Analysis

  • max time kernel
    62s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27-09-2024 14:03

General

  • Target

    3a6e2de5b3de6e67229b11f6d74a4f9af70ccec85c2573a905df5a1f84a35446.exe

  • Size

    1.4MB

  • MD5

    5673c04d81969a6603184069b6846213

  • SHA1

    49fdd9c69f1c281d94486029dfaa5108dfc168bf

  • SHA256

    3a6e2de5b3de6e67229b11f6d74a4f9af70ccec85c2573a905df5a1f84a35446

  • SHA512

    c381630f7c9c72ca538679bef37b9e966ec2f906bd5eb36a42069e3742ddd57bd958d867ede257edc3244e40fa3a6c65c10cddd07dddfd89cc2085eef13291cb

  • SSDEEP

    24576:rq5TfcdHj4fmb9Ve9u2qTPIMeYyBMLlQjzCEzKJ9TtLzCwn1jAh0zQJ9TtDRli:rUTsamC9uxKjY5x1jAF5i

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • RevengeRat Executable 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 41 IoCs
  • Suspicious use of FindShellTrayWindow 37 IoCs
  • Suspicious use of SendNotifyMessage 35 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a6e2de5b3de6e67229b11f6d74a4f9af70ccec85c2573a905df5a1f84a35446.exe
    "C:\Users\Admin\AppData\Local\Temp\3a6e2de5b3de6e67229b11f6d74a4f9af70ccec85c2573a905df5a1f84a35446.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Users\Admin\AppData\Local\Temp\DMR\dmr_72.exe
      "C:\Users\Admin\AppData\Local\Temp\DMR\dmr_72.exe" -install -54417509 -chipderedesign -a80c61fa351a416282afb39d6c109d6c - -BLUB2 -kjgwjosiyowkrljb -2084
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1952
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:2764
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2044
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef4d79758,0x7fef4d79768,0x7fef4d79778
        2⤵
          PID:1960
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1164 --field-trial-handle=1256,i,15602814532056624785,10396013903804156080,131072 /prefetch:2
          2⤵
            PID:2964
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1432 --field-trial-handle=1256,i,15602814532056624785,10396013903804156080,131072 /prefetch:8
            2⤵
              PID:2356
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1628 --field-trial-handle=1256,i,15602814532056624785,10396013903804156080,131072 /prefetch:8
              2⤵
                PID:1764
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2264 --field-trial-handle=1256,i,15602814532056624785,10396013903804156080,131072 /prefetch:1
                2⤵
                  PID:2584
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2280 --field-trial-handle=1256,i,15602814532056624785,10396013903804156080,131072 /prefetch:1
                  2⤵
                    PID:2432
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1164 --field-trial-handle=1256,i,15602814532056624785,10396013903804156080,131072 /prefetch:2
                    2⤵
                      PID:632
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2872 --field-trial-handle=1256,i,15602814532056624785,10396013903804156080,131072 /prefetch:1
                      2⤵
                        PID:2744
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3456 --field-trial-handle=1256,i,15602814532056624785,10396013903804156080,131072 /prefetch:8
                        2⤵
                          PID:1276
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3592 --field-trial-handle=1256,i,15602814532056624785,10396013903804156080,131072 /prefetch:8
                          2⤵
                            PID:2960
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2804 --field-trial-handle=1256,i,15602814532056624785,10396013903804156080,131072 /prefetch:8
                            2⤵
                              PID:1680
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3780 --field-trial-handle=1256,i,15602814532056624785,10396013903804156080,131072 /prefetch:1
                              2⤵
                                PID:2328
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3904 --field-trial-handle=1256,i,15602814532056624785,10396013903804156080,131072 /prefetch:1
                                2⤵
                                  PID:1404
                              • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                1⤵
                                  PID:1912
                                • C:\Windows\system32\cmd.exe
                                  "C:\Windows\system32\cmd.exe"
                                  1⤵
                                    PID:1188

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                    Filesize

                                    527B

                                    MD5

                                    7c83f97e4c3d4ae1a4c53d684523a5ed

                                    SHA1

                                    ac6484d8aa791bc1b94dc0f1ce3aaf5a1d1a0225

                                    SHA256

                                    e752c97df6594536ef419689ff7b40418572ab34dc00ad32c84f50f83277168a

                                    SHA512

                                    883e4c6c8280d41f94b6ab10719bcbf79334f3d3d5d22125d7a9ca2db9f6a3ed5cc64b1ddd894c1a30275651e04fb91470f66f1d8638bf2a577a865ccd378143

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    4KB

                                    MD5

                                    18671586bd01bce9a40e1a64aaf0674d

                                    SHA1

                                    784056583ea4419619fdbf640be6b8d547c8e4cd

                                    SHA256

                                    98c903381ae6ec53a08261192f1189a648a317d67cdd6c28cefe107a7502b944

                                    SHA512

                                    26ff1bfb4c66e48fd0bb59d1805a281e6c7038643eb6e6a2ccfd5818a418b4ace63fa41fe4360fc49c3be1ea848454abd401b0add936fe28086b245f05a00d58

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    1ddbb4b689cf3bc7bb64f55886e91727

