp
          Filesize

          5.7MB

        • memory/824-88-0x0000000074240000-0x00000000747EB000-memory.dmp
          Filesize

          5.7MB

        • memory/996-93-0x000000000041065E-mapping.dmp
        • memory/1284-67-0x0000000000400000-0x0000000000440000-memory.dmp
          Filesize

          256KB

        • memory/1284-71-0x0000000000400000-0x0000000000440000-memory.dmp
          Filesize

          256KB

        • memory/1284-66-0x0000000000400000-0x0000000000440000-memory.dmp
          Filesize

          256KB

        • memory/1284-76-0x0000000000400000-0x0000000000440000-memory.dmp
          Filesize

          256KB

        • memory/1284-78-0x0000000000400000-0x0000000000440000-memory.dmp
          Filesize

          256KB

        • memory/1284-69-0x0000000000400000-0x0000000000440000-memory.dmp
          Filesize

          256KB

        • memory/1284-73-0x0000000000439A92-mapping.dmp
        • memory/1284-72-0x0000000000400000-0x0000000000440000-memory.dmp
          Filesize

          256KB

        • memory/1584-104-0x0000000000439A92-mapping.dmp
        • memory/1640-122-0x000000006EDC0000-0x000000006F36B000-memory.dmp
          Filesize

          5.7MB

        • memory/1640-121-0x000000006EDC0000-0x000000006F36B000-memory.dmp
          Filesize

          5.7MB

        • memory/1640-119-0x0000000000000000-mapping.dmp
        • memory/1664-116-0x0000000000000000-mapping.dmp
        • memory/1672-64-0x0000000074860000-0x0000000074E0B000-memory.dmp
          Filesize

          5.7MB

        • memory/1672-54-0x00000000763C1000-0x00000000763C3000-memory.dmp
          Filesize

          8KB

        • memory/1672-55-0x0000000074860000-0x0000000074E0B000-memory.dmp
          Filesize

          5.7MB

        • memory/1788-59-0x0000000000400000-0x0000000000416000-memory.dmp
          Filesize

          88KB

        • memory/1788-60-0x0000000000400000-0x0000000000416000-memory.dmp
          Filesize

          88KB

        • memory/1788-57-0x0000000000400000-0x0000000000416000-memory.dmp
          Filesize

          88KB

        • memory/1788-56-0x0000000000400000-0x0000000000416000-memory.dmp
          Filesize

          88KB

        • memory/1788-61-0x0000000000400000-0x0000000000416000-memory.dmp
          Filesize

          88KB

        • memory/1788-62-0x000000000041065E-mapping.dmp
        • memory/1788-65-0x0000000000400000-0x0000000000416000-memory.dmp
          Filesize

          88KB