Overview
overview
7Static
static
4RevoUninst...lp.pdf
windows7-x64
1RevoUninst...lp.pdf
windows10-2004-x64
1RevoUninst...rt.exe
windows7-x64
4RevoUninst...rt.exe
windows10-2004-x64
1RevoUninst...sh.ini
windows7-x64
1RevoUninst...sh.ini
windows10-2004-x64
1RevoUninst...Un.exe
windows7-x64
6RevoUninst...Un.exe
windows10-2004-x64
6RevoUninst...Un.exe
windows7-x64
6RevoUninst...Un.exe
windows10-2004-x64
7Analysis
-
max time kernel
351s -
max time network
362s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25-04-2024 14:00
Behavioral task
behavioral1
Sample
RevoUninstaller_Portable/Revo Uninstaller Help.pdf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
RevoUninstaller_Portable/Revo Uninstaller Help.pdf
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
RevoUninstaller_Portable/RevoUPort.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
RevoUninstaller_Portable/RevoUPort.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
RevoUninstaller_Portable/lang/english.ini
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
RevoUninstaller_Portable/lang/english.ini
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
RevoUninstaller_Portable/x64/RevoUn.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
RevoUninstaller_Portable/x64/RevoUn.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
RevoUninstaller_Portable/x86/RevoUn.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
RevoUninstaller_Portable/x86/RevoUn.exe
Resource
win10v2004-20240226-en
General
-
Target
RevoUninstaller_Portable/x86/RevoUn.exe
-
Size
12.2MB
-
MD5
15657f176a5eea4c0f943da107962d24
-
SHA1
2e4d2eaa1144ee1dd7d34fa580866a199e0012c7
-
SHA256
c6762c436785680d7a363821fa7d5767ec71fea45473501dee8c47007bf2b2c4
-
SHA512
880dbf849d041a96a61de84611c040bf674899bc0ecab693afe2cf911aa37cb537b83ecfd11525fce0d4758bdabe68092d17c6b5e2f4cde3fd58dc96f14bbf15
-
SSDEEP
196608:EH14G7PwPWpGplR806IIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIA8Zk:FPWpGplR8ZWk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Uninst.exepid process 4980 Uninst.exe -
Registers COM server for autorun 1 TTPs 1 IoCs
Processes:
Uninst.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32 Uninst.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
vssvc.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Modifies registry class 47 IoCs
Processes:
RevoUn.exeUninst.exedescription ioc process Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\7-Zip.tgz\shell RevoUn.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.gz\PersistentHandler RevoUn.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.tar RevoUn.exe Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\7-Zip.gz\shell RevoUn.exe Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\7-Zip.rar\shell RevoUn.exe Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\7-Zip.tar\shell\open RevoUn.exe Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\7-Zip.tgz\shell\open RevoUn.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.gz RevoUn.exe Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\7-Zip.7z\shell RevoUn.exe Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\7-Zip.7z RevoUn.exe Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\7-Zip.gz\shell\open\command RevoUn.exe Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\7-Zip.bzip2\shell\open\command RevoUn.exe Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\7-Zip.rar\shell\open\command RevoUn.exe Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\7-Zip.tar\shell RevoUn.exe Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\7-Zip.tgz RevoUn.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.bz2 RevoUn.