Analysis
-
max time kernel
1s -
max time network
5s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 16:31
Static task
static1
Behavioral task
behavioral1
Sample
revosetup.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
revosetup.exe
Resource
win10v2004-20240508-en
General
-
Target
revosetup.exe
-
Size
6.6MB
-
MD5
63150c4846bfbcf27fa70ccaa8a01943
-
SHA1
bfe32dcc00b041e0007a883af1588f354bb9f032
-
SHA256
a05acc9172e98ec6a6a7f923f5c648cc7a7c4e02bbcaaa5a6d9663229e662c24
-
SHA512
7c0c8065c83529ffe9cf092a7ffb19f59252015d643bded9cf5459e6e6a4c582962ab6e36b330275a79649fa6e8d3da01cb95352870a52fa159bb278b967cd90
-
SSDEEP
98304:MPyYn2kIIR7ABl27MwarecfhZzwStzDtAVl3gaSZmg4MPyDv0bSpkmmf6osFQaiS:q7Vty27MJzw6z8X4mgJSyNyos6ac4l
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4816 revosetup.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3220 wrote to memory of 4816 3220 revosetup.exe 82 PID 3220 wrote to memory of 4816 3220 revosetup.exe 82 PID 3220 wrote to memory of 4816 3220 revosetup.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\revosetup.exe"C:\Users\Admin\AppData\Local\Temp\revosetup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\is-GBA2T.tmp\revosetup.tmp"C:\Users\Admin\AppData\Local\Temp\is-GBA2T.tmp\revosetup.tmp" /SL5="$70180,6355320,266240,C:\Users\Admin\AppData\Local\Temp\revosetup.exe"2⤵
- Executes dropped EXE
PID:4816
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD57b77e7c3ebd213d95c4d909716f10030
SHA11c00eb97b4f154e209162bee83a84a6f1d1ef034
SHA256a1bab1631135a982dfec6024b1ef8eb1ea2bce519cd832d9151e95e8def916d2
SHA512fb6f95d42a936911b66861280cdeee77e2125c6b30141eb66daff402453d635a87a7f8ec9435ceb7ad4fddb473d6347a787bedb5649aa3abb234aceeeaaf8dcd