Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 02:34
Static task
static1
Behavioral task
behavioral1
Sample
9b8a6009e8c26fd26faa5e3129c0eba1b8ec7287c88fde5001779d83f5e77249.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
9b8a6009e8c26fd26faa5e3129c0eba1b8ec7287c88fde5001779d83f5e77249.exe
Resource
win10v2004-20240704-en
General
-
Target
9b8a6009e8c26fd26faa5e3129c0eba1b8ec7287c88fde5001779d83f5e77249.exe
-
Size
903KB
-
MD5
e7b74b2b71ee94341d5226bece5edbb2
-
SHA1
f4207f742ac78226ff19a97af067c64c134702d6
-
SHA256
9b8a6009e8c26fd26faa5e3129c0eba1b8ec7287c88fde5001779d83f5e77249
-
SHA512
b4e79bcd0838ee9f781e01a998d262e390d446a98a89c16be03a0c1fcdf94a71843d5b5a25b5fe0a908aa3aaa5b12bd8e8aa8b3637a28f45fd5e946f60a4e15c
-
SSDEEP
24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5M:gh+ZkldoPK8YaKGM
Malware Config
Extracted
revengerat
Marzo26
marzorevenger.duckdns.org:4230
RV_MUTEX-PiGGjjtnxDpn
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AudioHandlers.url 9b8a6009e8c26fd26faa5e3129c0eba1b8ec7287c88fde5001779d83f5e77249.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1760 set thread context of 2480 1760 9b8a6009e8c26fd26faa5e3129c0eba1b8ec7287c88fde5001779d83f5e77249.exe 30 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2480 RegAsm.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1760 9b8a6009e8c26fd26faa5e3129c0eba1b8ec7287c88fde5001779d83f5e77249.exe 1760 9b8a6009e8c26fd26faa5e3129c0eba1b8ec7287c88fde5001779d83f5e77249.exe 1760 9b8a6009e8c26fd26faa5e3129c0eba1b8ec7287c88fde5001779d83f5e77249.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1760 9b8a6009e8c26fd26faa5e3129c0eba1b8ec7287c88fde5001779d83f5e77249.exe 1760 9b8a6009e8c26fd26faa5e3129c0eba1b8ec7287c88fde5001779d83f5e77249.exe 1760 9b8a6009e8c26fd26faa5e3129c0eba1b8ec7287c88fde5001779d83f5e77249.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1760 wrote to memory of 2480 1760 9b8a6009e8c26fd26faa5e3129c0eba1b8ec7287c88fde5001779d83f5e77249.exe 30 PID 1760 wrote to memory of 2480 1760 9b8a6009e8c26fd26faa5e3129c0eba1b8ec7287c88fde5001779d83f5e77249.exe 30 PID 1760 wrote to memory of 2480 1760 9b8a6009e8c26fd26faa5e3129c0eba1b8ec7287c88fde5001779d83f5e77249.exe 30 PID 1760 wrote to memory of 2480 1760 9b8a6009e8c26fd26faa5e3129c0eba1b8ec7287c88fde5001779d83f5e77249.exe 30 PID 1760 wrote to memory of 2480 1760 9b8a6009e8c26fd26faa5e3129c0eba1b8ec7287c88fde5001779d83f5e77249.exe 30 PID 1760 wrote to memory of 2480 1760 9b8a6009e8c26fd26faa5e3129c0eba1b8ec7287c88fde5001779d83f5e77249.exe 30 PID 1760 wrote to memory of 2480 1760 9b8a6009e8c26fd26faa5e3129c0eba1b8ec7287c88fde5001779d83f5e77249.exe 30 PID 1760 wrote to memory of 2480 1760 9b8a6009e8c26fd26faa5e3129c0eba1b8ec7287c88fde5001779d83f5e77249.exe 30 PID 1760 wrote to memory of 2480 1760 9b8a6009e8c26fd26faa5e3129c0eba1b8ec7287c88fde5001779d83f5e77249.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b8a6009e8c26fd26faa5e3129c0eba1b8ec7287c88fde5001779d83f5e77249.exe"C:\Users\Admin\AppData\Local\Temp\9b8a6009e8c26fd26faa5e3129c0eba1b8ec7287c88fde5001779d83f5e77249.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2480
-