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\*\SHELLEX\CONTEXTMENUHANDLERS\7-ZIP Uninst.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\DIRECTORY\SHELLEX\CONTEXTMENUHANDLERS\7-ZIP Uninst.exe Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\7-Zip.bz2 RevoUn.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.bzip2 RevoUn.exe Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\7-Zip.bzip2 RevoUn.exe Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\7-Zip.rar\shell\open RevoUn.exe Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\7-Zip.rar RevoUn.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.rar RevoUn.exe Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\7-Zip.bz2\shell RevoUn.exe Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\7-Zip.bzip2\shell\open RevoUn.exe Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\7-Zip.bzip2\shell RevoUn.exe Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\7-Zip.gz\shell\open RevoUn.exe Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\7-Zip.gz RevoUn.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.7z RevoUn.exe Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\7-Zip.7z\shell\open RevoUn.exe Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\7-Zip.bz2\shell\open RevoUn.exe Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\7-Zip.tar RevoUn.exe Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\7-Zip.tgz\shell\open\command RevoUn.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{23170F69-40C1-278A-1000-000100020000} Uninst.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\DRIVE\SHELLEX\DRAGDROPHANDLERS\7-ZIP Uninst.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{23170F69-40C1-278A-1000-000100020000} Uninst.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.tar\PersistentHandler RevoUn.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\FOLDER\SHELLEX\CONTEXTMENUHANDLERS\7-ZIP Uninst.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\DIRECTORY\SHELLEX\DRAGDROPHANDLERS\7-ZIP Uninst.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32 Uninst.exe Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\7-Zip.tar\shell\open\command RevoUn.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.tgz\PersistentHandler RevoUn.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.tgz RevoUn.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32 Uninst.exe Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\7-Zip.7z\shell\open\command RevoUn.exe Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\7-Zip.bz2\shell\open\command RevoUn.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
vssvc.exesrtasks.exedescription pid process Token: SeBackupPrivilege 4340 vssvc.exe Token: SeRestorePrivilege 4340 vssvc.exe Token: SeAuditPrivilege 4340 vssvc.exe Token: SeBackupPrivilege 2900 srtasks.exe Token: SeRestorePrivilege 2900 srtasks.exe Token: SeSecurityPrivilege 2900 srtasks.exe Token: SeTakeOwnershipPrivilege 2900 srtasks.exe Token: SeBackupPrivilege 2900 srtasks.exe Token: SeRestorePrivilege 2900 srtasks.exe Token: SeSecurityPrivilege 2900 srtasks.exe Token: SeTakeOwnershipPrivilege 2900 srtasks.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
RevoUn.exepid process 1076 RevoUn.exe 1076 RevoUn.exe 1076 RevoUn.exe 1076 RevoUn.exe 1076 RevoUn.exe 1076 RevoUn.exe -
Suspicious use of SendNotifyMessage 6 IoCs
Processes:
RevoUn.exepid process 1076 RevoUn.exe 1076 RevoUn.exe 1076 RevoUn.exe 1076 RevoUn.exe 1076 RevoUn.exe 1076 RevoUn.exe -
Suspicious use of SetWindowsHookEx 18 IoCs
Processes:
