Analysis

  • max time kernel
    151s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-01-2023 17:11

General

  • Target

    FB7392139A115FCF8E9F741D3187D5BDB682BE4F7BABC.exe

  • Size

    21.6MB

  • MD5

    6631fd90c648d10b65e4778010c7c2fb

  • SHA1

    53d833a9b6238247ae63deb0bbaeb1264c3dbffc

  • SHA256

    fb7392139a115fcf8e9f741d3187d5bdb682be4f7babc52e9fcd6bd6fc897c31

  • SHA512

    f3765881e58ebbe6876c31600f6da115b9bfa2be1a5053a88e60e3a8e52cf38e2d629841a60e1e6ea7751aaef3f9e81ab38e8de3ff6ab473e748475cc3ab859e

  • SSDEEP

    393216:tq5jjbBR1Ha+LAkVcPjvdgcKCqNSLIWURm/UHFo6FkhC:qBR1HDNOPJgcKCHhsHFDz

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • RevengeRat Executable 4 IoCs
  • Executes dropped EXE 8 IoCs
  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FB7392139A115FCF8E9F741D3187D5BDB682BE4F7BABC.exe
    "C:\Users\Admin\AppData\Local\Temp\FB7392139A115FCF8E9F741D3187D5BDB682BE4F7BABC.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3472
    • C:\Users\Admin\AppData\Local\Temp\Client.exe
      "C:\Users\Admin\AppData\Local\Temp\Client.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Checks processor information in registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2112
      • C:\Users\Admin\AppData\Roaming\Microsoft .Net Framework Servcies.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft .Net Framework Servcies.exe"
        3⤵
        • Executes dropped EXE
        • Drops startup file
        • Adds Run key to start application
        • Checks processor information in registry
        • Suspicious use of AdjustPrivilegeToken
        PID:2760
    • C:\Users\Admin\AppData\Local\Temp\fix.exe
      "C:\Users\Admin\AppData\Local\Temp\fix.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:4372
      • C:\Users\Admin\AppData\Local\Temp\Setup.exe
        "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1552
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe"
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3936
          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:4376
      • C:\Users\Admin\AppData\Local\Temp\Setup.exe
        "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
        3⤵
        • Executes dropped EXE
        PID:2260
      • C:\Users\Admin\AppData\Local\Temp\fix .exe
        "C:\Users\Admin\AppData\Local\Temp\fix .exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:2960

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\Setup.exe.log
    Filesize

    408B

    MD5

    8e1e19a5abcce21f8a12921d6a2eeeee

    SHA1

    b5704368dfd8fc7aeafb15c23b69895e809fe20e

    SHA256

    22cf24d10cc11a9bb23268f18afbc8f3481c27e1feb4cb42ba5c8775e12720e3

    SHA512

    48365f858592d677ef5d0e2948f672234898e47a153eec32592a2e079353702a64e41e1aa59250f05bd690690b9edfb8455dfac90c6695fb7c0b6907a057fe78

  • C:\Users\Admin\AppData\Local\Temp\Client.exe
    Filesize

    144KB

    MD5

    3c99042b54fb74e45b1c2f9bec86321b

    SHA1

    9c91ae20f4214122819659cd3f0ea46d4ea8699c

    SHA256

    4fc5d7b78bb2a049986044f87441ade0f0d09485cc508489bf1d484b2c7da695

    SHA512

    96b490b45fe228c0f0f18192a58f29bcef69afc0fd940544db1c0e849cffecf6091a1cfb1c8412a751deb5b3a67564d56afe3f72d4eee2678363ce84b2e58457

  • C:\Users\Admin\AppData\Local\Temp\Client.exe
    Filesize

    144KB

    MD5

    3c99042b54fb74e45b1c2f9bec86321b

    SHA1

    9c91ae20f4214122819659cd3f0ea46d4ea8699c

    SHA256

    4fc5d7b78bb2a049986044f87441ade0f0d09485cc508489bf1d484b2c7da695

    SHA512

    96b490b45fe228c0f0f18192a58f29bcef69afc0fd940544db1c0e849cffecf6091a1cfb1c8412a751deb5b3a67564d56afe3f72d4eee2678363ce84b2e58457

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe
    Filesize

    356KB

    MD5

    fa0b327abd82686bb9d676a30fa89b46

    SHA1

    a5521f5e8e500f67b183542ffad65b83ebcb186f

    SHA256

    d01728070486e1abbf024db0eeeacf232e02fe326c4c0b762af73f728fc9392d

    SHA512

    ead84a6cbe44be5cb213154cf11f8cbe7cc992563549201500f11cf770e3b57b02da027fc982b436f8eebbfa60088f4dad8e10de1086dbb5781b2b3da004790d

