Analysis
-
max time kernel
153s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2023, 18:32
Static task
static1
Behavioral task
behavioral1
Sample
e8c4a3900f863590f7a4ff2b67da1db0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
e8c4a3900f863590f7a4ff2b67da1db0.exe
Resource
win10v2004-20231023-en
General
-
Target
e8c4a3900f863590f7a4ff2b67da1db0.exe
-
Size
901KB
-
MD5
e8c4a3900f863590f7a4ff2b67da1db0
-
SHA1
8faca9ab8f15a1cdb9f8a40d0dc01a7b0dd08366
-
SHA256
182985bf5b005cf4281d6b649434c3294472e872396f3bbe5c7f6f3ce975d22a
-
SHA512
f3669bda2c472dcb84372d2905da408437a534df3d7e80663da30b700f0fe59a5ce792e4ddf6b1628973fe14f95ea45b7308cdcd9abb8bc94b43c428e6b4f27f
-
SSDEEP
24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5i:gh+ZkldoPK8YaKGi
Malware Config
Extracted
revengerat
Marzo26
marzorevenger.duckdns.org:4230
RV_MUTEX-PiGGjjtnxDpn
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
RevengeRat Executable 1 IoCs
resource yara_rule behavioral2/memory/2012-1-0x0000000000410000-0x0000000000418000-memory.dmp revengerat -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AudioHandlers.url e8c4a3900f863590f7a4ff2b67da1db0.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 220 set thread context of 2012 220 e8c4a3900f863590f7a4ff2b67da1db0.exe 87 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2012 RegAsm.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 220 e8c4a3900f863590f7a4ff2b67da1db0.exe 220 e8c4a3900f863590f7a4ff2b67da1db0.exe 220 e8c4a3900f863590f7a4ff2b67da1db0.exe 220 e8c4a3900f863590f7a4ff2b67da1db0.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 220 e8c4a3900f863590f7a4ff2b67da1db0.exe 220 e8c4a3900f863590f7a4ff2b67da1db0.exe 220 e8c4a3900f863590f7a4ff2b67da1db0.exe 220 e8c4a3900f863590f7a4ff2b67da1db0.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 220 wrote to memory of 2012 220 e8c4a3900f863590f7a4ff2b67da1db0.exe 87 PID 220 wrote to memory of 2012 220 e8c4a3900f863590f7a4ff2b67da1db0.exe 87 PID 220 wrote to memory of 2012 220 e8c4a3900f863590f7a4ff2b67da1db0.exe 87 PID 220 wrote to memory of 2012 220 e8c4a3900f863590f7a4ff2b67da1db0.exe 87 PID 220 wrote to memory of 2012 220 e8c4a3900f863590f7a4ff2b67da1db0.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8c4a3900f863590f7a4ff2b67da1db0.exe"C:\Users\Admin\AppData\Local\Temp\e8c4a3900f863590f7a4ff2b67da1db0.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2012
-