Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 22:58
Static task
static1
Behavioral task
behavioral1
Sample
fefdeeeed62fa2b8f9719f8b3e523210N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fefdeeeed62fa2b8f9719f8b3e523210N.exe
Resource
win10v2004-20240802-en
General
-
Target
fefdeeeed62fa2b8f9719f8b3e523210N.exe
-
Size
904KB
-
MD5
fefdeeeed62fa2b8f9719f8b3e523210
-
SHA1
5aac925ebda82d7ae03de0949fa21a188ab80d9a
-
SHA256
4506ceabf255c3969c0d9c24cf97c01a5144ed5434d0321443b8a67df5157a10
-
SHA512
82168f0eac62a5caf8537c30f604bb33b3aee3ccc66658eb5449edcf05bc3b713c20c6ce1d67288e4ecbde1c85cb78811fd7e3939a9b7962739c3b26508b4ffa
-
SSDEEP
24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5G:gh+ZkldoPK8YaKGG
Malware Config
Extracted
revengerat
Marzo26
marzorevenger.duckdns.org:4230
RV_MUTEX-PiGGjjtnxDpn
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AudioHandlers.url fefdeeeed62fa2b8f9719f8b3e523210N.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3404 set thread context of 740 3404 fefdeeeed62fa2b8f9719f8b3e523210N.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fefdeeeed62fa2b8f9719f8b3e523210N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 740 RegAsm.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3404 fefdeeeed62fa2b8f9719f8b3e523210N.exe 3404 fefdeeeed62fa2b8f9719f8b3e523210N.exe 3404 fefdeeeed62fa2b8f9719f8b3e523210N.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3404 fefdeeeed62fa2b8f9719f8b3e523210N.exe 3404 fefdeeeed62fa2b8f9719f8b3e523210N.exe 3404 fefdeeeed62fa2b8f9719f8b3e523210N.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3404 wrote to memory of 740 3404 fefdeeeed62fa2b8f9719f8b3e523210N.exe 83 PID 3404 wrote to memory of 740 3404 fefdeeeed62fa2b8f9719f8b3e523210N.exe 83 PID 3404 wrote to memory of 740 3404 fefdeeeed62fa2b8f9719f8b3e523210N.exe 83 PID 3404 wrote to memory of 740 3404 fefdeeeed62fa2b8f9719f8b3e523210N.exe 83 PID 3404 wrote to memory of 740 3404 fefdeeeed62fa2b8f9719f8b3e523210N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\fefdeeeed62fa2b8f9719f8b3e523210N.exe"C:\Users\Admin\AppData\Local\Temp\fefdeeeed62fa2b8f9719f8b3e523210N.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:740
-