Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    13/09/2024, 18:52

General

  • Target

    67975b21c4377c829cb0ff7788e82fbc44f56beef971c588cbf1e75f44eca806.exe

  • Size

    17KB

  • MD5

    dad6ae572c374b1398e8724d7932a053

  • SHA1

    f4754995c504ec70262969c8037748f32abb6939

  • SHA256

    67975b21c4377c829cb0ff7788e82fbc44f56beef971c588cbf1e75f44eca806

  • SHA512

    6f443c28d103046244ddac88ba5757606d483cd3630292d36a79182d4b0791a96802f121df2ea6411ba654c1178685a769f7b1c3dd128f3e7deb240a27bb0666

  • SSDEEP

    384:opQVi+nOWfyvvRPJnM2flcZ0mbaajbAsV/wyOIO2stn4:opQViwOWfils0mbi1D2Y4

Malware Config

Extracted

Family

revengerat

Botnet

Guest

C2

127.0.0.1:333

Mutex

RV_MUTEX

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • RevengeRat Executable 1 IoCs
  • Drops startup file 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\67975b21c4377c829cb0ff7788e82fbc44f56beef971c588cbf1e75f44eca806.exe
    "C:\Users\Admin\AppData\Local\Temp\67975b21c4377c829cb0ff7788e82fbc44f56beef971c588cbf1e75f44eca806.exe"
    1⤵
    • Drops startup file
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1700
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2888

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe

    Filesize

    17KB

    MD5

    dad6ae572c374b1398e8724d7932a053

    SHA1

    f4754995c504ec70262969c8037748f32abb6939

    SHA256

    67975b21c4377c829cb0ff7788e82fbc44f56beef971c588cbf1e75f44eca806

    SHA512

    6f443c28d103046244ddac88ba5757606d483cd3630292d36a79182d4b0791a96802f121df2ea6411ba654c1178685a769f7b1c3dd128f3e7deb240a27bb0666

  • memory/1700-0-0x000007FEF54EE000-0x000007FEF54EF000-memory.dmp

    Filesize

    4KB

  • memory/1700-1-0x000007FEF5230000-0x000007FEF5BCD000-memory.dmp

    Filesize

    9.6MB

  • memory/1700-2-0x000007FEF5230000-0x000007FEF5BCD000-memory.dmp

    Filesize

    9.6MB

  • memory/1700-3-0x000007FEF54EE000-0x000007FEF54EF000-memory.dmp

    Filesize

    4KB

  • memory/1700-4-0x000007FEF5230000-0x000007FEF5BCD000-memory.dmp

    Filesize

    9.6MB

  • memory/1700-13-0x000007FEF5230000-0x000007FEF5BCD000-memory.dmp

    Filesize

    9.6MB

  • memory/2888-12-0x000007FEF5230000-0x000007FEF5BCD000-memory.dmp

    Filesize

    9.6MB

  • memory/2888-14-0x000007FEF5230000-0x000007FEF5BCD000-memory.dmp

    Filesize

    9.6MB

  • memory/2888-15-0x000007FEF5230000-0x000007FEF5BCD000-memory.dmp

    Filesize

    9.6MB