Analysis
-
max time kernel
60s -
max time network
54s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 17:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Da2dalus/The-MALWARE-Repo/raw/refs/heads/master/RAT/RevengeRAT.exe
Resource
win10v2004-20241007-en
General
-
Target
https://github.com/Da2dalus/The-MALWARE-Repo/raw/refs/heads/master/RAT/RevengeRAT.exe
Malware Config
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Revengerat family
-
RevengeRat Executable 1 IoCs
resource yara_rule behavioral1/files/0x0009000000023cb8-52.dat revengerat -
Downloads MZ/PE file
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 13 raw.githubusercontent.com 14 raw.githubusercontent.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133784640671672330" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2772 chrome.exe 2772 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2772 chrome.exe 2772 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe -
Suspicious use of FindShellTrayWindow 60 IoCs
pid Process 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2772 wrote to memory of 3540 2772 chrome.exe 82 PID 2772 wrote to memory of 3540 2772 chrome.exe 82 PID 2772 wrote to memory of 4864 2772 chrome.exe 83 PID 2772 wrote to memory of 4864 2772 chrome.exe 83 PID 2772 wrote to memory of 4864 2772 chrome.exe 83 PID 2772 wrote to memory of 4864 2772 chrome.exe 83 PID 2772 wrote to memory of 4864 2772 chrome.exe 83 PID 2772 wrote to memory of 4864 2772 chrome.exe 83 PID 2772 wrote to memory of 4864 2772 chrome.exe 83 PID 2772 wrote to memory of 4864 2772 chrome.exe 83 PID 2772 wrote to memory of 4864 2772 chrome.exe 83 PID 2772 wrote to memory of 4864 2772 chrome.exe 83 PID 2772 wrote to memory of 4864 2772 chrome.exe 83 PID 2772 wrote to memory of 4864 2772 chrome.exe 83 PID 2772 wrote to memory of 4864 2772 chrome.exe 83 PID 2772 wrote to memory of 4864 2772 chrome.exe 83 PID 2772 wrote to memory of 4864 2772 chrome.exe 83 PID 2772 wrote to memory of 4864 2772 chrome.exe 83 PID 2772 wrote to memory of 4864 2772 chrome.exe 83 PID 2772 wrote to memory of 4864 2772 chrome.exe 83 PID 2772 wrote to memory of 4864 2772 chrome.exe 83 PID 2772 wrote to memory of 4864 2772 chrome.exe 83 PID 2772 wrote to memory of 4864 2772 chrome.exe 83 PID 2772 wrote to memory of 4864 2772 chrome.exe 83 PID 2772 wrote to memory of 4864 2772 chrome.exe 83 PID 2772 wrote to memory of 4864 2772 chrome.exe 83 PID 2772 wrote to memory of 4864 2772 chrome.exe 83 PID 2772 wrote to memory of 4864 2772 chrome.exe 83 PID 2772 wrote to memory of 4864 2772 chrome.exe 83 PID 2772 wrote to memory of 4864 2772 chrome.exe 83 PID 2772 wrote to memory of 4864 2772 chrome.exe 83 PID 2772 wrote to memory of 4864 2772 chrome.exe 83 PID 2772 wrote to memory of 2400 2772 chrome.exe 84 PID 2772 wrote to memory of 2400 2772 chrome.exe 84 PID 2772 wrote to memory of 3704 2772 chrome.exe 85 PID 2772 wrote to memory of 3704 2772 chrome.exe 85 PID 2772 wrote to memory of 3704 2772 chrome.exe 85 PID 2772 wrote to memory of 3704 2772 chrome.exe 85 PID 2772 wrote to memory of 3704 2772 chrome.exe 85 PID 2772 wrote to memory of 3704 2772 chrome.exe 85 PID 2772 wrote to memory of 3704 2772 chrome.exe 85 PID 2772 wrote to memory of 3704 2772 chrome.exe 85 PID 2772 wrote to memory of 3704 2772 chrome.exe 85 PID 2772 wrote to memory of 3704 2772 chrome.exe 85 PID 2772 wrote to memory of 3704 2772 chrome.exe 85 PID 2772 wrote to memory of 3704 2772 chrome.exe 85 PID 2772 wrote to memory of 3704 2772 chrome.exe 85 PID 2772 wrote to memory of 3704 2772 chrome.exe 85 PID 2772 wrote to memory of 3704 2772 chrome.exe 85 PID 2772 wrote to memory of 3704 2772 chrome.exe 85 PID 2772 wrote to memory of 3704 2772 chrome.exe 85 PID 2772 wrote to memory of 3704 2772 chrome.exe 85 PID 2772 wrote to memory of 3704 2772 chrome.exe 85 PID 2772 wrote to memory of 3704 2772 chrome.exe 85 PID 2772 wrote to memory of 3704 2772 chrome.exe 85 PID 2772 wrote to memory of 3704 2772 chrome.exe 85 PID 2772 wrote to memory of 3704 2772 chrome.exe 85 PID 2772 wrote to memory of 3704 2772 chrome.exe 85 PID 2772 wrote to memory of 3704 2772 chrome.exe 85 PID 2772 wrote to memory of 3704 2772 chrome.exe 85 PID 2772 wrote to memory of 3704 2772 chrome.exe 85 PID 2772 wrote to memory of 3704 2772 