Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 06:43
Behavioral task
behavioral1
Sample
c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed.exe
Resource
win10v2004-20241007-en
General
-
Target
c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed.exe
-
Size
60KB
-
MD5
0a5e0c27c9d2048cd79b908fb3e50457
-
SHA1
8ab00cc61c021eabbb30ea885f123ad662eedc75
-
SHA256
c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed
-
SHA512
f589040fb2d6143aec610c635424a0ed6f744dfd8a52d980bee45d22446d2cfc5a99d200287640e25e6557c8ef11d9b22eb9207bd93f8dead87efbc1b57b4f81
-
SSDEEP
1536:6FIKcG3XCvYtGq2gkXp1z7r5bjzjFnpVjyl+u:6FIE3Cyh2th7NL1jq+u
Malware Config
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Revengerat family
-
RevengeRat Executable 1 IoCs
resource yara_rule behavioral2/files/0x000b000000023bad-26.dat revengerat -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4764 set thread context of 2532 4764 c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed.exe 83 PID 2532 set thread context of 3956 2532 CasPol.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CasPol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CasPol.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings CasPol.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4764 c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed.exe Token: SeDebugPrivilege 2532 CasPol.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2676 OpenWith.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4764 wrote to memory of 2532 4764 c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed.exe 83 PID 4764 wrote to memory of 2532 4764 c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed.exe 83 PID 4764 wrote to memory of 2532 4764 c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed.exe 83 PID 4764 wrote to memory of 2532 4764 c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed.exe 83 PID 4764 wrote to memory of 2532 4764 c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed.exe 83 PID 4764 wrote to memory of 2532 4764 c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed.exe 83 PID 4764 wrote to memory of 2532 4764 c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed.exe 83 PID 4764 wrote to memory of 2532 4764 c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed.exe 83 PID 4764 wrote to memory of 2532 4764 c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed.exe 83 PID 2532 wrote to memory of 3956 2532 CasPol.exe 86 PID 2532 wrote to memory of 3956 2532 CasPol.exe 86 PID 2532 wrote to memory of 3956 2532 CasPol.exe 86 PID 2532 wrote to memory of 3956 2532 CasPol.exe 86 PID 2532 wrote to memory of 3956 2532 CasPol.exe 86 PID 2532 wrote to memory of 3956 2532 CasPol.exe 86 PID 2532 wrote to memory of 3956 2532 CasPol.exe 86 PID 2532 wrote to memory of 3956 2532 CasPol.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed.exe"C:\Users\Admin\AppData\Local\Temp\c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3956
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42B
MD584cfdb4b995b1dbf543b26b86c863adc
SHA1d2f47764908bf30036cf8248b9ff5541e2711fa2
SHA256d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b
SHA512485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce
-
Filesize
102B
MD555c1421bc5b62a78f39f819a3fb4dda5
SHA193c66da2a9e418931e038fc574a75fee95235133
SHA2560464ee8094d17b5b5548d3bb69da24e27786ec0e5cb162daf984523bb0f172cf
SHA512a80302928ae66e75213169b7bd485e501f5814acbefd84e9074f3f282ace4b722c9347a4d8de647af7f83fc4eed580018a96cb684072bc1ec33bd92700750614
-
Filesize
60KB
MD50a5e0c27c9d2048cd79b908fb3e50457
SHA18ab00cc61c021eabbb30ea885f123ad662eedc75
SHA256c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed
SHA512f589040fb2d6143aec610c635424a0ed6f744dfd8a52d980bee45d22446d2cfc5a99d200287640e25e6557c8ef11d9b22eb9207bd93f8dead87efbc1b57b4f81