Analysis
-
max time kernel
142s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
03-07-2022 05:11
Static task
static1
Behavioral task
behavioral1
Sample
3cd3b7ca84a4c44fa8080b1c7df713f6de0a9d36644732665625590e919db7ea.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3cd3b7ca84a4c44fa8080b1c7df713f6de0a9d36644732665625590e919db7ea.exe
Resource
win10v2004-20220414-en
General
-
Target
3cd3b7ca84a4c44fa8080b1c7df713f6de0a9d36644732665625590e919db7ea.exe
-
Size
345KB
-
MD5
625c5be82cb33b45e21c521995e543f7
-
SHA1
acf0d26d067696b2c93015e83b3811cf96f90510
-
SHA256
3cd3b7ca84a4c44fa8080b1c7df713f6de0a9d36644732665625590e919db7ea
-
SHA512
351ee2bcfeeb91de93081fe763a20b99b0e9493db6fda8eee0de336b6a963610dd5b8160b32490c06dd53f6b1aaab1be4e8ed6da79338c57b53df7389d35cd06
Malware Config
Extracted
revengerat
Extracted
revengerat
CEO
192.168.1.4:666
192.168.1.4:1716
netking.duckdns.org:666
netking.duckdns.org:1716
RV_MUTEX-LuSAtYBxGgZH
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
RevengeRat Executable 6 IoCs
Processes:
resource yara_rule behavioral1/memory/924-67-0x0000000000560000-0x0000000000568000-memory.dmp revengerat behavioral1/memory/1972-71-0x0000000000400000-0x0000000000408000-memory.dmp revengerat behavioral1/memory/1972-72-0x0000000000400000-0x0000000000408000-memory.dmp revengerat behavioral1/memory/1972-73-0x0000000000405DFE-mapping.dmp revengerat behavioral1/memory/1972-77-0x0000000000400000-0x0000000000408000-memory.dmp revengerat behavioral1/memory/1972-75-0x0000000000400000-0x0000000000408000-memory.dmp revengerat -
Drops startup file 1 IoCs
Processes:
3cd3b7ca84a4c44fa8080b1c7df713f6de0a9d36644732665625590e919db7ea.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VEOOqq.url 3cd3b7ca84a4c44fa8080b1c7df713f6de0a9d36644732665625590e919db7ea.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
3cd3b7ca84a4c44fa8080b1c7df713f6de0a9d36644732665625590e919db7ea.exedescription pid process target process PID 924 set thread context of 1972 924 3cd3b7ca84a4c44fa8080b1c7df713f6de0a9d36644732665625590e919db7ea.exe RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
3cd3b7ca84a4c44fa8080b1c7df713f6de0a9d36644732665625590e919db7ea.exepid process 924 3cd3b7ca84a4c44fa8080b1c7df713f6de0a9d36644732665625590e919db7ea.exe 924 3cd3b7ca84a4c44fa8080b1c7df713f6de0a9d36644732665625590e919db7ea.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
3cd3b7ca84a4c44fa8080b1c7df713f6de0a9d36644732665625590e919db7ea.exeRegAsm.exedescription pid process Token: SeDebugPrivilege 924 3cd3b7ca84a4c44fa8080b1c7df713f6de0a9d36644732665625590e919db7ea.exe Token: SeDebugPrivilege 1972 RegAsm.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
