Analysis
-
max time kernel
151s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-07-2022 23:51
Static task
static1
Behavioral task
behavioral1
Sample
4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118.exe
Resource
win10v2004-20220414-en
General
-
Target
4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118.exe
-
Size
819KB
-
MD5
5b9dd49ffe63a9cc638f28383cacac8f
-
SHA1
6ea781eb54e023b9dc06599be6349cb7c7eb8a37
-
SHA256
4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118
-
SHA512
abdb1b0f3b18c8a85b5b3bd7dced382408cf0f37aa47dfc622546b793e17f5629f475666c399e0eafbc16c94368b1a727e6bdbaf104f00df2b9e04910662a36f
Malware Config
Extracted
revengerat
BABAYAGA
condor777.chickenkiller.com:1604
EZlNApdygPhSv
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
RevengeRat Executable 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2028-58-0x0000000000400000-0x0000000000408000-memory.dmp revengerat behavioral1/memory/2028-59-0x0000000000405DEE-mapping.dmp revengerat behavioral1/memory/2028-61-0x0000000000400000-0x0000000000408000-memory.dmp revengerat behavioral1/memory/2028-63-0x0000000000400000-0x0000000000408000-memory.dmp revengerat -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118.exedescription ioc process Key created \Registry\User\S-1-5-21-2277218442-1199762539-2004043321-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "C:\\rxXxwFIf\\uIDSYFqn.exe" 4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118.exedescription pid process target process PID 1312 set thread context of 2028 1312 4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118.exe regasm.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118.exepid process 1312 4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118.exe 1312 4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118.exe 1312 4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118.exe 1312 4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118.exe 1312 4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
regasm.exedescription pid process Token: SeDebugPrivilege 2028 regasm.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118.exedescription pid process target process PID 1312 wrote to memory of 960 1312 4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118.exe splwow64.exe PID 1312 wrote to memory of 960 1312 4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118.exe splwow64.exe PID 1312 wrote to memory of 960 1312 4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118.exe splwow64.exe PID 1312 wrote to memory of 960 1312 4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118.exe splwow64.exe PID 1312 wrote to memory of 2044 1312 4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118.exe regasm.exe PID 1312 wrote to memory of 2044 1312 4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118.exe regasm.exe PID 1312 wrote to memory of 2044 1312 4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118.exe regasm.exe PID 1312 wrote to memory of 2044 1312 4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118.exe regasm.exe PID 1312 wrote to memory of 2044 1312 4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118.exe regasm.exe PID 1312 wrote to memory of 2044 1312 4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118.exe regasm.exe PID 1312 wrote to memory of 2044 1312 4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118.exe regasm.exe PID 1312 wrote to memory of 2028 1312 4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118.exe regasm.exe PID 1312 wrote to memory of 2028 1312 4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118.exe regasm.exe PID 1312 wrote to memory of 2028 1312 4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118.exe regasm.exe PID 1312 wrote to memory of 2028 1312 4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118.exe regasm.exe PID 1312 wrote to memory of 2028 1312 4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118.exe regasm.exe PID 1312 wrote to memory of 2028 1312 4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118.exe regasm.exe PID 1312 wrote to memory of 2028 1312 4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118.exe regasm.exe PID 1312 wrote to memory of 2028 1312 4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118.exe regasm.exe PID 1312 wrote to memory of 2028 1312 4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118.exe regasm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118.exe"C:\Users\Admin\AppData\Local\Temp\4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/960-55-0x0000000000000000-mapping.dmp
-
memory/960-56-0x000007FEFBDC1000-0x000007FEFBDC3000-memory.dmpFilesize
8KB
-
memory/1312-54-0x0000000076451000-0x0000000076453000-memory.dmpFilesize
8KB
-
memory/1312-57-0x00000000034E0000-0x000000000363C000-memory.dmpFilesize
1.4MB
-
memory/2028-58-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2028-59-0x0000000000405DEE-mapping.dmp
-
memory/2028-61-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2028-63-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2028-65-0x0000000074520000-0x0000000074ACB000-memory.dmpFilesize
5.7MB
-
memory/2028-66-0x0000000074520000-0x0000000074ACB000-memory.dmpFilesize
5.7MB