Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 08:19
Static task
static1
Behavioral task
behavioral1
Sample
af251b22c38e50e022439fa8aab75040N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
af251b22c38e50e022439fa8aab75040N.exe
Resource
win10v2004-20240709-en
General
-
Target
af251b22c38e50e022439fa8aab75040N.exe
-
Size
904KB
-
MD5
af251b22c38e50e022439fa8aab75040
-
SHA1
8686c78390c757b8b55cfcc9297fa272c6a73ea5
-
SHA256
3bd07862bb5fdd9f4a20e4fce53d6d32e98fc2c7f3f6d06e10cd348cc42d5db3
-
SHA512
c053143e2e973f8ba1e54ebbf06557b2b2c9c926c73d82a88bfcbc711bd980ebfd2fffec80514c0e95b612496c157f6314a2563dfc6384feec53266cf202f1d2
-
SSDEEP
24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5A:gh+ZkldoPK8YaKGA
Malware Config
Extracted
revengerat
Marzo26
marzorevenger.duckdns.org:4230
RV_MUTEX-PiGGjjtnxDpn
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AudioHandlers.url af251b22c38e50e022439fa8aab75040N.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1384 set thread context of 2552 1384 af251b22c38e50e022439fa8aab75040N.exe 85 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2552 RegAsm.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1384 af251b22c38e50e022439fa8aab75040N.exe 1384 af251b22c38e50e022439fa8aab75040N.exe 1384 af251b22c38e50e022439fa8aab75040N.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1384 af251b22c38e50e022439fa8aab75040N.exe 1384 af251b22c38e50e022439fa8aab75040N.exe 1384 af251b22c38e50e022439fa8aab75040N.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1384 wrote to memory of 2552 1384 af251b22c38e50e022439fa8aab75040N.exe 85 PID 1384 wrote to memory of 2552 1384 af251b22c38e50e022439fa8aab75040N.exe 85 PID 1384 wrote to memory of 2552 1384 af251b22c38e50e022439fa8aab75040N.exe 85 PID 1384 wrote to memory of 2552 1384 af251b22c38e50e022439fa8aab75040N.exe 85 PID 1384 wrote to memory of 2552 1384 af251b22c38e50e022439fa8aab75040N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\af251b22c38e50e022439fa8aab75040N.exe"C:\Users\Admin\AppData\Local\Temp\af251b22c38e50e022439fa8aab75040N.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2552
-