Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 06:49
Behavioral task
behavioral1
Sample
2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe
Resource
win10v2004-20241007-en
General
-
Target
2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe
-
Size
1.9MB
-
MD5
335457b24d4fb19bfd9a711f5b3deaf0
-
SHA1
2c9f74a030a77c6b2fc552ab1fd0ef48a54eca68
-
SHA256
2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896
-
SHA512
a603b6e5efb0ba3db23f01cbafd73fe6e533d9187c9c24aefffbbee42d4073a85278e33a312ea2da720e40c9de4c17cd8cef87fe39bfb8ab577c278abb909842
-
SSDEEP
49152:E91DSeK3K1ovWnZ5Yw9NMZ6Pkew933XyrCCC0:MNSeb1n5YEi0Pm93y
Malware Config
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Revengerat family
-
RevengeRat Executable 1 IoCs
resource yara_rule behavioral2/files/0x0009000000023c01-16.dat revengerat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe -
Executes dropped EXE 1 IoCs
pid Process 408 WipeShadow.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp dw20.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WipeShadow.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 116 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe Token: SeDebugPrivilege 408 WipeShadow.exe Token: SeRestorePrivilege 4384 dw20.exe Token: SeBackupPrivilege 4384 dw20.exe Token: SeBackupPrivilege 4384 dw20.exe Token: SeBackupPrivilege 4384 dw20.exe Token: SeBackupPrivilege 4384 dw20.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4156 wrote to memory of 4596 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 91 PID 4156 wrote to memory of 4596 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 91 PID 4156 wrote to memory of 4596 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 91 PID 4156 wrote to memory of 116 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 93 PID 4156 wrote to memory of 116 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 93 PID 4156 wrote to memory of 116 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 93 PID 4156 wrote to memory of 3928 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 95 PID 4156 wrote to memory of 3928 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 95 PID 4156 wrote to memory of 3928 4156 2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe 95 PID 3928 wrote to memory of 408 3928 cmd.exe 97 PID 3928 wrote to memory of 408 3928 cmd.exe 97 PID 3928 wrote to memory of 408 3928 cmd.exe 97 PID 408 wrote to memory of 4384 408 WipeShadow.exe 98 PID 408 wrote to memory of 4384 408 WipeShadow.exe 98 PID 408 wrote to memory of 4384 408 WipeShadow.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe"C:\Users\Admin\AppData\Local\Temp\2909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896N.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Delete /TN "Update\dcba3215-9a85-40cf-9198-e7887aed0f54" /F2⤵
- System Location Discovery: System Language Discovery
PID:4596
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Update\dcba3215-9a85-40cf-9198-e7887aed0f54" /XML "C:\Users\Admin\AppData\Local\Temp\tmp471630628.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:116
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /K "C:\ProgramData\WipeShadow.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\ProgramData\WipeShadow.exeC:\ProgramData\WipeShadow.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 13244⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4384
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5335457b24d4fb19bfd9a711f5b3deaf0
SHA12c9f74a030a77c6b2fc552ab1fd0ef48a54eca68
SHA2562909c8b92462475f5ae4c31fd0d00160ffda8bbcbbea6c1b5cae80aecff0f896
SHA512a603b6e5efb0ba3db23f01cbafd73fe6e533d9187c9c24aefffbbee42d4073a85278e33a312ea2da720e40c9de4c17cd8cef87fe39bfb8ab577c278abb909842
-
Filesize
1KB
MD58f6929c8f237abf200440785c8ac4c1e
SHA1e4bf4e3ef8e7070a9fe7cc6801f66049314305b9
SHA25608587b4c7ed3d5ca6a64b7f3c3eb0c8c69532e71b1be3e9bfcdb06626387479a
SHA512140e999edf8c2aeb5e8f14b4225425d51e77d885f08c7a542e6445b21673e56dd3d3b134f602c71e94ab7daf6ccf577281348318fa6f428d5a0645f615a848db