Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07/07/2024, 01:09
Static task
static1
Behavioral task
behavioral1
Sample
2e6d57f9b1cb7c02c9bc7ce458679bb0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2e6d57f9b1cb7c02c9bc7ce458679bb0N.exe
Resource
win10v2004-20240704-en
General
-
Target
2e6d57f9b1cb7c02c9bc7ce458679bb0N.exe
-
Size
903KB
-
MD5
2e6d57f9b1cb7c02c9bc7ce458679bb0
-
SHA1
aa0931224dbf841c6c71f9db5aee251a0f3854a5
-
SHA256
820547e17c9bfc76e4f129abbbe38c522f8d83abf2e22272d40858f820de52a8
-
SHA512
6ea82b42cc10136e0c5bdac97e7f7ea9e825561113fb8d77507c7edb9acdb59367c5b78e2e2a70f7b5bef88011ba7cbd05ad0fb6de323ab5ab86ade0ff00371c
-
SSDEEP
24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5M:gh+ZkldoPK8YaKGM
Malware Config
Extracted
revengerat
Marzo26
marzorevenger.duckdns.org:4230
RV_MUTEX-PiGGjjtnxDpn
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AudioHandlers.url 2e6d57f9b1cb7c02c9bc7ce458679bb0N.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2200 set thread context of 2600 2200 2e6d57f9b1cb7c02c9bc7ce458679bb0N.exe 30 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2600 RegAsm.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2200 2e6d57f9b1cb7c02c9bc7ce458679bb0N.exe 2200 2e6d57f9b1cb7c02c9bc7ce458679bb0N.exe 2200 2e6d57f9b1cb7c02c9bc7ce458679bb0N.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2200 2e6d57f9b1cb7c02c9bc7ce458679bb0N.exe 2200 2e6d57f9b1cb7c02c9bc7ce458679bb0N.exe 2200 2e6d57f9b1cb7c02c9bc7ce458679bb0N.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2600 2200 2e6d57f9b1cb7c02c9bc7ce458679bb0N.exe 30 PID 2200 wrote to memory of 2600 2200 2e6d57f9b1cb7c02c9bc7ce458679bb0N.exe 30 PID 2200 wrote to memory of 2600 2200 2e6d57f9b1cb7c02c9bc7ce458679bb0N.exe 30 PID 2200 wrote to memory of 2600 2200 2e6d57f9b1cb7c02c9bc7ce458679bb0N.exe 30 PID 2200 wrote to memory of 2600 2200 2e6d57f9b1cb7c02c9bc7ce458679bb0N.exe 30 PID 2200 wrote to memory of 2600 2200 2e6d57f9b1cb7c02c9bc7ce458679bb0N.exe 30 PID 2200 wrote to memory of 2600 2200 2e6d57f9b1cb7c02c9bc7ce458679bb0N.exe 30 PID 2200 wrote to memory of 2600 2200 2e6d57f9b1cb7c02c9bc7ce458679bb0N.exe 30 PID 2200 wrote to memory of 2600 2200 2e6d57f9b1cb7c02c9bc7ce458679bb0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e6d57f9b1cb7c02c9bc7ce458679bb0N.exe"C:\Users\Admin\AppData\Local\Temp\2e6d57f9b1cb7c02c9bc7ce458679bb0N.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2600
-