3cd3b7ca84a4c44fa8080b1c7df713f6de0a9d36644732665625590e919db7ea.execsc.exedescription pid process target process PID 924 wrote to memory of 960 924 3cd3b7ca84a4c44fa8080b1c7df713f6de0a9d36644732665625590e919db7ea.exe csc.exe PID 924 wrote to memory of 960 924 3cd3b7ca84a4c44fa8080b1c7df713f6de0a9d36644732665625590e919db7ea.exe csc.exe PID 924 wrote to memory of 960 924 3cd3b7ca84a4c44fa8080b1c7df713f6de0a9d36644732665625590e919db7ea.exe csc.exe PID 924 wrote to memory of 960 924 3cd3b7ca84a4c44fa8080b1c7df713f6de0a9d36644732665625590e919db7ea.exe csc.exe PID 960 wrote to memory of 1480 960 csc.exe cvtres.exe PID 960 wrote to memory of 1480 960 csc.exe cvtres.exe PID 960 wrote to memory of 1480 960 csc.exe cvtres.exe PID 960 wrote to memory of 1480 960 csc.exe cvtres.exe PID 924 wrote to memory of 1972 924 3cd3b7ca84a4c44fa8080b1c7df713f6de0a9d36644732665625590e919db7ea.exe RegAsm.exe PID 924 wrote to memory of 1972 924 3cd3b7ca84a4c44fa8080b1c7df713f6de0a9d36644732665625590e919db7ea.exe RegAsm.exe PID 924 wrote to memory of 1972 924 3cd3b7ca84a4c44fa8080b1c7df713f6de0a9d36644732665625590e919db7ea.exe RegAsm.exe PID 924 wrote to memory of 1972 924 3cd3b7ca84a4c44fa8080b1c7df713f6de0a9d36644732665625590e919db7ea.exe RegAsm.exe PID 924 wrote to memory of 1972 924 3cd3b7ca84a4c44fa8080b1c7df713f6de0a9d36644732665625590e919db7ea.exe RegAsm.exe PID 924 wrote to memory of 1972 924 3cd3b7ca84a4c44fa8080b1c7df713f6de0a9d36644732665625590e919db7ea.exe RegAsm.exe PID 924 wrote to memory of 1972 924 3cd3b7ca84a4c44fa8080b1c7df713f6de0a9d36644732665625590e919db7ea.exe RegAsm.exe PID 924 wrote to memory of 1972 924 3cd3b7ca84a4c44fa8080b1c7df713f6de0a9d36644732665625590e919db7ea.exe RegAsm.exe PID 924 wrote to memory of 1972 924 3cd3b7ca84a4c44fa8080b1c7df713f6de0a9d36644732665625590e919db7ea.exe RegAsm.exe PID 924 wrote to memory of 1972 924 3cd3b7ca84a4c44fa8080b1c7df713f6de0a9d36644732665625590e919db7ea.exe RegAsm.exe PID 924 wrote to memory of 1972 924 3cd3b7ca84a4c44fa8080b1c7df713f6de0a9d36644732665625590e919db7ea.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3cd3b7ca84a4c44fa8080b1c7df713f6de0a9d36644732665625590e919db7ea.exe"C:\Users\Admin\AppData\Local\Temp\3cd3b7ca84a4c44fa8080b1c7df713f6de0a9d36644732665625590e919db7ea.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\0fmzq3br\0fmzq3br.cmdline"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF99C.tmp" "c:\Users\Admin\AppData\Local\Temp\0fmzq3br\CSC9B0A0C614BEA451592B6493C7FA747F.TMP"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\0fmzq3br\0fmzq3br.dllFilesize
6KB
MD5f054d141b5548a3869eaf058e60cfbf0
SHA13d6d75148ef5662c3ba8f600a8f319c26aeae0b9
SHA256717d16cb64a7327c4ee359a36dcb555ed18eb23a11b5a28f01356f62b2d81de0
SHA5124aa342009d2142d54b6334ee8b20310d04456d1fc4ed9ab0462c474859b550522d8d7edbf09972cf14bd7ec53779e2ede28284d639ade3114256986179176c83
-
C:\Users\Admin\AppData\Local\Temp\0fmzq3br\0fmzq3br.pdbFilesize
15KB
MD5a0752cc4b21c93602c499df2e8922f63
