Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-08-2024 10:11
Static task
static1
Behavioral task
behavioral1
Sample
9d81b1bec5ebce1374c0cb4668c6f120N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9d81b1bec5ebce1374c0cb4668c6f120N.exe
Resource
win10v2004-20240802-en
General
-
Target
9d81b1bec5ebce1374c0cb4668c6f120N.exe
-
Size
903KB
-
MD5
9d81b1bec5ebce1374c0cb4668c6f120
-
SHA1
6c21ebdfd34d1821eb93181179fcedcef7e105f1
-
SHA256
b0602cc9f92c9138a34f0e99a9f2017f56628e997657b2f998dedf83af2461e6
-
SHA512
6c86b7c4e7a541c70bf21506cc85cfd7ffbff59f501fe25283591992c88635c7ef209f50b092653fd9713343f116e0a6add21410442a41036161869ac92f5c8c
-
SSDEEP
24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5F:gh+ZkldoPK8YaKGF
Malware Config
Extracted
revengerat
Marzo26
marzorevenger.duckdns.org:4230
RV_MUTEX-PiGGjjtnxDpn
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AudioHandlers.url 9d81b1bec5ebce1374c0cb4668c6f120N.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3720 set thread context of 5116 3720 9d81b1bec5ebce1374c0cb4668c6f120N.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9d81b1bec5ebce1374c0cb4668c6f120N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5116 RegAsm.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3720 9d81b1bec5ebce1374c0cb4668c6f120N.exe 3720 9d81b1bec5ebce1374c0cb4668c6f120N.exe 3720 9d81b1bec5ebce1374c0cb4668c6f120N.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3720 9d81b1bec5ebce1374c0cb4668c6f120N.exe 3720 9d81b1bec5ebce1374c0cb4668c6f120N.exe 3720 9d81b1bec5ebce1374c0cb4668c6f120N.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3720 wrote to memory of 5116 3720 9d81b1bec5ebce1374c0cb4668c6f120N.exe 85 PID 3720 wrote to memory of 5116 3720 9d81b1bec5ebce1374c0cb4668c6f120N.exe 85 PID 3720 wrote to memory of 5116 3720 9d81b1bec5ebce1374c0cb4668c6f120N.exe 85 PID 3720 wrote to memory of 5116 3720 9d81b1bec5ebce1374c0cb4668c6f120N.exe 85 PID 3720 wrote to memory of 5116 3720 9d81b1bec5ebce1374c0cb4668c6f120N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d81b1bec5ebce1374c0cb4668c6f120N.exe"C:\Users\Admin\AppData\Local\Temp\9d81b1bec5ebce1374c0cb4668c6f120N.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5116
-