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe
    Filesize

    356KB

    MD5

    fa0b327abd82686bb9d676a30fa89b46

    SHA1

    a5521f5e8e500f67b183542ffad65b83ebcb186f

    SHA256

    d01728070486e1abbf024db0eeeacf232e02fe326c4c0b762af73f728fc9392d

    SHA512

    ead84a6cbe44be5cb213154cf11f8cbe7cc992563549201500f11cf770e3b57b02da027fc982b436f8eebbfa60088f4dad8e10de1086dbb5781b2b3da004790d

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe
    Filesize

    356KB

    MD5

    fa0b327abd82686bb9d676a30fa89b46

    SHA1

    a5521f5e8e500f67b183542ffad65b83ebcb186f

    SHA256

    d01728070486e1abbf024db0eeeacf232e02fe326c4c0b762af73f728fc9392d

    SHA512

    ead84a6cbe44be5cb213154cf11f8cbe7cc992563549201500f11cf770e3b57b02da027fc982b436f8eebbfa60088f4dad8e10de1086dbb5781b2b3da004790d

  • C:\Users\Admin\AppData\Local\Temp\evb111.tmp
    Filesize

    1KB

    MD5

    dd366a1aa8ff08588a4e2bcb45d457ef

    SHA1

    b95e345b10380b61937c90a2bc7a10384882628c

    SHA256

    ea362d6ebb9d153a4809ab732faa7c57b6e768574b64a78ea059c613fcf9a462

    SHA512

    423684f89c971146e270412007776803588e6439dc717941c4f98db1fc5cfabf857812973fa02fc552d9593b2ec9fafa15f1335185b88e96e0de5a74d30f4ca2

  • C:\Users\Admin\AppData\Local\Temp\evb363.tmp
    Filesize

    1KB

    MD5

    55d3b3303dad8fcaa598bc68232e554c

    SHA1

    b4cd7e5592ec48e5cd24b060c463e56324e17d92

    SHA256

    5040e7905ccda365b759e8ec047c2424312714a69754f6e2d968a5e1be7498f9

    SHA512

    ccaf6163ffe64ca9d5495d0e631236fcf2e248b88d29b5b97abcad0310d7bc33709d58750592052d334252eb03fbe9c70ea894071507a66c46bba33b7359d5b5

  • C:\Users\Admin\AppData\Local\Temp\evb3A3.tmp
    Filesize

    1KB

    MD5

    55d3b3303dad8fcaa598bc68232e554c

    SHA1

    b4cd7e5592ec48e5cd24b060c463e56324e17d92

    SHA256

    5040e7905ccda365b759e8ec047c2424312714a69754f6e2d968a5e1be7498f9

    SHA512

    ccaf6163ffe64ca9d5495d0e631236fcf2e248b88d29b5b97abcad0310d7bc33709d58750592052d334252eb03fbe9c70ea894071507a66c46bba33b7359d5b5

  • C:\Users\Admin\AppData\Local\Temp\evbD1.tmp
    Filesize

    1KB

    MD5

    dd366a1aa8ff08588a4e2bcb45d457ef

    SHA1

    b95e345b10380b61937c90a2bc7a10384882628c

    SHA256

    ea362d6ebb9d153a4809ab732faa7c57b6e768574b64a78ea059c613fcf9a462

    SHA512

    423684f89c971146e270412007776803588e6439dc717941c4f98db1fc5cfabf857812973fa02fc552d9593b2ec9fafa15f1335185b88e96e0de5a74d30f4ca2

  • C:\Users\Admin\AppData\Local\Temp\fix .exe
    Filesize

    26.9MB

    MD5

    20f0d5f26ccc128b8dc82a9cfb248df4

    SHA1

    1fbcdd3ac02351998393b61f2ce8e63fc1e7e59e

    SHA256

    3640ce892fd1b03f75074d471cabffd9fe49dd26445db4c5b1f976de91c6a0c0

    SHA512

    ddbaf0d4a0074c6636cef41944c9a034dd0fd6a5aa89efbfa7395d9146dd94646f28e81596e5135ebbed6bbcc0fccc6a09575837809017d252de7c241c9e0035

  • C:\Users\Admin\AppData\Local\Temp\fix .exe
    Filesize

    26.9MB

    MD5

    20f0d5f26ccc128b8dc82a9cfb248df4

    SHA1

    1fbcdd3ac02351998393b61f2ce8e63fc1e7e59e

    SHA256

    3640ce892fd1b03f75074d471cabffd9fe49dd26445db4c5b1f976de91c6a0c0

    SHA512

    ddbaf0d4a0074c6636cef41944c9a034dd0fd6a5aa89efbfa7395d9146dd94646f28e81596e5135ebbed6bbcc0fccc6a09575837809017d252de7c241c9e0035