chrome.exe 85 PID 2772 wrote to memory of 3704 2772 chrome.exe 85 PID 2772 wrote to memory of 3704 2772 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/Da2dalus/The-MALWARE-Repo/raw/refs/heads/master/RAT/RevengeRAT.exe1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xf8,0x108,0x7ff83148cc40,0x7ff83148cc4c,0x7ff83148cc582⤵PID:3540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1904,i,14710923675856013253,178597531576403881,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1900 /prefetch:22⤵PID:4864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2140,i,14710923675856013253,178597531576403881,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2172 /prefetch:32⤵PID:2400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2240,i,14710923675856013253,178597531576403881,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2260 /prefetch:82⤵PID:3704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3132,i,14710923675856013253,178597531576403881,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:1392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3136,i,14710923675856013253,178597531576403881,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4772,i,14710923675856013253,178597531576403881,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4784 /prefetch:82⤵PID:544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5000,i,14710923675856013253,178597531576403881,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5012 /prefetch:82⤵PID:2244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5040,i,14710923675856013253,178597531576403881,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5160 /prefetch:82⤵PID:5100
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4808
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1144
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5415e401aff77fbdfba4518a86b9390e7
SHA1a6cf9aaf578c88f62982bb61877b758149b3c4fb
SHA25604f02ab7cfe38953590d3b49592d0a498c8862c48ece4c2cd5822b5eb79d80a1
SHA51266ceceb03f86f1f6dc979f25e82c45dc65a58322eefbf8b6f3347ff8e2f605d4f01602bb8d201e8944357266cb98cb857ddea5541bea7075b78b34ea03f559f8
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
691B
MD5000601dd2473930ee6c2f911788d6e38
SHA18264bb2f104d6dd90597171200cc01843b34fbf5
SHA256855974b3a83c436bf92d8e673547c50cb3b3cd6c43e053af4fd17baab5a76691
SHA512b42fd08247f41153e343ed04298db58eb09ea9c453e716aded294f2159d9245522b89710bc4b979e984f9f8d27c4fb3fac1c238b46ca380b880f40cea2248b28
-
Filesize
9KB
MD5081ac85d9c3b61cb4be0247ceab79f66
SHA101742c1a5a403fdcbf80431367ea11388b19480a
SHA2561ec5f74eb022c455b0bcb2963a65631a1e311c4232c73a737ed6899a66a2d908
SHA51234c35c3d35e88630aad3c6241029c3207385636847f6a096736b06c6ef1af843ab5b02e63c64f49f3d822efa7ef0f6207e5d30d2dc316740bbdddd7c0853572b
-
Filesize
9KB
MD58f0d5259af80debf5990f00ea9fe410b
SHA139b2d21d48070f1117ac60518cadeb1beeccbfe8
SHA256acf26cb0693c39f7ae46439ce005a0c33ea293e072f40743548f038907663270
SHA51266ee513f86056135339fbae58ae640ab9949d10919790f03f6941a2573dda187eebc80fabf446b0e31b996905fa18340d6f652cf71020613ed282daab8aeb516
-
Filesize
9KB
MD5da042a299e9d44bd1f28c4940783e31b
SHA16330c2ea6861c8156b963254b14817e6920b8590
SHA256a14771c64bfd395b0d9ae38d5026399261f5753e5647081174f2e32c01af9b40
SHA5120f3c19f84f7b70733a2388cabbd5c01bc8a1a8ae23244da2c31aa91224486303cc24bd58f954d0a23d48d2c3c6e4340460ed1f5568363e2928c043c8e3c129e4
-
Filesize
116KB
MD5ed1edc8d0904a5cf06cf6f27732b3798
SHA10a57af6d3e5993593bbf526bd5543f0dd322afd9
SHA25624d14515b8d0493ccabe49b3236e57f1912fb53a533fddbea7d4e3d765f9c2c1
SHA51230031e2bdd12f364deda764c69e2dd15155a8b92e43b0ef84ba2514f0328363030e44e7fa580e0d5df4063054c5fa4f1874e6540f8bed03a74fa0b0141c93e24
-
Filesize
116KB
MD51dc67d99d9c2d3a512a64260eeee7773
SHA18d9762ecaeb1b65f4ce2d388cd24ce9c0844a546
SHA256698f879456832a5ffc7898a4e6f6da1eb749ddd54bd26967e759fdd2e5f2b17c
SHA512d0e8cf230f6227f24a1370d901d044ddeed7a2bc69b713419398cf1d3bc58531cb4ef520c82c8340ed58bedb8b076f461ede598c1ffa95183f30ebadcb0c488a
-
Filesize
4.0MB
MD51d9045870dbd31e2e399a4e8ecd9302f
SHA17857c1ebfd1b37756d106027ed03121d8e7887cf
SHA2569b4826b8876ca2f1378b1dfe47b0c0d6e972bf9f0b3a36e299b26fbc86283885
SHA5129419ed0a1c5e43f48a3534e36be9b2b03738e017c327e13586601381a8342c4c9b09aa9b89f80414d0d458284d2d17f48d27934a6b2d6d49450d045f49c10909