                                    SHA1

                                    8dd871abd77c25ee0303a3b228acd1090e1eb382

                                    SHA256

                                    456f567e551b2d38312262af552c6edc1906b24b827d0b7795f1f9541c71e804

                                    SHA512

                                    bc3a8fc4cc03c61245bf05ea5fc8d65f9c9ea70e95e23c6d3685ce851d29fdf2ace0e4bea413dce15e80310b89fc4586b4f97385d96035db96abae0d21eb5cfc

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp

                                    Filesize

                                    16B

                                    MD5

                                    18e723571b00fb1694a3bad6c78e4054

                                    SHA1

                                    afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                    SHA256

                                    8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                    SHA512

                                    43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                    Filesize

                                    342KB

                                    MD5

                                    cb17a62bd398d1d7568480956ab84a4b

                                    SHA1

                                    540700bf49760f086041d41fbf70032ce17e35f9

                                    SHA256

                                    feda30f0004da05af904de3600715adb237a5f59f1bf5bb99824014a3c21867f

                                    SHA512

                                    1fcc2eda4d5f996d8a4cec72c6f6f7b2a5d2919b50558557705f7037ceefe4b72407e7fcfe0820220d8ba7ec684a89941c8895eadc41060fa31b4b37cdf82b0a

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                                    Filesize

                                    264KB

                                    MD5

                                    f50f89a0a91564d0b8a211f8921aa7de

                                    SHA1

                                    112403a17dd69d5b9018b8cede023cb3b54eab7d

                                    SHA256

                                    b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                    SHA512

                                    bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\d0ef4458-7699-4f92-bcaa-9b15e11c02fe.tmp

                                    Filesize

                                    342KB

                                    MD5

                                    298b68fab8281c214edebf0629d7a9d5

                                    SHA1

                                    81994fbd196454e144c5c06f6d32291c39bb2701

                                    SHA256

                                    b67748329e0bfd7c6743e62f97d03023a6648e52c9c1a7b4c19220320f94feb3

                                    SHA512

                                    222336f1caa29cb3885db4d07d8c79c3401ec8ddfb3e147bcd571b3fdf7acc003c10a1a97bc336a6afc8f9608687ded87772b26e65bed4acf2d6af8d9e2209ec

                                  • C:\Users\Admin\AppData\Local\Temp\DMR\kjgwjosiyowkrljb.dat

                                    Filesize

                                    161B

                                    MD5

                                    c800879c1c73dbbb198fc42669646aa7

                                    SHA1

                                    ab63307099961d43ebb2b64809b7f39d030bab7b

                                    SHA256

                                    4c4dd62b579e43dc1c4cf859299df3023409492281f173bc5c3d2cc00bb782d7

                                    SHA512

                                    0bc20e0c61f46a6c8eb0d8c276edc1f1901ac2f2800199d78490ba0b3c096e4cbf08a175ee19f663d7c13d56e7b6852f32478ea6c85f7829f6fd2880023213df

                                  • \Users\Admin\AppData\Local\Temp\DMR\dmr_72.exe

                                    Filesize

                                    508KB

                                    MD5

                                    da9e9a98a7cf8da14f9e3c9973328fb7

                                    SHA1

                                    42e37cbfa37877d247ebd37d9553cb6224d6bee6

                                    SHA256

                                    c1116053bbac19ab273dc120c2984c235d116cdcc9e3ac437951b55465fd7063

                                    SHA512

                                    ce98f1984a3db301df7c1078dc6014fc1a03a1643c5635ef59775ee8019fbae4e07c16e99ec3d1998f45947d57493ada96e5116c359a590b14573833eec17343

                                  • memory/1952-19-0x000007FEF51C0000-0x000007FEF5BAC000-memory.dmp

                                    Filesize

                                    9.9MB

                                  • memory/1952-26-0x000007FEF51C0000-0x000007FEF5BAC000-memory.dmp

                                    Filesize

                                    9.9MB

                                  • memory/1952-27-0x000007FEF51C0000-0x000007FEF5BAC000-memory.dmp

                                    Filesize

                                    9.9MB

                                  • memory/1952-28-0x000007FEF51C0000-0x000007FEF5BAC000-memory.dmp

                                    Filesize

                                    9.9MB

                                  • memory/1952-25-0x000007FEF51C3000-0x000007FEF51C4000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1952-22-0x000007FEF51C0000-0x000007FEF5BAC000-memory.dmp

                                    Filesize

                                    9.9MB

                                  • memory/1952-21-0x000007FEF51C0000-0x000007FEF5BAC000-memory.dmp

                                    Filesize

                                    9.9MB

                                  • memory/1952-20-0x000007FEF51C0000-0x000007FEF5BAC000-memory.dmp

                                    Filesize

                                    9.9MB

                                  • memory/1952-17-0x0000000000F00000-0x0000000000F84000-memory.dmp

                                    Filesize

                                    528KB

                                  • memory/1952-16-0x000007FEF51C3000-0x000007FEF51C4000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/2084-24-0x0000000001230000-0x000000000152D000-memory.dmp

                                    Filesize

                                    3.0MB

                                  • memory/2084-0-0x0000000001230000-0x000000000152D000-memory.dmp

                                    Filesize

                                    3.0MB