Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2024 06:43

General

  • Target

    c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed.exe

  • Size

    60KB

  • MD5

    0a5e0c27c9d2048cd79b908fb3e50457

  • SHA1

    8ab00cc61c021eabbb30ea885f123ad662eedc75

  • SHA256

    c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed

  • SHA512

    f589040fb2d6143aec610c635424a0ed6f744dfd8a52d980bee45d22446d2cfc5a99d200287640e25e6557c8ef11d9b22eb9207bd93f8dead87efbc1b57b4f81

  • SSDEEP

    1536:6FIKcG3XCvYtGq2gkXp1z7r5bjzjFnpVjyl+u:6FIE3Cyh2th7NL1jq+u

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Revengerat family
  • RevengeRat Executable 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed.exe
    "C:\Users\Admin\AppData\Local\Temp\c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4764
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2532
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3956
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\CasPol.exe.log

    Filesize

    42B

    MD5

    84cfdb4b995b1dbf543b26b86c863adc

    SHA1

    d2f47764908bf30036cf8248b9ff5541e2711fa2

    SHA256

    d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b

    SHA512

    485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce

  • C:\Users\Admin\AppData\Local\Temp\hwiejYAoBL.txt

    Filesize

    102B

    MD5

    55c1421bc5b62a78f39f819a3fb4dda5

    SHA1

    93c66da2a9e418931e038fc574a75fee95235133

    SHA256

    0464ee8094d17b5b5548d3bb69da24e27786ec0e5cb162daf984523bb0f172cf

    SHA512

    a80302928ae66e75213169b7bd485e501f5814acbefd84e9074f3f282ace4b722c9347a4d8de647af7f83fc4eed580018a96cb684072bc1ec33bd92700750614

  • C:\Users\Admin\AppData\Roaming\Casspol

    Filesize

    60KB

    MD5

    0a5e0c27c9d2048cd79b908fb3e50457

    SHA1

    8ab00cc61c021eabbb30ea885f123ad662eedc75

    SHA256

    c62d7667ff8aaec6cc8795a086e904a16a11167657c62a78f51593ee67e524ed

    SHA512

    f589040fb2d6143aec610c635424a0ed6f744dfd8a52d980bee45d22446d2cfc5a99d200287640e25e6557c8ef11d9b22eb9207bd93f8dead87efbc1b57b4f81

  • memory/2532-19-0x0000000073350000-0x0000000073B00000-memory.dmp

    Filesize

    7.7MB

  • memory/2532-20-0x000000007335E000-0x000000007335F000-memory.dmp

    Filesize

    4KB

  • memory/2532-29-0x0000000073350000-0x0000000073B00000-memory.dmp

    Filesize

    7.7MB

  • memory/2532-8-0x000000007335E000-0x000000007335F000-memory.dmp

    Filesize

    4KB

  • memory/2532-9-0x00000000052F0000-0x000000000538C000-memory.dmp

    Filesize

    624KB

  • memory/2532-10-0x0000000005940000-0x0000000005EE4000-memory.dmp

    Filesize

    5.6MB

  • memory/2532-11-0x0000000005390000-0x00000000053F6000-memory.dmp

    Filesize

    408KB

  • memory/2532-4-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2532-21-0x0000000073350000-0x0000000073B00000-memory.dmp

    Filesize

    7.7MB

  • memory/2532-6-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2532-16-0x0000000005F90000-0x0000000006022000-memory.dmp

    Filesize

    584KB

  • memory/3956-18-0x0000000073350000-0x0000000073B00000-memory.dmp

    Filesize

    7.7MB

  • memory/3956-15-0x0000000073350000-0x0000000073B00000-memory.dmp

    Filesize

    7.7MB

  • memory/3956-14-0x0000000000190000-0x00000000001AC000-memory.dmp

    Filesize

    112KB

  • memory/4764-0-0x0000000075592000-0x0000000075593000-memory.dmp

    Filesize

    4KB

  • memory/4764-2-0x0000000075590000-0x0000000075B41000-memory.dmp

    Filesize

    5.7MB

  • memory/4764-1-0x0000000075590000-0x0000000075B41000-memory.dmp

    Filesize

    5.7MB

  • memory/4764-7-0x0000000075590000-0x0000000075B41000-memory.dmp

    Filesize

    5.7MB