Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 18:52
Behavioral task
behavioral1
Sample
67975b21c4377c829cb0ff7788e82fbc44f56beef971c588cbf1e75f44eca806.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
67975b21c4377c829cb0ff7788e82fbc44f56beef971c588cbf1e75f44eca806.exe
Resource
win10v2004-20240802-en
General
-
Target
67975b21c4377c829cb0ff7788e82fbc44f56beef971c588cbf1e75f44eca806.exe
-
Size
17KB
-
MD5
dad6ae572c374b1398e8724d7932a053
-
SHA1
f4754995c504ec70262969c8037748f32abb6939
-
SHA256
67975b21c4377c829cb0ff7788e82fbc44f56beef971c588cbf1e75f44eca806
-
SHA512
6f443c28d103046244ddac88ba5757606d483cd3630292d36a79182d4b0791a96802f121df2ea6411ba654c1178685a769f7b1c3dd128f3e7deb240a27bb0666
-
SSDEEP
384:opQVi+nOWfyvvRPJnM2flcZ0mbaajbAsV/wyOIO2stn4:opQViwOWfils0mbi1D2Y4
Malware Config
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
RevengeRat Executable 1 IoCs
resource yara_rule behavioral2/files/0x000300000001e6fc-12.dat revengerat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation 67975b21c4377c829cb0ff7788e82fbc44f56beef971c588cbf1e75f44eca806.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe 67975b21c4377c829cb0ff7788e82fbc44f56beef971c588cbf1e75f44eca806.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe 67975b21c4377c829cb0ff7788e82fbc44f56beef971c588cbf1e75f44eca806.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe Client.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe Client.exe -
Executes dropped EXE 1 IoCs
pid Process 4760 Client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1592 67975b21c4377c829cb0ff7788e82fbc44f56beef971c588cbf1e75f44eca806.exe Token: SeDebugPrivilege 4760 Client.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1592 wrote to memory of 4760 1592 67975b21c4377c829cb0ff7788e82fbc44f56beef971c588cbf1e75f44eca806.exe 99 PID 1592 wrote to memory of 4760 1592 67975b21c4377c829cb0ff7788e82fbc44f56beef971c588cbf1e75f44eca806.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\67975b21c4377c829cb0ff7788e82fbc44f56beef971c588cbf1e75f44eca806.exe"C:\Users\Admin\AppData\Local\Temp\67975b21c4377c829cb0ff7788e82fbc44f56beef971c588cbf1e75f44eca806.exe"1⤵
- Checks computer location settings
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD5dad6ae572c374b1398e8724d7932a053
SHA1f4754995c504ec70262969c8037748f32abb6939
SHA25667975b21c4377c829cb0ff7788e82fbc44f56beef971c588cbf1e75f44eca806
SHA5126f443c28d103046244ddac88ba5757606d483cd3630292d36a79182d4b0791a96802f121df2ea6411ba654c1178685a769f7b1c3dd128f3e7deb240a27bb0666