Analysis

  • max time kernel
    97s
  • max time network
    107s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    13/07/2024, 04:14

General

  • Target

    45338701c17a7a73a18f0accf7d53d10N.exe

  • Size

    951KB

  • MD5

    45338701c17a7a73a18f0accf7d53d10

  • SHA1

    17cdf41c6adf5434eb5d6ad1bb6631df9223ca6e

  • SHA256

    988e6fa88a084886b1d8807a600db957e35707b4ef3355794b41f6be4630725e

  • SHA512

    e7e0572088e2fa59a851c5b146eb03448e2f56167ae612c681c50ab0a697c6fcd1462c82544ccf6da179c38d0b6d6f4d385eb763d7c7c606bb3e0e3a141d0773

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5T:Rh+ZkldDPK8YaKjT

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Drops startup file 1 IoCs
  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\45338701c17a7a73a18f0accf7d53d10N.exe
    "C:\Users\Admin\AppData\Local\Temp\45338701c17a7a73a18f0accf7d53d10N.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2540
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1072

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1072-1-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1072-5-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1072-2-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1072-7-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1072-8-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1072-9-0x0000000074302000-0x0000000074304000-memory.dmp

    Filesize

    8KB

  • memory/2540-0-0x00000000000B0000-0x00000000001A3000-memory.dmp

    Filesize

    972KB

  • memory/2540-13-0x00000000000B0000-0x00000000001A3000-memory.dmp

    Filesize

    972KB