Analysis
-
max time kernel
119s -
max time network
108s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 07:09
Static task
static1
Behavioral task
behavioral1
Sample
f7f9ad0cac3e5c0a1529685e47389cb0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f7f9ad0cac3e5c0a1529685e47389cb0N.exe
Resource
win10v2004-20240802-en
General
-
Target
f7f9ad0cac3e5c0a1529685e47389cb0N.exe
-
Size
904KB
-
MD5
f7f9ad0cac3e5c0a1529685e47389cb0
-
SHA1
0e2b1eaa3aee39d74fd5f660cd3ae84d4f830f40
-
SHA256
1227e3eb6cf4e3c4d20ad801ecc077ff83f9a850640ef4f52349d3398b5147ee
-
SHA512
fef958720075b3d7e1c93399d436dd3ec84137b3712e9a9c48ee1a2fe692aa6a9b593c4fb724c8f196266013393844712c330cd2aeb6f82cdb0314e98b8a6c8a
-
SSDEEP
24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5M:gh+ZkldoPK8YaKGM
Malware Config
Extracted
revengerat
Marzo26
marzorevenger.duckdns.org:4230
RV_MUTEX-PiGGjjtnxDpn
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AudioHandlers.url f7f9ad0cac3e5c0a1529685e47389cb0N.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1700 set thread context of 1960 1700 f7f9ad0cac3e5c0a1529685e47389cb0N.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7f9ad0cac3e5c0a1529685e47389cb0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1960 RegAsm.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1700 f7f9ad0cac3e5c0a1529685e47389cb0N.exe 1700 f7f9ad0cac3e5c0a1529685e47389cb0N.exe 1700 f7f9ad0cac3e5c0a1529685e47389cb0N.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1700 f7f9ad0cac3e5c0a1529685e47389cb0N.exe 1700 f7f9ad0cac3e5c0a1529685e47389cb0N.exe 1700 f7f9ad0cac3e5c0a1529685e47389cb0N.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1700 wrote to memory of 1960 1700 f7f9ad0cac3e5c0a1529685e47389cb0N.exe 30 PID 1700 wrote to memory of 1960 1700 f7f9ad0cac3e5c0a1529685e47389cb0N.exe 30 PID 1700 wrote to memory of 1960 1700 f7f9ad0cac3e5c0a1529685e47389cb0N.exe 30 PID 1700 wrote to memory of 1960 1700 f7f9ad0cac3e5c0a1529685e47389cb0N.exe 30 PID 1700 wrote to memory of 1960 1700 f7f9ad0cac3e5c0a1529685e47389cb0N.exe 30 PID 1700 wrote to memory of 1960 1700 f7f9ad0cac3e5c0a1529685e47389cb0N.exe 30 PID 1700 wrote to memory of 1960 1700 f7f9ad0cac3e5c0a1529685e47389cb0N.exe 30 PID 1700 wrote to memory of 1960 1700 f7f9ad0cac3e5c0a1529685e47389cb0N.exe 30 PID 1700 wrote to memory of 1960 1700 f7f9ad0cac3e5c0a1529685e47389cb0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7f9ad0cac3e5c0a1529685e47389cb0N.exe"C:\Users\Admin\AppData\Local\Temp\f7f9ad0cac3e5c0a1529685e47389cb0N.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1960
-