Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 06:43
Behavioral task
behavioral1
Sample
c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed.exe
Resource
win10v2004-20241007-en
General
-
Target
c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed.exe
-
Size
60KB
-
MD5
0a5e0c27c9d2048cd79b908fb3e50457
-
SHA1
8ab00cc61c021eabbb30ea885f123ad662eedc75
-
SHA256
c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed
-
SHA512
f589040fb2d6143aec610c635424a0ed6f744dfd8a52d980bee45d22446d2cfc5a99d200287640e25e6557c8ef11d9b22eb9207bd93f8dead87efbc1b57b4f81
-
SSDEEP
1536:6FIKcG3XCvYtGq2gkXp1z7r5bjzjFnpVjyl+u:6FIE3Cyh2th7NL1jq+u
Malware Config
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Revengerat family
-
RevengeRat Executable 1 IoCs
resource yara_rule behavioral1/files/0x00360000000160e7-51.dat revengerat -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3044 set thread context of 2764 3044 c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed.exe 30 PID 2764 set thread context of 2740 2764 CasPol.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CasPol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CasPol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2332 AcroRd32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3044 c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed.exe Token: SeDebugPrivilege 2764 CasPol.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2332 AcroRd32.exe 2332 AcroRd32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2764 3044 c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed.exe 30 PID 3044 wrote to memory of 2764 3044 c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed.exe 30 PID 3044 wrote to memory of 2764 3044 c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed.exe 30 PID 3044 wrote to memory of 2764 3044 c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed.exe 30 PID 3044 wrote to memory of 2764 3044 c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed.exe 30 PID 3044 wrote to memory of 2764 3044 c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed.exe 30 PID 3044 wrote to memory of 2764 3044 c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed.exe 30 PID 3044 wrote to memory of 2764 3044 c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed.exe 30 PID 3044 wrote to memory of 2764 3044 c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed.exe 30 PID 3044 wrote to memory of 2764 3044 c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed.exe 30 PID 2764 wrote to memory of 2740 2764 CasPol.exe 31 PID 2764 wrote to memory of 2740 2764 CasPol.exe 31 PID 2764 wrote to memory of 2740 2764 CasPol.exe 31 PID 2764 wrote to memory of 2740 2764 CasPol.exe 31 PID 2764 wrote to memory of 2740 2764 CasPol.exe 31 PID 2764 wrote to memory of 2740 2764 CasPol.exe 31 PID 2764 wrote to memory of 2740 2764 CasPol.exe 31 PID 2764 wrote to memory of 2740 2764 CasPol.exe 31 PID 2764 wrote to memory of 2740 2764 CasPol.exe 31 PID 2764 wrote to memory of 2512 2764 CasPol.exe 33 PID 2764 wrote to memory of 2512 2764 CasPol.exe 33 PID 2764 wrote to memory of 2512 2764 CasPol.exe 33 PID 2764 wrote to memory of 2512 2764 CasPol.exe 33 PID 2764 wrote to memory of 2512 2764 CasPol.exe 33 PID 2764 wrote to memory of 2512 2764 CasPol.exe 33 PID 2764 wrote to memory of 2512 2764 CasPol.exe 33 PID 2512 wrote to memory of 2332 2512 rundll32.exe 34 PID 2512 wrote to memory of 2332 2512 rundll32.exe 34 PID 2512 wrote to memory of 2332 2512 rundll32.exe 34 PID 2512 wrote to memory of 2332 2512 rundll32.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed.exe"C:\Users\Admin\AppData\Local\Temp\c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2740
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Roaming\Casspol3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Roaming\Casspol"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2332
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102B
MD555c1421bc5b62a78f39f819a3fb4dda5
SHA193c66da2a9e418931e038fc574a75fee95235133
SHA2560464ee8094d17b5b5548d3bb69da24e27786ec0e5cb162daf984523bb0f172cf
SHA512a80302928ae66e75213169b7bd485e501f5814acbefd84e9074f3f282ace4b722c9347a4d8de647af7f83fc4eed580018a96cb684072bc1ec33bd92700750614
-
Filesize
3KB
MD5f12285150268e499be1b85f191f1991f
SHA1f749a3f67e0124b1b9a1bf2992c603617807bc60
SHA25615c3df735c60463c06db92ae7d68d0e1586875237d8e6da3ca1fe0bdc51db1ba
SHA512740f7ab73793c61a531c8913c278de9f839f7c4c37a47332b7e2c2e140956618478d332de4bbe3b43da1655f9cf30113ff57ce4675d00ed3a88f98f584088b4c
-
Filesize
60KB
MD50a5e0c27c9d2048cd79b908fb3e50457
SHA18ab00cc61c021eabbb30ea885f123ad662eedc75
SHA256c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed
SHA512f589040fb2d6143aec610c635424a0ed6f744dfd8a52d980bee45d22446d2cfc5a99d200287640e25e6557c8ef11d9b22eb9207bd93f8dead87efbc1b57b4f81