Analysis
-
max time kernel
102s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 11:07
Static task
static1
Behavioral task
behavioral1
Sample
4aed340fcde3602287fb6a9668b7e660N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4aed340fcde3602287fb6a9668b7e660N.exe
Resource
win10v2004-20240802-en
General
-
Target
4aed340fcde3602287fb6a9668b7e660N.exe
-
Size
904KB
-
MD5
4aed340fcde3602287fb6a9668b7e660
-
SHA1
48ae2c8f1b5e5477a297c6300440f3f246f17752
-
SHA256
9f24308e249749e356e0cd3ba999737c9e085d889a0873abd16ec0ff7bb9c181
-
SHA512
5d493bd3e07a34edfcdb8864b7effbdfd289b2ebeb61e26ce9eeba6143656d4ed766e52651fbefc668dffa851355e17e58e79c75fb656a7540d0ec892701f88a
-
SSDEEP
24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5q:gh+ZkldoPK8YaKGq
Malware Config
Extracted
revengerat
Marzo26
marzorevenger.duckdns.org:4230
RV_MUTEX-PiGGjjtnxDpn
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AudioHandlers.url 4aed340fcde3602287fb6a9668b7e660N.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1764 set thread context of 3048 1764 4aed340fcde3602287fb6a9668b7e660N.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4aed340fcde3602287fb6a9668b7e660N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3048 RegAsm.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1764 4aed340fcde3602287fb6a9668b7e660N.exe 1764 4aed340fcde3602287fb6a9668b7e660N.exe 1764 4aed340fcde3602287fb6a9668b7e660N.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1764 4aed340fcde3602287fb6a9668b7e660N.exe 1764 4aed340fcde3602287fb6a9668b7e660N.exe 1764 4aed340fcde3602287fb6a9668b7e660N.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1764 wrote to memory of 3048 1764 4aed340fcde3602287fb6a9668b7e660N.exe 86 PID 1764 wrote to memory of 3048 1764 4aed340fcde3602287fb6a9668b7e660N.exe 86 PID 1764 wrote to memory of 3048 1764 4aed340fcde3602287fb6a9668b7e660N.exe 86 PID 1764 wrote to memory of 3048 1764 4aed340fcde3602287fb6a9668b7e660N.exe 86 PID 1764 wrote to memory of 3048 1764 4aed340fcde3602287fb6a9668b7e660N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\4aed340fcde3602287fb6a9668b7e660N.exe"C:\Users\Admin\AppData\Local\Temp\4aed340fcde3602287fb6a9668b7e660N.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3048
-