Analysis

  • max time kernel
    134s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    06-08-2023 18:00

General

  • Target

    explorer.exe

  • Size

    133KB

  • MD5

    247976d7e405bfd0f716a3d5f2cd499b

  • SHA1

    dbcf03a94b3cced51ebe42af6f860e8d898f2459

  • SHA256

    c37430f6f2249e0faff20595f0677955cd2c1f727f94bff53f21ecc894e340f6

  • SHA512

    664b189c6b99b8927bb6fdb52c2c3f0031e88edc1dac80c8f6da5682ac30f17f295bed739df56e4bb754dca773c9eeb4e4b56fc3c36ccda0ab182ad54dd7edad

  • SSDEEP

    3072:DjC4DKvke46oEabPu97HZO4Aue/sobH0hLNM:3C4DKvh4PbPETZ4uLoUT

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • RevengeRat Executable 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\explorer.exe
    "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    PID:3060

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3060-54-0x00000000011B0000-0x00000000011D6000-memory.dmp
    Filesize

    152KB

  • memory/3060-55-0x000007FEF5F10000-0x000007FEF68FC000-memory.dmp
    Filesize

    9.9MB

  • memory/3060-56-0x000000001AC80000-0x000000001AD00000-memory.dmp
    Filesize

    512KB

  • memory/3060-57-0x0000000000440000-0x000000000044E000-memory.dmp
    Filesize

    56KB

  • memory/3060-58-0x0000000000460000-0x000000000046C000-memory.dmp
    Filesize

    48KB

  • memory/3060-61-0x000007FEF5F10000-0x000007FEF68FC000-memory.dmp
    Filesize

    9.9MB