Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

01/03/2025, 18:58 UTC

250301-xmhhrayp15 10

01/03/2025, 18:55 UTC

250301-xkqrcaypx7 10

Analysis

  • max time kernel
    130s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/01/2025, 13:12 UTC

General

  • Target

    948340be97cc69c2cf8e5c8327ee52a89eeb50095f978696c710ad773a46b654.exe

  • Size

    17KB

  • MD5

    aa0a434f00c138ef445bf89493a6d731

  • SHA1

    2e798c079b179b736247cf20d1346657db9632c7

  • SHA256

    948340be97cc69c2cf8e5c8327ee52a89eeb50095f978696c710ad773a46b654

  • SHA512

    e5b50ccd82c9cd5797dfc278dbd4bef6b4cb4468424962666d2618707a3c69e0154e8fb11846e0f529dd6e903fd9de2a2f4dd3b526821b10f08530371a0c6952

  • SSDEEP

    384:rnhZ7/5eOHY9FmMoEIPJvnbisVK8ysLu2s2:bhdQOS8EIRmIa2

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Revengerat family
  • RevengeRat Executable 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\948340be97cc69c2cf8e5c8327ee52a89eeb50095f978696c710ad773a46b654.exe
    "C:\Users\Admin\AppData\Local\Temp\948340be97cc69c2cf8e5c8327ee52a89eeb50095f978696c710ad773a46b654.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2952
    • C:\Users\Admin\AppData\Roaming\Client.exe
      "C:\Users\Admin\AppData\Roaming\Client.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      PID:408

Network

  • flag-us
    DNS
    196.249.167.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    196.249.167.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    cocohack.dtdns.net
    Client.exe
    Remote address:
    8.8.8.8:53
    Request
    cocohack.dtdns.net
    IN A
    Response
    cocohack.dtdns.net
    IN A
    3.33.243.145
  • flag-us
    DNS
    67.31.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    67.31.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    188.77.23.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    188.77.23.2.in-addr.arpa
    IN PTR
    Response
    188.77.23.2.in-addr.arpa
    IN PTR
    a2-23-77-188deploystaticakamaitechnologiescom
  • flag-us
    DNS
    241.150.49.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    241.150.49.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    133.211.185.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    133.211.185.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    209.205.72.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    209.205.72.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    53.210.109.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    53.210.109.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    15.164.165.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    15.164.165.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    72.164.16.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    72.164.16.2.in-addr.arpa
    IN PTR
    Response
    72.164.16.2.in-addr.arpa
    IN PTR
    a2-16-164-72deploystaticakamaitechnologiescom
  • flag-us
    DNS
    13.227.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    13.227.111.52.in-addr.arpa
    IN PTR
    Response
  • 3.33.243.145:84
    cocohack.dtdns.net
    948340be97cc69c2cf8e5c8327ee52a89eeb50095f978696c710ad773a46b654.exe
    260 B
    5
  • 3.33.243.145:84
    cocohack.dtdns.net
    948340be97cc69c2cf8e5c8327ee52a89eeb50095f978696c710ad773a46b654.exe
    208 B
    4
  • 3.33.243.145:84
    cocohack.dtdns.net
    Client.exe
    260 B
    5
  • 3.33.243.145:84
    cocohack.dtdns.net
    Client.exe
    260 B
    5
  • 3.33.243.145:84
    cocohack.dtdns.net
    Client.exe
    260 B
    5
  • 3.33.243.145:84
    cocohack.dtdns.net
    Client.exe
    260 B
    5
  • 3.33.243.145:84
    cocohack.dtdns.net
    Client.exe
    260 B
    5
  • 8.8.8.8:53
    196.249.167.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    196.249.167.52.in-addr.arpa

  • 8.8.8.8:53
    cocohack.dtdns.net
    dns
    Client.exe
    64 B
    80 B
    1
    1

    DNS Request

    cocohack.dtdns.net

    DNS Response

    3.33.243.145

  • 8.8.8.8:53
    67.31.126.40.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    67.31.126.40.in-addr.arpa

  • 8.8.8.8:53
    188.77.23.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    188.77.23.2.in-addr.arpa

  • 8.8.8.8:53
    241.150.49.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    241.150.49.20.in-addr.arpa

  • 8.8.8.8:53
    133.211.185.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    133.211.185.52.in-addr.arpa

  • 8.8.8.8:53
    209.205.72.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    209.205.72.20.in-addr.arpa

  • 8.8.8.8:53
    53.210.109.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    53.210.109.20.in-addr.arpa

  • 8.8.8.8:53
    15.164.165.52.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    15.164.165.52.in-addr.arpa

  • 8.8.8.8:53
    72.164.16.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    72.164.16.2.in-addr.arpa

  • 8.8.8.8:53
    13.227.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    13.227.111.52.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Client.exe

    Filesize

    17KB

    MD5

    aa0a434f00c138ef445bf89493a6d731

    SHA1

    2e798c079b179b736247cf20d1346657db9632c7

    SHA256

    948340be97cc69c2cf8e5c8327ee52a89eeb50095f978696c710ad773a46b654

    SHA512

    e5b50ccd82c9cd5797dfc278dbd4bef6b4cb4468424962666d2618707a3c69e0154e8fb11846e0f529dd6e903fd9de2a2f4dd3b526821b10f08530371a0c6952

  • memory/408-21-0x00007FFEAF0C0000-0x00007FFEAFA61000-memory.dmp

    Filesize

    9.6MB

  • memory/408-20-0x00007FFEAF0C0000-0x00007FFEAFA61000-memory.dmp

    Filesize

    9.6MB

  • memory/408-19-0x00007FFEAF0C0000-0x00007FFEAFA61000-memory.dmp

    Filesize

    9.6MB

  • memory/408-17-0x00007FFEAF0C0000-0x00007FFEAFA61000-memory.dmp

    Filesize

    9.6MB

  • memory/2952-4-0x000000001C230000-0x000000001C2D6000-memory.dmp

    Filesize

    664KB

  • memory/2952-6-0x00007FFEAF375000-0x00007FFEAF376000-memory.dmp

    Filesize

    4KB

  • memory/2952-7-0x00007FFEAF0C0000-0x00007FFEAFA61000-memory.dmp

    Filesize

    9.6MB

  • memory/2952-5-0x000000001C400000-0x000000001C462000-memory.dmp

    Filesize

    392KB

  • memory/2952-3-0x00007FFEAF0C0000-0x00007FFEAFA61000-memory.dmp

    Filesize

    9.6MB

  • memory/2952-18-0x00007FFEAF0C0000-0x00007FFEAFA61000-memory.dmp

    Filesize

    9.6MB

  • memory/2952-0-0x00007FFEAF375000-0x00007FFEAF376000-memory.dmp

    Filesize

    4KB

  • memory/2952-2-0x000000001BD60000-0x000000001C22E000-memory.dmp

    Filesize

    4.8MB

  • memory/2952-1-0x00007FFEAF0C0000-0x00007FFEAFA61000-memory.dmp

    Filesize

    9.6MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.