Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 17:18
Static task
static1
Behavioral task
behavioral1
Sample
RevoUninProSetup.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
RevoUninProSetup.exe
Resource
win10v2004-20240508-en
General
-
Target
RevoUninProSetup.exe
-
Size
16.9MB
-
MD5
b0f15df675ff3ff11fe6eac7a32e4409
-
SHA1
59178aed358362c8fb3905e66170ac924c803879
-
SHA256
89d038c065e1e236a4c086f9485dbf1315114ed92eed19e64d2e3fe771688d9a
-
SHA512
3f1d56d12948872632fe626e61533790852a54c892385c8d1cf8b6111a6ee4379bcc907958d6b8d82736476e2b9b9be6e53604c494227ae370d2496b84b48a47
-
SSDEEP
393216:4S2H6AdClOaamBv1XONf50LdeJ/mXjGyh+OLTvrGVJCmY0mB:RE6AdDwhc5IeNxyh+OPDGVJCmnmB
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
RevoUninProSetup.tmpdescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation RevoUninProSetup.tmp -
Executes dropped EXE 1 IoCs
Processes:
RevoUninProSetup.tmppid process 1376 RevoUninProSetup.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 2308 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 2308 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
RevoUninProSetup.exeRevoUninProSetup.tmpdescription pid process target process PID 868 wrote to memory of 1376 868 RevoUninProSetup.exe RevoUninProSetup.tmp PID 868 wrote to memory of 1376 868 RevoUninProSetup.exe RevoUninProSetup.tmp PID 868 wrote to memory of 1376 868 RevoUninProSetup.exe RevoUninProSetup.tmp PID 1376 wrote to memory of 2308 1376 RevoUninProSetup.tmp taskkill.exe PID 1376 wrote to memory of 2308 1376 RevoUninProSetup.tmp taskkill.exe PID 1376 wrote to memory of 2308 1376 RevoUninProSetup.tmp taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RevoUninProSetup.exe"C:\Users\Admin\AppData\Local\Temp\RevoUninProSetup.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-5G3LL.tmp\RevoUninProSetup.tmp"C:\Users\Admin\AppData\Local\Temp\is-5G3LL.tmp\RevoUninProSetup.tmp" /SL5="$E0058,17135947,196608,C:\Users\Admin\AppData\Local\Temp\RevoUninProSetup.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im ruplp.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-5G3LL.tmp\RevoUninProSetup.tmpFilesize
1.2MB
MD55d46b017331b5c6acd69f35213277f2f
SHA18992114b0cb8d354376a956660f95f88bf7165e6
SHA256800c00e3605ec37454d98aaa1732074b97dac39bc9d59a820f296223e8efc773
SHA5124465609922a75f0e6206ccea0ddb974830f043fbffbfc4fd966817c133a1e398915ef3b014b2608e2378ffe62390a1cdb562d82817c8f746649cdbaa6a176cec
-
memory/868-0-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/868-2-0x0000000000401000-0x0000000000412000-memory.dmpFilesize
68KB
-
memory/868-8-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/1376-6-0x0000000000400000-0x0000000000540000-memory.dmpFilesize
1.2MB
-
memory/1376-9-0x0000000000400000-0x0000000000540000-memory.dmpFilesize
1.2MB