Analysis

  • max time kernel
    103s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2024 01:31

General

  • Target

    09605dc7fa490c072cac25d2d269ab07c58e099870657c9fbefcb7d3b8cb233dN.exe

  • Size

    1.4MB

  • MD5

    6eef1dc5a1688c72aa00481401d307b0

  • SHA1

    3cd9b23fcbc55090698b358ed730f7ce15f58db9

  • SHA256

    09605dc7fa490c072cac25d2d269ab07c58e099870657c9fbefcb7d3b8cb233d

  • SHA512

    89aabe324f60bd659478d710873587c2678bdd3b9d77f572ad8a3d019d03a45bf9bec5ab3dab1563e7b0f5da50a2c19c8fc83b166594671c5bb9ad4fc85791ce

  • SSDEEP

    24576:Wq5TfcdHj4fmbqOw2qBS0smVkVMyvLlnhWEzKJ9TtLvgl/piakl3Jro0zQJ9TtDs:WUTsamVwxolC53akl325A

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Revengerat family
  • RevengeRat Executable 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09605dc7fa490c072cac25d2d269ab07c58e099870657c9fbefcb7d3b8cb233dN.exe
    "C:\Users\Admin\AppData\Local\Temp\09605dc7fa490c072cac25d2d269ab07c58e099870657c9fbefcb7d3b8cb233dN.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4132
    • C:\Users\Admin\AppData\Local\Temp\DMR\dmr_72.exe
      "C:\Users\Admin\AppData\Local\Temp\DMR\dmr_72.exe" -install -54427628 -chipderedesign -a9254044700e472bb720a88324b810ec - -BLUB2 -frxzeavncumpmasz -4132
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\DMR\dmr_72.exe

    Filesize

    504KB

    MD5

    25bbe781403dbd685377647a982df817

    SHA1

    5b5ea2f5cec496f99d245a68c884c09f5849e037

    SHA256

    ca718f45191351cdda8ed5ca2c8074c899d32837dd019d325c72e4123b5edbfc

    SHA512

    595644e2542194371d2f3acb27932717464aa9b6e661bc71e5058b8189a433cd1938b49a9c3f241c3a6a675e93cfed97b336a125e2437358a37b0fb6f9714aa2

  • C:\Users\Admin\AppData\Local\Temp\DMR\frxzeavncumpmasz.dat

    Filesize

    163B

    MD5

    5ebfb0f0a54c8e5131f5ea941f4a958e

    SHA1

    cb891032a42c724fd141d5e16600b59c356e305d

    SHA256

    d5948348d9bf21f8231a0a9a7fb27935bfd76019f952e333515e799f57e54eb6

    SHA512

    a5b8010cf022e66d4a4e9316ebec768653308b037287d634a07eb251ab4189b589b10632f91f3ebb9e3afc466c7b97fcaa3226fdda535abf68a35e79b0f64cc7

  • memory/1884-13-0x00007FF929DA3000-0x00007FF929DA5000-memory.dmp

    Filesize

    8KB

  • memory/1884-14-0x0000000000270000-0x00000000002F2000-memory.dmp

    Filesize

    520KB

  • memory/1884-16-0x00007FF929DA0000-0x00007FF92A861000-memory.dmp

    Filesize

    10.8MB

  • memory/1884-17-0x00007FF929DA0000-0x00007FF92A861000-memory.dmp

    Filesize

    10.8MB

  • memory/1884-18-0x00007FF929DA0000-0x00007FF92A861000-memory.dmp

    Filesize

    10.8MB

  • memory/1884-19-0x00007FF929DA0000-0x00007FF92A861000-memory.dmp

    Filesize

    10.8MB

  • memory/1884-22-0x000000001B090000-0x000000001B239000-memory.dmp

    Filesize

    1.7MB

  • memory/1884-23-0x00007FF929DA0000-0x00007FF92A861000-memory.dmp

    Filesize

    10.8MB

  • memory/4132-0-0x0000000000280000-0x0000000000579000-memory.dmp

    Filesize

    3.0MB

  • memory/4132-20-0x0000000000280000-0x0000000000579000-memory.dmp

    Filesize

    3.0MB