Analysis
-
max time kernel
102s -
max time network
112s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-09-2024 05:41
Static task
static1
Behavioral task
behavioral1
Sample
VirTool.Win32.AutInject.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
VirTool.Win32.AutInject.exe
Resource
win10v2004-20240802-en
General
-
Target
VirTool.Win32.AutInject.exe
-
Size
904KB
-
MD5
fefdeeeed62fa2b8f9719f8b3e523210
-
SHA1
5aac925ebda82d7ae03de0949fa21a188ab80d9a
-
SHA256
4506ceabf255c3969c0d9c24cf97c01a5144ed5434d0321443b8a67df5157a10
-
SHA512
82168f0eac62a5caf8537c30f604bb33b3aee3ccc66658eb5449edcf05bc3b713c20c6ce1d67288e4ecbde1c85cb78811fd7e3939a9b7962739c3b26508b4ffa
-
SSDEEP
24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5G:gh+ZkldoPK8YaKGG
Malware Config
Extracted
revengerat
Marzo26
marzorevenger.duckdns.org:4230
RV_MUTEX-PiGGjjtnxDpn
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AudioHandlers.url VirTool.Win32.AutInject.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1724 set thread context of 2160 1724 VirTool.Win32.AutInject.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VirTool.Win32.AutInject.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2160 RegAsm.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1724 VirTool.Win32.AutInject.exe 1724 VirTool.Win32.AutInject.exe 1724 VirTool.Win32.AutInject.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1724 VirTool.Win32.AutInject.exe 1724 VirTool.Win32.AutInject.exe 1724 VirTool.Win32.AutInject.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2160 1724 VirTool.Win32.AutInject.exe 30 PID 1724 wrote to memory of 2160 1724 VirTool.Win32.AutInject.exe 30 PID 1724 wrote to memory of 2160 1724 VirTool.Win32.AutInject.exe 30 PID 1724 wrote to memory of 2160 1724 VirTool.Win32.AutInject.exe 30 PID 1724 wrote to memory of 2160 1724 VirTool.Win32.AutInject.exe 30 PID 1724 wrote to memory of 2160 1724 VirTool.Win32.AutInject.exe 30 PID 1724 wrote to memory of 2160 1724 VirTool.Win32.AutInject.exe 30 PID 1724 wrote to memory of 2160 1724 VirTool.Win32.AutInject.exe 30 PID 1724 wrote to memory of 2160 1724 VirTool.Win32.AutInject.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirTool.Win32.AutInject.exe"C:\Users\Admin\AppData\Local\Temp\VirTool.Win32.AutInject.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2160
-