Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-ltsc_2021_x64
  • resource
    win10ltsc2021-20250314-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system
  • submitted
    14/03/2025, 23:22

General

  • Target

    test.exe

  • Size

    24KB

  • MD5

    a226efb28f312fe033e65bd6a69f6984

  • SHA1

    f6b6ff14ef481d6790e0e2815a91f9504b003cd3

  • SHA256

    7a2b24e85d1ee137e9b96d8ca987cb90d2fc49f0f10906cde870bb0ee3a0bfed

  • SHA512

    8128fdf9c2900566b2f17c6e3719a600f5ac8878715c6d7694c4623ee873d783c38b45eb63c368b3aa4bab311fadf01d2bc7cb775ae7a295e9e2afdaa1d3aa4a

  • SSDEEP

    384:eU0ZVrMYSvRPJnMHYaA1WNbIBj3GNgylu9MZxe1sbYp7v1yRiflGeCzYcHe+Z:eZV59E3CVu9DMitG/zYcHe+Z

Malware Config

Extracted

Family

revengerat

Botnet

test

C2

127.0.0.1:333

127.0.0.1:21

127.0.0.1:443

127.0.0.1:80

212.102.63.147:333

212.102.63.147:21

212.102.63.147:443

212.102.63.147:80

Mutex

RV_MUTEX-fawrHJfWfhaR

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Revengerat family
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\test.exe
    "C:\Users\Admin\AppData\Local\Temp\test.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4712
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5736
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:5696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\YRvZwfRt.txt

    Filesize

    42B

    MD5

    faacfa4444c38959d1033137e5a1ffa4

    SHA1

    b60ed17fbbd52024aae6714bd337b12dc2502e50

    SHA256

    ae0d5ffde1564441649a4485564b80e2a4a126456c4a9b439c07005656dd26a6

    SHA512

    eae70ace61807142ff649ebb7b34b13913804ce01ec3fb1b3181ad1a690bb1608d898300c97cf2e5c9737a8e60efaf6e155c0f3221ebd084339d0579827ccb03

  • memory/4712-0-0x00007FFD5A855000-0x00007FFD5A856000-memory.dmp

    Filesize

    4KB

  • memory/4712-1-0x00007FFD5A5A0000-0x00007FFD5AF41000-memory.dmp

    Filesize

    9.6MB

  • memory/4712-2-0x000000001C420000-0x000000001C8EE000-memory.dmp

    Filesize

    4.8MB

  • memory/4712-3-0x000000001BE70000-0x000000001BF16000-memory.dmp

    Filesize

    664KB

  • memory/4712-4-0x000000001C9B0000-0x000000001CA12000-memory.dmp

    Filesize

    392KB

  • memory/4712-5-0x00007FFD5A5A0000-0x00007FFD5AF41000-memory.dmp

    Filesize

    9.6MB

  • memory/4712-6-0x00007FFD5A855000-0x00007FFD5A856000-memory.dmp

    Filesize

    4KB

  • memory/4712-7-0x00007FFD5A5A0000-0x00007FFD5AF41000-memory.dmp

    Filesize

    9.6MB

  • memory/4712-10-0x00007FFD5A5A0000-0x00007FFD5AF41000-memory.dmp

    Filesize

    9.6MB

  • memory/5696-17-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/5696-20-0x0000000004BD0000-0x0000000004BF1000-memory.dmp

    Filesize

    132KB

  • memory/5696-19-0x0000000004C00000-0x0000000004C3C000-memory.dmp

    Filesize

    240KB

  • memory/5696-22-0x0000000075290000-0x0000000075A41000-memory.dmp

    Filesize

    7.7MB

  • memory/5696-24-0x0000000075290000-0x0000000075A41000-memory.dmp

    Filesize

    7.7MB

  • memory/5736-13-0x0000000004BD0000-0x0000000004C6C000-memory.dmp

    Filesize

    624KB

  • memory/5736-14-0x0000000005220000-0x00000000057C6000-memory.dmp

    Filesize

    5.6MB

  • memory/5736-15-0x0000000004CE0000-0x0000000004D46000-memory.dmp

    Filesize

    408KB

  • memory/5736-16-0x000000007529E000-0x000000007529F000-memory.dmp

    Filesize

    4KB

  • memory/5736-12-0x0000000000610000-0x000000000061C000-memory.dmp

    Filesize

    48KB

  • memory/5736-11-0x000000007529E000-0x000000007529F000-memory.dmp

    Filesize

    4KB

  • memory/5736-21-0x0000000075290000-0x0000000075A41000-memory.dmp

    Filesize

    7.7MB

  • memory/5736-25-0x0000000075290000-0x0000000075A41000-memory.dmp

    Filesize

    7.7MB