Analysis
-
max time kernel
140s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2023 08:05
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.75e10091f85746236b13d3942516be60.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.75e10091f85746236b13d3942516be60.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.75e10091f85746236b13d3942516be60.exe
-
Size
901KB
-
MD5
75e10091f85746236b13d3942516be60
-
SHA1
079d7479f16b7c3cd84abe158a8e05ef6b77539d
-
SHA256
fd211fca40da3299ec27ad50f51b5955909a94daa883e8c84c01ae74da2e7652
-
SHA512
960c7d08ad75ba60c3d314e0f05cbe5900d6148fce32cdd3731e8c0debd08915b6c54c3e389e70c9c8f02c9d5627c4746cefafdb767a1b9b2246c14fa5a7ea73
-
SSDEEP
24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5H:gh+ZkldoPK8YaKGH
Malware Config
Extracted
revengerat
Marzo26
marzorevenger.duckdns.org:4230
RV_MUTEX-PiGGjjtnxDpn
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
RevengeRat Executable 1 IoCs
resource yara_rule behavioral2/memory/1052-1-0x0000000000400000-0x0000000000408000-memory.dmp revengerat -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AudioHandlers.url NEAS.75e10091f85746236b13d3942516be60.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4708 set thread context of 1052 4708 NEAS.75e10091f85746236b13d3942516be60.exe 89 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1052 RegAsm.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4708 NEAS.75e10091f85746236b13d3942516be60.exe 4708 NEAS.75e10091f85746236b13d3942516be60.exe 4708 NEAS.75e10091f85746236b13d3942516be60.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4708 NEAS.75e10091f85746236b13d3942516be60.exe 4708 NEAS.75e10091f85746236b13d3942516be60.exe 4708 NEAS.75e10091f85746236b13d3942516be60.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4708 wrote to memory of 1052 4708 NEAS.75e10091f85746236b13d3942516be60.exe 89 PID 4708 wrote to memory of 1052 4708 NEAS.75e10091f85746236b13d3942516be60.exe 89 PID 4708 wrote to memory of 1052 4708 NEAS.75e10091f85746236b13d3942516be60.exe 89 PID 4708 wrote to memory of 1052 4708 NEAS.75e10091f85746236b13d3942516be60.exe 89 PID 4708 wrote to memory of 1052 4708 NEAS.75e10091f85746236b13d3942516be60.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.75e10091f85746236b13d3942516be60.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.75e10091f85746236b13d3942516be60.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1052
-