Analysis
-
max time kernel
98s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 21:38
Static task
static1
Behavioral task
behavioral1
Sample
fd0801cf40f6817b8a6f4efe20390870N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fd0801cf40f6817b8a6f4efe20390870N.exe
Resource
win10v2004-20240802-en
General
-
Target
fd0801cf40f6817b8a6f4efe20390870N.exe
-
Size
903KB
-
MD5
fd0801cf40f6817b8a6f4efe20390870
-
SHA1
7993b09eea305ce92cbadbae0bdd469490b92a83
-
SHA256
bdeb753dbcdaf180d52ebe47c76f488d26ccfd4e1f3fcd79e9ee47c722af83b5
-
SHA512
36dad43e1ffdfe8d9f236728c811205bcc0363cceb076e57b09c9794a3ce2e1ef22a71361524df55bc123cea177a9f89f2dcd1dd0d6478948ffe46bea789271c
-
SSDEEP
24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5a:gh+ZkldoPK8YaKGa
Malware Config
Extracted
revengerat
Marzo26
marzorevenger.duckdns.org:4230
RV_MUTEX-PiGGjjtnxDpn
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Drops startup file 1 IoCs
Processes:
fd0801cf40f6817b8a6f4efe20390870N.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AudioHandlers.url fd0801cf40f6817b8a6f4efe20390870N.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
fd0801cf40f6817b8a6f4efe20390870N.exedescription pid Process procid_target PID 1436 set thread context of 3328 1436 fd0801cf40f6817b8a6f4efe20390870N.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
fd0801cf40f6817b8a6f4efe20390870N.exeRegAsm.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd0801cf40f6817b8a6f4efe20390870N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegAsm.exedescription pid Process Token: SeDebugPrivilege 3328 RegAsm.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
fd0801cf40f6817b8a6f4efe20390870N.exepid Process 1436 fd0801cf40f6817b8a6f4efe20390870N.exe 1436 fd0801cf40f6817b8a6f4efe20390870N.exe 1436 fd0801cf40f6817b8a6f4efe20390870N.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
fd0801cf40f6817b8a6f4efe20390870N.exepid Process 1436 fd0801cf40f6817b8a6f4efe20390870N.exe 1436 fd0801cf40f6817b8a6f4efe20390870N.exe 1436 fd0801cf40f6817b8a6f4efe20390870N.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
fd0801cf40f6817b8a6f4efe20390870N.exedescription pid Process procid_target PID 1436 wrote to memory of 3328 1436 fd0801cf40f6817b8a6f4efe20390870N.exe 85 PID 1436 wrote to memory of 3328 1436 fd0801cf40f6817b8a6f4efe20390870N.exe 85 PID 1436 wrote to memory of 3328 1436 fd0801cf40f6817b8a6f4efe20390870N.exe 85 PID 1436 wrote to memory of 3328 1436 fd0801cf40f6817b8a6f4efe20390870N.exe 85 PID 1436 wrote to memory of 3328 1436 fd0801cf40f6817b8a6f4efe20390870N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd0801cf40f6817b8a6f4efe20390870N.exe"C:\Users\Admin\AppData\Local\Temp\fd0801cf40f6817b8a6f4efe20390870N.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3328
-