SHA1c07628d33a79d5c48ef9e4590f02be9e472cf758
SHA256aaa2f50417304733aec6cdc217febb3a73c289c120c491b66438c574c6390a75
SHA512ce9f6574a28e0b0a40448c310e4bd84c3b7094b44194cd29982c75f6361c235abcd44a7c59ff35ff44bfedb4becc67c765f58516e8295580660e42c57693ffae
-
C:\Users\Admin\AppData\Local\Temp\RESF99C.tmpFilesize
1KB
MD57d50ccee7910494d096b1c63f7ba675e
SHA10cd092dfdb4a4199c60c36557a5bce74a998e43e
SHA2564cdac08910e5a64ca2d6df46826750c1f5627eb6b80c45cd2c93f5abf8a50571
SHA512816cb442c3207b3515c70a1e5bcdee3f6c0064396485e70116abde7218cce7b6e9c862874077b6ec3276befbb8692e722f847e3a99430c4847ea58ced5b50c05
-
\??\c:\Users\Admin\AppData\Local\Temp\0fmzq3br\0fmzq3br.0.csFilesize
2KB
MD5898702ed72ed760606b16ba1b0127af4
SHA154def04d7ddf5c2816e6f76b032be192aea661ef
SHA2564171994b6dd8dd4a5814d5f749041f03075d9f1e178f544804ff564d68396c1a
SHA51241522d3986701e7e253c308dc3a904f153b943874b78d89d87f466861e2f7598a3d46edbd63aadd3f6c6bed996185584ec3f027edba3eb3a98862ac35511da4f
-
\??\c:\Users\Admin\AppData\Local\Temp\0fmzq3br\0fmzq3br.cmdlineFilesize
312B
MD5b760885f6c65a6fa7c9bbfaf273db71a
SHA1f98c2ea64bb0578364ee08347b6392a4661c03d6
SHA2563438e6d36a13219b3e601135148c505d594e8e79426957d69e92abdbcfe9dc3b
SHA51299a309a20918c784179cb19b9e79b2fbb2a3dd2f24fe8603ea9f22dccaee355d916cb721dcf2cc9f605803e9c7a8beb008d2f33d4b9251cb2066583b438e6f3e
-
\??\c:\Users\Admin\AppData\Local\Temp\0fmzq3br\CSC9B0A0C614BEA451592B6493C7FA747F.TMPFilesize
1KB
MD5968d296a9e6b9aa176260a01b5e96908
SHA1658c5c108605bcfd6f2c55716d637154edb02289
SHA25632ea6e6d1304a2c523a699ff12d2ecc251206d8e67af59cafae642d7678eb3ba
SHA51208d82bb966f8e3c26fd1a9e46ae3c734ee70bbe5754d2bd729eaf93591650d8c2e9eca87efeee2d07891e8f674bf96c0a5cbb7c224898d1612fdd70ee4ccec65
-
memory/924-64-0x00000000004B0000-0x00000000004C4000-memory.dmpFilesize
80KB
-
memory/924-63-0x0000000000380000-0x0000000000388000-memory.dmpFilesize
32KB
-
memory/924-54-0x0000000000C20000-0x0000000000C64000-memory.dmpFilesize
272KB
-
memory/924-65-0x00000000004C0000-0x00000000004CC000-memory.dmpFilesize
48KB
-
memory/924-66-0x00000000761F1000-0x00000000761F3000-memory.dmpFilesize
8KB
-
memory/924-67-0x0000000000560000-0x0000000000568000-memory.dmpFilesize
32KB
-
memory/960-55-0x0000000000000000-mapping.dmp
-
memory/1480-58-0x0000000000000000-mapping.dmp
-
memory/1972-72-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/1972-71-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/1972-69-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/1972-68-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/1972-73-0x0000000000405DFE-mapping.dmp
-
memory/1972-77-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/1972-75-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/1972-79-0x0000000074AE0000-0x000000007508B000-memory.dmpFilesize
5.7MB
-
memory/1972-80-0x0000000074AE0000-0x000000007508B000-memory.dmpFilesize
5.7MB