Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 18:52
Behavioral task
behavioral1
Sample
67975b21c4377c829cb0ff7788e82fbc44f56beef971c588cbf1e75f44eca806.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
67975b21c4377c829cb0ff7788e82fbc44f56beef971c588cbf1e75f44eca806.exe
Resource
win10v2004-20240802-en
General
-
Target
67975b21c4377c829cb0ff7788e82fbc44f56beef971c588cbf1e75f44eca806.exe
-
Size
17KB
-
MD5
dad6ae572c374b1398e8724d7932a053
-
SHA1
f4754995c504ec70262969c8037748f32abb6939
-
SHA256
67975b21c4377c829cb0ff7788e82fbc44f56beef971c588cbf1e75f44eca806
-
SHA512
6f443c28d103046244ddac88ba5757606d483cd3630292d36a79182d4b0791a96802f121df2ea6411ba654c1178685a769f7b1c3dd128f3e7deb240a27bb0666
-
SSDEEP
384:opQVi+nOWfyvvRPJnM2flcZ0mbaajbAsV/wyOIO2stn4:opQViwOWfils0mbi1D2Y4
Malware Config
Extracted
revengerat
Guest
127.0.0.1:333
RV_MUTEX
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
RevengeRat Executable 1 IoCs
resource yara_rule behavioral1/files/0x0004000000004ed7-11.dat revengerat -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe Client.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe 67975b21c4377c829cb0ff7788e82fbc44f56beef971c588cbf1e75f44eca806.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe 67975b21c4377c829cb0ff7788e82fbc44f56beef971c588cbf1e75f44eca806.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe Client.exe -
Executes dropped EXE 1 IoCs
pid Process 2888 Client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1700 67975b21c4377c829cb0ff7788e82fbc44f56beef971c588cbf1e75f44eca806.exe Token: SeDebugPrivilege 2888 Client.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2888 1700 67975b21c4377c829cb0ff7788e82fbc44f56beef971c588cbf1e75f44eca806.exe 31 PID 1700 wrote to memory of 2888 1700 67975b21c4377c829cb0ff7788e82fbc44f56beef971c588cbf1e75f44eca806.exe 31 PID 1700 wrote to memory of 2888 1700 67975b21c4377c829cb0ff7788e82fbc44f56beef971c588cbf1e75f44eca806.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\67975b21c4377c829cb0ff7788e82fbc44f56beef971c588cbf1e75f44eca806.exe"C:\Users\Admin\AppData\Local\Temp\67975b21c4377c829cb0ff7788e82fbc44f56beef971c588cbf1e75f44eca806.exe"1⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD5dad6ae572c374b1398e8724d7932a053
SHA1f4754995c504ec70262969c8037748f32abb6939
SHA25667975b21c4377c829cb0ff7788e82fbc44f56beef971c588cbf1e75f44eca806
SHA5126f443c28d103046244ddac88ba5757606d483cd3630292d36a79182d4b0791a96802f121df2ea6411ba654c1178685a769f7b1c3dd128f3e7deb240a27bb0666