Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 13:14
Static task
static1
Behavioral task
behavioral1
Sample
716078cb0f80f32b5424aa95279e075f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
716078cb0f80f32b5424aa95279e075f.exe
Resource
win10v2004-20231215-en
General
-
Target
716078cb0f80f32b5424aa95279e075f.exe
-
Size
127KB
-
MD5
716078cb0f80f32b5424aa95279e075f
-
SHA1
e2aed094b3f4a6be7b17cdab09aaddfd62aa49d6
-
SHA256
dee0915377940ec017e8f93cff51d9b966cfc26bdea769ff27594e9e886e0e0e
-
SHA512
70f8eea5e635ab035d13dd67ff6a9767f0f127c05ecbe4b4dda6a31d3c87f9290fe4b88bae797acb56f3e094bb53c4b8e7d271feca64508d21330f7d5e94f145
-
SSDEEP
3072:FgnQauZDc6EcBJgNuqA4KRswZDow7DlqwB:FgJa/BJgNbDAsL0B3
Malware Config
Extracted
revengerat
LimeBuilder
nocbaba1.duckdns.org:81
RV_MUTEX-FZMONFueOciq
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
RevengeRat Executable 7 IoCs
resource yara_rule behavioral1/memory/2912-12-0x0000000000400000-0x000000000040C000-memory.dmp revengerat behavioral1/memory/2912-14-0x0000000000400000-0x000000000040C000-memory.dmp revengerat behavioral1/memory/2912-10-0x0000000000400000-0x000000000040C000-memory.dmp revengerat behavioral1/memory/2912-7-0x0000000000400000-0x000000000040C000-memory.dmp revengerat behavioral1/memory/2912-6-0x0000000000400000-0x000000000040C000-memory.dmp revengerat behavioral1/memory/2912-16-0x0000000004D50000-0x0000000004D90000-memory.dmp revengerat behavioral1/memory/2912-19-0x0000000004D50000-0x0000000004D90000-memory.dmp revengerat -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1632 set thread context of 2912 1632 716078cb0f80f32b5424aa95279e075f.exe 28 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString InstallUtil.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1632 716078cb0f80f32b5424aa95279e075f.exe Token: SeDebugPrivilege 2912 InstallUtil.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1632 wrote to memory of 2912 1632 716078cb0f80f32b5424aa95279e075f.exe 28 PID 1632 wrote to memory of 2912 1632 716078cb0f80f32b5424aa95279e075f.exe 28 PID 1632 wrote to memory of 2912 1632 716078cb0f80f32b5424aa95279e075f.exe 28 PID 1632 wrote to memory of 2912 1632 716078cb0f80f32b5424aa95279e075f.exe 28 PID 1632 wrote to memory of 2912 1632 716078cb0f80f32b5424aa95279e075f.exe 28 PID 1632 wrote to memory of 2912 1632 716078cb0f80f32b5424aa95279e075f.exe 28 PID 1632 wrote to memory of 2912 1632 716078cb0f80f32b5424aa95279e075f.exe 28 PID 1632 wrote to memory of 2912 1632 716078cb0f80f32b5424aa95279e075f.exe 28 PID 1632 wrote to memory of 2912 1632 716078cb0f80f32b5424aa95279e075f.exe 28 PID 1632 wrote to memory of 2912 1632 716078cb0f80f32b5424aa95279e075f.exe 28 PID 1632 wrote to memory of 2912 1632 716078cb0f80f32b5424aa95279e075f.exe 28 PID 1632 wrote to memory of 2912 1632 716078cb0f80f32b5424aa95279e075f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\716078cb0f80f32b5424aa95279e075f.exe"C:\Users\Admin\AppData\Local\Temp\716078cb0f80f32b5424aa95279e075f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:2912
-