Analysis
-
max time kernel
24s -
max time network
18s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 19:24
Behavioral task
behavioral1
Sample
cool.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cool.exe
Resource
win10v2004-20240802-en
General
-
Target
cool.exe
-
Size
23KB
-
MD5
4b61aedaee4e3be743dbebea96f91441
-
SHA1
448faae75b84b7dd9d66f1386f178935523a429c
-
SHA256
d650607092d56dd7df0b19c17e0ee5fb331af3aa03cd961e70e0a34310504a62
-
SHA512
1015e7d9476a8089d4ac5dcc0f2dc97154cbe7f05ae8990548fb23b4577cf863e11a6545df04dcca4995c7e74a6f916d55e442c8678885c1c742686688b65deb
-
SSDEEP
384:mb+cnNzGglTgMnmrBcNFEhmisbYpGy4AVFCzYcHe+Z:mbtucjs+AV8zYcHe+Z
Malware Config
Extracted
revengerat
Guest
127.0.0.1:1604
RV_MUTEX
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2592 set thread context of 4796 2592 cool.exe 83 PID 4796 set thread context of 1048 4796 aspnet_compiler.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_compiler.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_compiler.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2592 cool.exe Token: SeDebugPrivilege 4796 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2592 wrote to memory of 4796 2592 cool.exe 83 PID 2592 wrote to memory of 4796 2592 cool.exe 83 PID 2592 wrote to memory of 4796 2592 cool.exe 83 PID 2592 wrote to memory of 4796 2592 cool.exe 83 PID 2592 wrote to memory of 4796 2592 cool.exe 83 PID 2592 wrote to memory of 4796 2592 cool.exe 83 PID 2592 wrote to memory of 4796 2592 cool.exe 83 PID 2592 wrote to memory of 4796 2592 cool.exe 83 PID 4796 wrote to memory of 1048 4796 aspnet_compiler.exe 86 PID 4796 wrote to memory of 1048 4796 aspnet_compiler.exe 86 PID 4796 wrote to memory of 1048 4796 aspnet_compiler.exe 86 PID 4796 wrote to memory of 1048 4796 aspnet_compiler.exe 86 PID 4796 wrote to memory of 1048 4796 aspnet_compiler.exe 86 PID 4796 wrote to memory of 1048 4796 aspnet_compiler.exe 86 PID 4796 wrote to memory of 1048 4796 aspnet_compiler.exe 86 PID 4796 wrote to memory of 1048 4796 aspnet_compiler.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\cool.exe"C:\Users\Admin\AppData\Local\Temp\cool.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1048
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42B
MD5d582743cdd9f41b37737d661571fa94d
SHA1d3300c99d17618ad074c157f1383f0a30c007378
SHA256b12686d3a6a8a51c526b9e9435c584b4401e3fd4d1c226c7e75ddc1fe351b544
SHA51245b0c9730b5d6281fcce390e1b5ac2b09633d7ce5f92694748b4997c3677ae043656bfd156ea655226b307cc1b705eee1305b88211e02e9f3ba0421647c2821e