  • C:\Users\Admin\AppData\Local\Temp\fix.exe
    Filesize

    27.2MB

    MD5

    5ef560b9b48b65bb06fcc33f3396b60e

    SHA1

    6a41c446b22a59571423f24626b1165a9cf07154

    SHA256

    cd228faec86ed22a4c06d9ab3d7db74a8a440190b2ec001c81a42d99ded15644

    SHA512

    6cc6375b1abc7404854c9d5fefd942c37a9a9fefb659d8100a82b6e0fceca08f2d2aea3bfb3fc4f355fc02e7dd84989f556b4a945ffee9ca451f0d8d0e2c4ccc

  • C:\Users\Admin\AppData\Local\Temp\fix.exe
    Filesize

    27.2MB

    MD5

    5ef560b9b48b65bb06fcc33f3396b60e

    SHA1

    6a41c446b22a59571423f24626b1165a9cf07154

    SHA256

    cd228faec86ed22a4c06d9ab3d7db74a8a440190b2ec001c81a42d99ded15644

    SHA512

    6cc6375b1abc7404854c9d5fefd942c37a9a9fefb659d8100a82b6e0fceca08f2d2aea3bfb3fc4f355fc02e7dd84989f556b4a945ffee9ca451f0d8d0e2c4ccc

  • C:\Users\Admin\AppData\Roaming\Microsoft .Net Framework Servcies.exe
    Filesize

    144KB

    MD5

    3c99042b54fb74e45b1c2f9bec86321b

    SHA1

    9c91ae20f4214122819659cd3f0ea46d4ea8699c

    SHA256

    4fc5d7b78bb2a049986044f87441ade0f0d09485cc508489bf1d484b2c7da695

    SHA512

    96b490b45fe228c0f0f18192a58f29bcef69afc0fd940544db1c0e849cffecf6091a1cfb1c8412a751deb5b3a67564d56afe3f72d4eee2678363ce84b2e58457

  • C:\Users\Admin\AppData\Roaming\Microsoft .Net Framework Servcies.exe
    Filesize

    144KB

    MD5

    3c99042b54fb74e45b1c2f9bec86321b

    SHA1

    9c91ae20f4214122819659cd3f0ea46d4ea8699c

    SHA256

    4fc5d7b78bb2a049986044f87441ade0f0d09485cc508489bf1d484b2c7da695

    SHA512

    96b490b45fe228c0f0f18192a58f29bcef69afc0fd940544db1c0e849cffecf6091a1cfb1c8412a751deb5b3a67564d56afe3f72d4eee2678363ce84b2e58457

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
    Filesize

    63KB

    MD5

    d298454882caac154fc9217fc7e90499

    SHA1

    11970a2f8b9d1153fbc7fe925a846bd95e07e96f

    SHA256

    badaa2312457f3d08ca1f72287989456f9e62d6b417af6fb9b5e39ca1e8c8100

    SHA512

    e28a4d7c827b5c816503ddba4fee0bc82b16a0acb2eed9c81b20bb1b043d69b89cd3a1cf2beafb27a2471b6172f707d53e3c90568636b0c65e484e051dfde86f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
    Filesize

    63KB

    MD5

    d298454882caac154fc9217fc7e90499

    SHA1

    11970a2f8b9d1153fbc7fe925a846bd95e07e96f

    SHA256

    badaa2312457f3d08ca1f72287989456f9e62d6b417af6fb9b5e39ca1e8c8100

    SHA512

    e28a4d7c827b5c816503ddba4fee0bc82b16a0acb2eed9c81b20bb1b043d69b89cd3a1cf2beafb27a2471b6172f707d53e3c90568636b0c65e484e051dfde86f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe
    Filesize

    256KB

    MD5

    c4e4407b5fcf49586ddd5d5573ae4b95

    SHA1

    0f60aaaaac09d4f9273207114fcc78c0bfb250eb

    SHA256

    8f1e6eb0269fbe449678ce4863d494fda78bc648f27ad1c129270575efce4f7a

    SHA512

    95a89aae7f135b3355f2f0f751607742d8dfa5dfb04bf86cad0fff99d6c687a18a2f0be30d92a79d004cba49823c73f0208f40bb5e9cff3b26f72d1fe5f3d47b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe
    Filesize

    256KB

    MD5

    c4e4407b5fcf49586ddd5d5573ae4b95

    SHA1

    0f60aaaaac09d4f9273207114fcc78c0bfb250eb

    SHA256

    8f1e6eb0269fbe449678ce4863d494fda78bc648f27ad1c129270575efce4f7a

    SHA512

    95a89aae7f135b3355f2f0f751607742d8dfa5dfb04bf86cad0fff99d6c687a18a2f0be30d92a79d004cba49823c73f0208f40bb5e9cff3b26f72d1fe5f3d47b

