Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/09/2024, 18:52

General

  • Target

    67975b21c4377c829cb0ff7788e82fbc44f56beef971c588cbf1e75f44eca806.exe

  • Size

    17KB

  • MD5

    dad6ae572c374b1398e8724d7932a053

  • SHA1

    f4754995c504ec70262969c8037748f32abb6939

  • SHA256

    67975b21c4377c829cb0ff7788e82fbc44f56beef971c588cbf1e75f44eca806

  • SHA512

    6f443c28d103046244ddac88ba5757606d483cd3630292d36a79182d4b0791a96802f121df2ea6411ba654c1178685a769f7b1c3dd128f3e7deb240a27bb0666

  • SSDEEP

    384:opQVi+nOWfyvvRPJnM2flcZ0mbaajbAsV/wyOIO2stn4:opQViwOWfils0mbi1D2Y4

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • RevengeRat Executable 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\67975b21c4377c829cb0ff7788e82fbc44f56beef971c588cbf1e75f44eca806.exe
    "C:\Users\Admin\AppData\Local\Temp\67975b21c4377c829cb0ff7788e82fbc44f56beef971c588cbf1e75f44eca806.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1592
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe

    Filesize

    17KB

    MD5

    dad6ae572c374b1398e8724d7932a053

    SHA1

    f4754995c504ec70262969c8037748f32abb6939

    SHA256

    67975b21c4377c829cb0ff7788e82fbc44f56beef971c588cbf1e75f44eca806

    SHA512

    6f443c28d103046244ddac88ba5757606d483cd3630292d36a79182d4b0791a96802f121df2ea6411ba654c1178685a769f7b1c3dd128f3e7deb240a27bb0666

  • memory/1592-6-0x00007FFE04175000-0x00007FFE04176000-memory.dmp

    Filesize

    4KB

  • memory/1592-2-0x000000001B610000-0x000000001BADE000-memory.dmp

    Filesize

    4.8MB

  • memory/1592-3-0x000000001B000000-0x000000001B0A6000-memory.dmp

    Filesize

    664KB

  • memory/1592-4-0x000000001BBA0000-0x000000001BC02000-memory.dmp

    Filesize

    392KB

  • memory/1592-5-0x00007FFE03EC0000-0x00007FFE04861000-memory.dmp

    Filesize

    9.6MB

  • memory/1592-0-0x00007FFE04175000-0x00007FFE04176000-memory.dmp

    Filesize

    4KB

  • memory/1592-7-0x00007FFE03EC0000-0x00007FFE04861000-memory.dmp

    Filesize

    9.6MB

  • memory/1592-1-0x00007FFE03EC0000-0x00007FFE04861000-memory.dmp

    Filesize

    9.6MB

  • memory/1592-18-0x00007FFE03EC0000-0x00007FFE04861000-memory.dmp

    Filesize

    9.6MB

  • memory/4760-17-0x00007FFE03EC0000-0x00007FFE04861000-memory.dmp

    Filesize

    9.6MB

  • memory/4760-19-0x00007FFE03EC0000-0x00007FFE04861000-memory.dmp

    Filesize

    9.6MB

  • memory/4760-20-0x00007FFE03EC0000-0x00007FFE04861000-memory.dmp

    Filesize

    9.6MB

  • memory/4760-21-0x00007FFE03EC0000-0x00007FFE04861000-memory.dmp

    Filesize

    9.6MB