Analysis
-
max time kernel
222s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-06-2022 03:22
Static task
static1
Behavioral task
behavioral1
Sample
308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849.exe
Resource
win10v2004-20220414-en
General
-
Target
308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849.exe
-
Size
59KB
-
MD5
574684c7708d5026e2cc84df0bf873f7
-
SHA1
3f2332101004dae325affce9f3867a34ac03a82a
-
SHA256
308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849
-
SHA512
beec7b8759df71d4adcf9c134a2374cc91d1ca35f84e5345d94899ca05570daeb63270f3d8f8012f06e654ee317cb626a3f26af5ac71d8dec6bc87e7b467380b
Malware Config
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
RevengeRat Executable 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1996-133-0x0000000000430000-0x0000000000446000-memory.dmp revengerat behavioral2/memory/1996-136-0x0000000000430000-0x0000000000446000-memory.dmp revengerat behavioral2/memory/1996-138-0x0000000000430000-0x0000000000446000-memory.dmp revengerat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849.exedescription pid process target process PID 4112 set thread context of 1996 4112 308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849.exe MSBuild.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4236 1996 WerFault.exe MSBuild.exe 2344 1996 WerFault.exe MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849.exedescription pid process Token: SeDebugPrivilege 4112 308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849.exedescription pid process target process PID 4112 wrote to memory of 1996 4112 308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849.exe MSBuild.exe PID 4112 wrote to memory of 1996 4112 308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849.exe MSBuild.exe PID 4112 wrote to memory of 1996 4112 308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849.exe MSBuild.exe PID 4112 wrote to memory of 1996 4112 308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849.exe MSBuild.exe PID 4112 wrote to memory of 1996 4112 308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849.exe MSBuild.exe PID 4112 wrote to memory of 1996 4112 308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849.exe MSBuild.exe PID 4112 wrote to memory of 1996 4112 308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849.exe MSBuild.exe PID 4112 wrote to memory of 1996 4112 308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849.exe"C:\Users\Admin\AppData\Local\Temp\308eb7c2fd6238b8194d33348051db21de2e93cda17aee8fcefe1ada21ef0849.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1996 -s 1963⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1996 -s 2003⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1996 -ip 19961⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1996 -ip 19961⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1996-131-0x0000000000000000-mapping.dmp
-
memory/1996-133-0x0000000000430000-0x0000000000446000-memory.dmpFilesize
88KB
-
memory/1996-136-0x0000000000430000-0x0000000000446000-memory.dmpFilesize
88KB
-
memory/1996-138-0x0000000000430000-0x0000000000446000-memory.dmpFilesize
88KB
-
memory/4112-130-0x0000000074890000-0x0000000074E41000-memory.dmpFilesize
5.7MB
-
memory/4112-135-0x0000000074890000-0x0000000074E41000-memory.dmpFilesize
5.7MB