Analysis

  • max time kernel
    107s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    13-07-2022 21:05

General

  • Target

    bCZe.exe

  • Size

    14KB

  • MD5

    352e1de7d7a5ab9896dd809e57e231b7

  • SHA1

    ced36a4fb72fade359d0dea6585bc5f1d6dad9d5

  • SHA256

    4af8536f98e03dfc5f5be911ff79ef6c0cbc8b942c855b0dcac530b3058f34b5

  • SHA512

    8774fabb9917ac6ee00ff3136d061aed3918b078d03d43594fcfa8063af9bcb08c5b1464bc4e81aa50145b48483105c564e13ae7045a3153bd86482ab9d460b0

Score
10/10

Malware Config

Signatures

  • suricata: ET MALWARE MSIL/Revenge-RAT Keep-Alive Activity (Outbound) M2

    suricata: ET MALWARE MSIL/Revenge-RAT Keep-Alive Activity (Outbound) M2

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bCZe.exe
    "C:\Users\Admin\AppData\Local\Temp\bCZe.exe"
    1⤵
    • Checks processor information in registry
    PID:1808

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1808-130-0x0000000074F30000-0x00000000754E1000-memory.dmp
    Filesize

    5.7MB

  • memory/1808-131-0x0000000074F30000-0x00000000754E1000-memory.dmp
    Filesize

    5.7MB