Analysis Overview
SHA256
581d49be492287faee8d97ef0ae861850a7f2ebefd58f83dda39c0bcdcf59b1f
Threat Level: Known bad
The file XV2SuperSoulEditor-1.80.zip was found to be: Known bad.
Malicious Activity Summary
RevengeRat Executable
Revengerat family
Browser Information Discovery
Unsigned PE
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of AdjustPrivilegeToken
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-08-04 13:29
Signatures
RevengeRat Executable
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Revengerat family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-08-04 13:29
Reported
2024-08-04 13:34
Platform
win7-20240708-en
Max time kernel
120s
Max time network
121s
Command Line
Signatures
Browser Information Discovery
Enumerates physical storage devices
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\XV2SSEdit.exe | N/A |
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\XV2SSEdit.exe | N/A |
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\XV2SSEdit.exe
"C:\Users\Admin\AppData\Local\Temp\XV2SSEdit.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6fa9758,0x7fef6fa9768,0x7fef6fa9778
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1196 --field-trial-handle=1388,i,14920470923372512357,8616622719382055624,131072 /prefetch:2
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1512 --field-trial-handle=1388,i,14920470923372512357,8616622719382055624,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1616 --field-trial-handle=1388,i,14920470923372512357,8616622719382055624,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2288 --field-trial-handle=1388,i,14920470923372512357,8616622719382055624,131072 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2400 --field-trial-handle=1388,i,14920470923372512357,8616622719382055624,131072 /prefetch:1
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2844 --field-trial-handle=1388,i,14920470923372512357,8616622719382055624,131072 /prefetch:2
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1500 --field-trial-handle=1388,i,14920470923372512357,8616622719382055624,131072 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3668 --field-trial-handle=1388,i,14920470923372512357,8616622719382055624,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3716 --field-trial-handle=1388,i,14920470923372512357,8616622719382055624,131072 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=2480 --field-trial-handle=1388,i,14920470923372512357,8616622719382055624,131072 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2452 --field-trial-handle=1388,i,14920470923372512357,8616622719382055624,131072 /prefetch:1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | www.google.com | udp |
| GB | 142.250.178.4:443 | www.google.com | udp |
| GB | 142.250.178.4:443 | www.google.com | tcp |
| N/A | 224.0.0.251:5353 | udp | |
| US | 8.8.8.8:53 | content-autofill.googleapis.com | udp |
| GB | 142.250.187.202:443 | content-autofill.googleapis.com | tcp |
Files
memory/824-0-0x0000000074CBE000-0x0000000074CBF000-memory.dmp
memory/824-1-0x0000000000B20000-0x0000000000B8E000-memory.dmp
memory/824-2-0x0000000074CB0000-0x000000007539E000-memory.dmp
memory/824-3-0x0000000000640000-0x000000000065C000-memory.dmp
memory/824-4-0x0000000074CB0000-0x000000007539E000-memory.dmp
memory/824-5-0x0000000074CB0000-0x000000007539E000-memory.dmp
memory/824-8-0x0000000074CBE000-0x0000000074CBF000-memory.dmp
memory/824-9-0x0000000074CB0000-0x000000007539E000-memory.dmp
memory/824-10-0x0000000074CB0000-0x000000007539E000-memory.dmp
\??\pipe\crashpad_2940_ZQPPOZOIGHHDUOAQ
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\CURRENT
| MD5 | 18e723571b00fb1694a3bad6c78e4054 |
| SHA1 | afcc0ef32d46fe59e0483f9a3c891d3034d12f32 |
| SHA256 | 8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa |
| SHA512 | 43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1
| MD5 | f50f89a0a91564d0b8a211f8921aa7de |
| SHA1 | 112403a17dd69d5b9018b8cede023cb3b54eab7d |
| SHA256 | b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec |
| SHA512 | bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000001
| MD5 | 3e552d017d45f8fd93b94cfc86f842f2 |
| SHA1 | dbeebe83854328e2575ff67259e3fb6704b17a47 |
| SHA256 | 27d9c4613df7a3c04da0b79c13217aa69992b441acb7e44bf2a7578ca87d97d6 |
| SHA512 | e616436f2f15615429c7c5c37de3990c3e86c5e1da7d75a0f524fc458b75d44a5be1a3648a628d63e1cf8aa062e08b538f2f2bc9c6a0b42157beb24f82c571d9 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 7d78b533ce0b7d5a03e55e96980412f9 |
| SHA1 | 937811c908914afc8b62edbfb2440d651c61b7ae |
| SHA256 | 9f76ee73af4c1a68d83e19d67d7bd8eeea1524a18e23e211383bae3f702fb76b |
| SHA512 | 97195f96fb394808663a72968953fc25eb5b266feb7a1afe61dc04ad082ce21f745c97a56dc3e3dfbe38559e701042e669a6d6903e562acfbd2f6bce9ffce8e3 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
