Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
16s -
max time network
59s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 12:21
Behavioral task
behavioral1
Sample
6ed1f348fc4e30067fbf3430d938e1a0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6ed1f348fc4e30067fbf3430d938e1a0N.exe
Resource
win10v2004-20240802-en
General
-
Target
6ed1f348fc4e30067fbf3430d938e1a0N.exe
-
Size
1.1MB
-
MD5
6ed1f348fc4e30067fbf3430d938e1a0
-
SHA1
8672c9fd18f1f961743ffc393c31e208b718a464
-
SHA256
3c4f09f050cd08b3538ea6bd0a2a0a543bab2c58b299b214a9c3161d7c53a537
-
SHA512
bd8264f5374441901e8206a351b10e3c90a1fa3a1702c90317da2d741979e8e56524759ba0fe19d848a087fe68dd792f04aec23568cc3c1cb60d97c9c45b5ebc
-
SSDEEP
24576:Pq5TfcdHj4fmbA2qx0MmV0VMXR9mOphGkDKTeOffsGiE:PUTsamUxzOzrOffL
Malware Config
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
RevengeRat Executable 1 IoCs
resource yara_rule behavioral1/files/0x0017000000018bbf-4.dat revengerat -
Executes dropped EXE 1 IoCs
pid Process 2488 dmr_72.exe -
Loads dropped DLL 4 IoCs
pid Process 760 6ed1f348fc4e30067fbf3430d938e1a0N.exe 760 6ed1f348fc4e30067fbf3430d938e1a0N.exe 760 6ed1f348fc4e30067fbf3430d938e1a0N.exe 760 6ed1f348fc4e30067fbf3430d938e1a0N.exe -
resource yara_rule behavioral1/memory/760-0-0x00000000000C0000-0x0000000000332000-memory.dmp upx behavioral1/memory/760-23-0x00000000000C0000-0x0000000000332000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/760-23-0x00000000000C0000-0x0000000000332000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 6ed1f348fc4e30067fbf3430d938e1a0N.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 6ed1f348fc4e30067fbf3430d938e1a0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6ed1f348fc4e30067fbf3430d938e1a0N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2488 dmr_72.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 760 6ed1f348fc4e30067fbf3430d938e1a0N.exe 760 6ed1f348fc4e30067fbf3430d938e1a0N.exe 760 6ed1f348fc4e30067fbf3430d938e1a0N.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 760 6ed1f348fc4e30067fbf3430d938e1a0N.exe 760 6ed1f348fc4e30067fbf3430d938e1a0N.exe 760 6ed1f348fc4e30067fbf3430d938e1a0N.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2488 dmr_72.exe 2488 dmr_72.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 760 wrote to memory of 2488 760 6ed1f348fc4e30067fbf3430d938e1a0N.exe 29 PID 760 wrote to memory of 2488 760 6ed1f348fc4e30067fbf3430d938e1a0N.exe 29 PID 760 wrote to memory of 2488 760 6ed1f348fc4e30067fbf3430d938e1a0N.exe 29 PID 760 wrote to memory of 2488 760 6ed1f348fc4e30067fbf3430d938e1a0N.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ed1f348fc4e30067fbf3430d938e1a0N.exe"C:\Users\Admin\AppData\Local\Temp\6ed1f348fc4e30067fbf3430d938e1a0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Users\Admin\AppData\Local\Temp\DMR\dmr_72.exe"C:\Users\Admin\AppData\Local\Temp\DMR\dmr_72.exe" -install -54373183 -chipde -a0ef907135f6446f922fffe729d4357a - -BLUB2 -fiomxfgmefbpikaw -7602⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
111B
MD5b09782ce2cb4cf7c61edd7786126ed99
SHA1f1ffa7a0535aa36e230d5263c7f3bfcca6b2e071
SHA25691452a68de6c37499bad3a455e24de7184494f90de8b51bf3a32487db7d455cf
SHA51285064fe42f9a6f31dab0a0feb22c9e2efaba73e401a0ab433bd8152cbbc6b4376209b71bac2be4780e516ea76273acd9d319643765f87ac3119fb91ccfaec91c
-
Filesize
369KB
MD519d8275624db964f341db752ce4c1bd3
SHA1333beb35a70772f1757e99f0154d59964b921d3f
SHA256e9789f0d4a7342ff6fa665e55f0f2d22b72ea6f71b3cad3e6acb0f8d05ff27e9
SHA512c4bd903567576e670ee5d968e62345dd4e6a5fece3d59cd7b7634f09da4ade2f24aa9404c9c3f7f35658fdcfe3b2e02c8ae6930afa0b4ebf8b041e3e27993e94