RevoUn.exepid process 1076 RevoUn.exe 1076 RevoUn.exe 1076 RevoUn.exe 1076 RevoUn.exe 1076 RevoUn.exe 1076 RevoUn.exe 1076 RevoUn.exe 1076 RevoUn.exe 1076 RevoUn.exe 1076 RevoUn.exe 1076 RevoUn.exe 1076 RevoUn.exe 1076 RevoUn.exe 1076 RevoUn.exe 1076 RevoUn.exe 1076 RevoUn.exe 1076 RevoUn.exe 1076 RevoUn.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
RevoUn.exeUninstall.exedescription pid process target process PID 1076 wrote to memory of 3912 1076 RevoUn.exe Uninstall.exe PID 1076 wrote to memory of 3912 1076 RevoUn.exe Uninstall.exe PID 1076 wrote to memory of 3912 1076 RevoUn.exe Uninstall.exe PID 3912 wrote to memory of 4980 3912 Uninstall.exe Uninst.exe PID 3912 wrote to memory of 4980 3912 Uninstall.exe Uninst.exe PID 3912 wrote to memory of 4980 3912 Uninstall.exe Uninst.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\RevoUninstaller_Portable\x86\RevoUn.exe"C:\Users\Admin\AppData\Local\Temp\RevoUninstaller_Portable\x86\RevoUn.exe"1⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Program Files\7-Zip\Uninstall.exe"C:\Program Files\7-Zip\Uninstall.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\7z9B9CDF48\Uninst.exeC:\Users\Admin\AppData\Local\Temp\7z9B9CDF48\Uninst.exe /N /D="C:\Program Files\7-Zip\"3⤵
- Executes dropped EXE
- Registers COM server for autorun
- Modifies registry class
PID:4980
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=744 --field-trial-handle=3240,i,13319578961094268484,16557498665191861597,262144 --variations-seed-version /prefetch:81⤵PID:4144
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:4340
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:21⤵
- Suspicious use of AdjustPrivilegeToken
PID:2900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5ad782ffac62e14e2269bf1379bccbaae
SHA19539773b550e902a35764574a2be2d05bc0d8afc
SHA2561c8a77db924ebeb952052334dc95add388700c02b073b07973cd8fe0a0a360b8
SHA512a1e9d6316ffc55f4751090961733e98c93b2a391666ff50b50e9dea39783746e501d14127e7ee9343926976d7e3cd224f13736530354d8466ea995dab35c8dc2
-
Filesize
860B
MD5be0a819279589bdadf841c1dea2553c3
SHA12e703cc9aa1a2f0c34c43020b9c21049e3fd02a5
SHA256f963d0ccbcfab5fb945f73ebbfeab2c28724be1ee9807bf38e852af04b7a8aa5
SHA512dd49e60930f956221937326a7d0e4143cf23a1dca114bf73c9faaa2145c4b0155c59201d34dfa1cb903a28eaff7e5538d5db7e5e89955671f57ef82b9ecaa729
-
Filesize
1KB
MD58ea4dbb3715f0f52d89dd4f5ed741c5a
SHA142cd4729935a87b9294c26903a7d057654264675
SHA25672240677b7821c6098366d57f6fd7c11e0fbd8c53ac124f23495ad4532b13d77
SHA512d7a11b7b271438731fe16c7b6a72f9ec12336f70fe9ee40d16dfb456f80ffb628aa416dc8785e858879084a8a20830eda69a05ee9957896338359d4a8d3939dd
-
Filesize
2KB
MD5644f97f8b2bd7aa62dfc5e9bda0b65f9
SHA1f1193a02c603521f359ee4b0829dfa9bec5aef3a
SHA2560c56624e3efab3696682ca1553b468ab94de7b62368cc5d6b8188c8a5db4c1a5
SHA5125c3c623dbb6e5e7f7179107c83e57d5fd4925335a0bd04c10c6796c2211c6b2a4432b6955f504d3703c764ab85d0373f4b3c75bd7abfa6428673ca9d2c486f2e
-
Filesize
3KB
MD564a5dc9b6019f870316ea260af3c290e
SHA1639374422b7d8b0ed1be7f8665b02a54050a0194
SHA256a153e65f98645d65cec2085b17ba652249c94efd54eaaddf183e79699e641f19
SHA512b8647f3a602c4f25b6123f441db3bf4fbaa086d9f9ebaa61fda88b0ea9f7ffa9c22a1813ef16cb980421383b341ec895f308d93cedb01f12b342822c50fd50d8
-
Filesize
3KB
MD5123eec63219aa6dd29c7427804ce813f
SHA11657ce96812dee3cdc912a05df55a9df57bea17f
SHA2568817abe78423526ef4a3e2a34e16e6ff0576865bb85eb71193e38af79307597a
SHA5128ed3d161d65943ee203b0837c2c3414565d0003b26124df7d3f1526acd87a952dba557c2ef48a5fbe6725fe7a2271aa689821e35974291880b9a9d2d5264a488
-
Filesize
998B
MD5bcc89ffb1f8032d120f329e08d9ed49b
SHA1399dad1f6b78ba114c1fa91ccf35eceb2465203a
SHA2562ade7d99e0252db6c1fc8040fec0e301670729d3e074b17ef4d6b02448760bf1
SHA512f970f97c5f71eeff24bd3241f57d315d977407b4d28e4791640d21a922363d2fc1979ea086791436deaf6422375465be700f34d081b2e7f0cc7eac5bd5206c8c