| MD5 | a5e61e98551b71484c113c589b992ec4 |
| SHA1 | 1e257a400d6ec79fdd6fb2ddb1624395480f3164 |
| SHA256 | 82719c42c5641a09c0c55bff17307d05909012f90bdf73c66539c02cd1aa2bef |
| SHA512 | 9798d24548edf8b23a0d5a94c452d5fe85d490498c36a87b9502a9ca683394f026e4c0d8d212e3232614667224e885628f15da5c12f192e665d8cf83997f58c7 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 253a658e74ed8d7d3b21040e616182be |
| SHA1 | a7a49fb96f5a1b5322ea13b54a420d907e97f592 |
| SHA256 | 2966258ea3ae492b3e39041b1da98fc8cac6420c68e57fac7886154e13310114 |
| SHA512 | cc6c40e9e69b3beeffc50c4472c6308cf0664564f1ba0e37382327cc3d946226963be1d22f26ca03316ea394de424c5c76d4b9bb3939e812cc353017bcaeed55 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
| MD5 | 52ef7c28d44174e513666ae3c9a115c8 |
| SHA1 | ab7675c49f46a1d177696cc4073ffcceb82c3ad2 |
| SHA256 | db35b761024a9bc347ea230f84016eeb42465adc4c4097344add3f241c38bcf0 |
| SHA512 | a71e59985b8057b2166be76867160435405d19d8d26aaa67c7f95d81ea32b73f675a94e9815c687666a555a1ae36e40cb4363b9cee0d051698e7c328e517233c |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\333c646a-f24f-4eee-a1e7-18efba53bcdc.tmp
| MD5 | 20d36a471d410f5493d26c5f49435c0c |
| SHA1 | c203aa80f59f18f14b26b759b9c01c8e041cb4d4 |
| SHA256 | 720cfd5f115199df5028819487d8a35ede080f5f2d5a83300259b692821805c7 |
| SHA512 | bed6433e2799ca7846e72385bdaad6969194186f738437a3efc1af27cec45eebd54a2207647dad04d048f7efaf4a8bc125129fe12c2ca7f086875157dfbb7d12 |
Analysis: behavioral2
Detonation Overview
Submitted
2024-08-04 13:29
Reported
2024-08-04 13:34
Platform
win10v2004-20240802-en
Max time kernel
125s
Max time network
128s
Command Line
Signatures
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\XV2SSEdit.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeManageVolumePrivilege | N/A | C:\Windows\System32\svchost.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\XV2SSEdit.exe
"C:\Users\Admin\AppData\Local\Temp\XV2SSEdit.exe"
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4252,i,11251706013556949551,5157034131170452377,262144 --variations-seed-version --mojo-platform-channel-handle=4400 /prefetch:8
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k UnistackSvcGroup
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 81.144.22.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 22.160.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.237:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 237.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.59.114.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 192.142.123.92.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 29.243.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.144.22.2.in-addr.arpa | udp |
Files
memory/4908-0-0x000000007533E000-0x000000007533F000-memory.dmp
memory/4908-1-0x0000000000640000-0x00000000006AE000-memory.dmp
memory/4908-2-0x0000000005860000-0x0000000005E04000-memory.dmp
memory/4908-3-0x0000000005120000-0x00000000051B2000-memory.dmp
memory/4908-4-0x00000000050B0000-0x00000000050BA000-memory.dmp
memory/4908-5-0x0000000075330000-0x0000000075AE0000-memory.dmp
memory/4908-6-0x0000000075330000-0x0000000075AE0000-memory.dmp
memory/4908-7-0x00000000056B0000-0x00000000056CC000-memory.dmp
memory/4908-9-0x000000007533E000-0x000000007533F000-memory.dmp
memory/4908-10-0x0000000075330000-0x0000000075AE0000-memory.dmp
memory/4908-12-0x0000000075330000-0x0000000075AE0000-memory.dmp
memory/1584-29-0x00000241DC840000-0x00000241DC850000-memory.dmp
memory/1584-13-0x00000241DC740000-0x00000241DC750000-memory.dmp
memory/1584-45-0x00000241E4DF0000-0x00000241E4DF1000-memory.dmp
memory/1584-46-0x00000241E4E20000-0x00000241E4E21000-memory.dmp
memory/1584-47-0x00000241E4E20000-0x00000241E4E21000-memory.dmp
memory/1584-48-0x00000241E4E20000-0x00000241E4E21000-memory.dmp
memory/1584-49-0x00000241E4E20000-0x00000241E4E21000-memory.dmp
memory/1584-50-0x00000241E4E20000-0x00000241E4E21000-memory.dmp
memory/1584-51-0x00000241E4E20000-0x00000241E4E21000-memory.dmp
memory/1584-52-0x00000241E4E20000-0x00000241E4E21000-memory.dmp
memory/1584-53-0x00000241E4E20000-0x00000241E4E21000-memory.dmp
memory/1584-54-0x00000241E4E20000-0x00000241E4E21000-memory.dmp
memory/1584-55-0x00000241E4E20000-0x00000241E4E21000-memory.dmp
memory/1584-56-0x00000241E4A40000-0x00000241E4A41000-memory.dmp
memory/1584-57-0x00000241E4A30000-0x00000241E4A31000-memory.dmp
memory/1584-59-0x00000241E4A40000-0x00000241E4A41000-memory.dmp
memory/1584-62-0x00000241E4A30000-0x00000241E4A31000-memory.dmp
memory/1584-65-0x00000241E4970000-0x00000241E4971000-memory.dmp
memory/1584-77-0x00000241E4B70000-0x00000241E4B71000-memory.dmp
memory/1584-79-0x00000241E4B80000-0x00000241E4B81000-memory.dmp
memory/1584-80-0x00000241E4B80000-0x00000241E4B81000-memory.dmp
memory/1584-81-0x00000241E4C90000-0x00000241E4C91000-memory.dmp