  • memory/1552-144-0x00007FFC1BE60000-0x00007FFC1C896000-memory.dmp
    Filesize

    10.2MB

  • memory/1552-141-0x0000000000000000-mapping.dmp
  • memory/2112-192-0x00000000725A0000-0x0000000072B51000-memory.dmp
    Filesize

    5.7MB

  • memory/2112-160-0x00000000725A0000-0x0000000072B51000-memory.dmp
    Filesize

    5.7MB

  • memory/2112-139-0x00000000725A0000-0x0000000072B51000-memory.dmp
    Filesize

    5.7MB

  • memory/2112-133-0x0000000000000000-mapping.dmp
  • memory/2260-147-0x00007FFC1BE60000-0x00007FFC1C896000-memory.dmp
    Filesize

    10.2MB

  • memory/2260-145-0x0000000000000000-mapping.dmp
  • memory/2760-189-0x0000000000000000-mapping.dmp
  • memory/2760-193-0x00000000725A0000-0x0000000072B51000-memory.dmp
    Filesize

    5.7MB

  • memory/2760-194-0x00000000725A0000-0x0000000072B51000-memory.dmp
    Filesize

    5.7MB

  • memory/2960-163-0x0000000001070000-0x0000000001078000-memory.dmp
    Filesize

    32KB

  • memory/2960-179-0x00007FFC1B330000-0x00007FFC1BDF1000-memory.dmp
    Filesize

    10.8MB

  • memory/2960-148-0x0000000000000000-mapping.dmp
  • memory/2960-164-0x000000001E320000-0x000000001E3DA000-memory.dmp
    Filesize

    744KB

  • memory/2960-166-0x0000000003B90000-0x0000000003BB8000-memory.dmp
    Filesize

    160KB

  • memory/2960-162-0x000000001E1D0000-0x000000001E20E000-memory.dmp
    Filesize

    248KB

  • memory/2960-151-0x0000000000400000-0x000000000076A000-memory.dmp
    Filesize

    3.4MB

  • memory/2960-170-0x0000000020920000-0x00000000210F8000-memory.dmp
    Filesize

    7.8MB

  • memory/2960-171-0x0000000003BD0000-0x0000000003C08000-memory.dmp
    Filesize

    224KB

  • memory/2960-172-0x0000000001090000-0x000000000109E000-memory.dmp
    Filesize

    56KB

  • memory/2960-173-0x0000000020480000-0x00000000205B6000-memory.dmp
    Filesize

    1.2MB

  • memory/2960-175-0x0000000180000000-0x0000000180014000-memory.dmp
    Filesize

    80KB

  • memory/2960-161-0x000000001E5D0000-0x000000001E93A000-memory.dmp
    Filesize

    3.4MB

  • memory/2960-159-0x00007FFC1B330000-0x00007FFC1BDF1000-memory.dmp
    Filesize

    10.8MB

  • memory/2960-178-0x0000000000400000-0x0000000000808000-memory.dmp
    Filesize

    4.0MB

  • memory/2960-153-0x0000000000400000-0x0000000000808000-memory.dmp
    Filesize

    4.0MB

  • memory/2960-182-0x0000000180000000-0x0000000180014000-memory.dmp
    Filesize

    80KB

  • memory/2960-184-0x000000001E260000-0x000000001E284000-memory.dmp
    Filesize

    144KB

  • memory/2960-188-0x000000002C6D0000-0x000000002C746000-memory.dmp
    Filesize

    472KB

  • memory/2960-181-0x0000000180002000-0x0000000180022000-memory.dmp
    Filesize

    128KB

  • memory/2960-154-0x00007FFBBB8B0000-0x00007FFBBB8C0000-memory.dmp
    Filesize

    64KB

  • memory/2960-185-0x0000000180000000-0x0000000180024000-memory.dmp
    Filesize

    144KB

  • memory/2960-186-0x000000001E4F0000-0x000000001E4F8000-memory.dmp
    Filesize

    32KB

  • memory/2960-187-0x0000000180000000-0x0000000180024000-memory.dmp
    Filesize

    144KB

  • memory/3472-132-0x0000000000400000-0x0000000001990000-memory.dmp
    Filesize

    21.6MB

  • memory/3936-158-0x00007FFC1BE60000-0x00007FFC1C896000-memory.dmp
    Filesize

    10.2MB

  • memory/3936-152-0x0000000000000000-mapping.dmp
  • memory/4372-140-0x00007FFC1BE60000-0x00007FFC1C896000-memory.dmp
    Filesize

    10.2MB

  • memory/4372-136-0x0000000000000000-mapping.dmp
  • memory/4376-169-0x00007FFC1BE60000-0x00007FFC1C896000-memory.dmp
    Filesize

    10.2MB

  • memory/4376-165-0x0000000000000000-mapping.dmp