Analysis
-
max time kernel
99s -
max time network
112s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 18:37
Static task
static1
Behavioral task
behavioral1
Sample
deb566538c2ed7fe275fee3405026dc0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
deb566538c2ed7fe275fee3405026dc0N.exe
Resource
win10v2004-20240802-en
General
-
Target
deb566538c2ed7fe275fee3405026dc0N.exe
-
Size
903KB
-
MD5
deb566538c2ed7fe275fee3405026dc0
-
SHA1
a65d4af6781250f8869ded27f65dec02bb4cc70c
-
SHA256
500c3af4e3ec5b1848c5ee00f7e8c83ab8c2dffaba1f0d871f4ddd9c5206ff0e
-
SHA512
cf439568c197c58faa5f6a98e122005e9217052194eeca4f5bc475c0325013628b51e33490d22bdfb36da69ad5e30d3d709a64e4b4d885a0dc1282200e17dae9
-
SSDEEP
24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa55:gh+ZkldoPK8YaKG5
Malware Config
Extracted
revengerat
Marzo26
marzorevenger.duckdns.org:4230
RV_MUTEX-PiGGjjtnxDpn
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Drops startup file 1 IoCs
Processes:
deb566538c2ed7fe275fee3405026dc0N.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AudioHandlers.url deb566538c2ed7fe275fee3405026dc0N.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
deb566538c2ed7fe275fee3405026dc0N.exedescription pid Process procid_target PID 3068 set thread context of 2368 3068 deb566538c2ed7fe275fee3405026dc0N.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
deb566538c2ed7fe275fee3405026dc0N.exeRegAsm.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language deb566538c2ed7fe275fee3405026dc0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegAsm.exedescription pid Process Token: SeDebugPrivilege 2368 RegAsm.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
deb566538c2ed7fe275fee3405026dc0N.exepid Process 3068 deb566538c2ed7fe275fee3405026dc0N.exe 3068 deb566538c2ed7fe275fee3405026dc0N.exe 3068 deb566538c2ed7fe275fee3405026dc0N.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
deb566538c2ed7fe275fee3405026dc0N.exepid Process 3068 deb566538c2ed7fe275fee3405026dc0N.exe 3068 deb566538c2ed7fe275fee3405026dc0N.exe 3068 deb566538c2ed7fe275fee3405026dc0N.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
deb566538c2ed7fe275fee3405026dc0N.exedescription pid Process procid_target PID 3068 wrote to memory of 2368 3068 deb566538c2ed7fe275fee3405026dc0N.exe 30 PID 3068 wrote to memory of 2368 3068 deb566538c2ed7fe275fee3405026dc0N.exe 30 PID 3068 wrote to memory of 2368 3068 deb566538c2ed7fe275fee3405026dc0N.exe 30 PID 3068 wrote to memory of 2368 3068 deb566538c2ed7fe275fee3405026dc0N.exe 30 PID 3068 wrote to memory of 2368 3068 deb566538c2ed7fe275fee3405026dc0N.exe 30 PID 3068 wrote to memory of 2368 3068 deb566538c2ed7fe275fee3405026dc0N.exe 30 PID 3068 wrote to memory of 2368 3068 deb566538c2ed7fe275fee3405026dc0N.exe 30 PID 3068 wrote to memory of 2368 3068 deb566538c2ed7fe275fee3405026dc0N.exe 30 PID 3068 wrote to memory of 2368 3068 deb566538c2ed7fe275fee3405026dc0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\deb566538c2ed7fe275fee3405026dc0N.exe"C:\Users\Admin\AppData\Local\Temp\deb566538c2ed7fe275fee3405026dc0N.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2368
-