Analysis
-
max time kernel
17s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 06:08
Behavioral task
behavioral1
Sample
Revshit.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Revshit.exe
Resource
win10v2004-20250314-en
General
-
Target
Revshit.exe
-
Size
7.0MB
-
MD5
cba26b6e9bb2bb774f937fcaea7764eb
-
SHA1
e465795d232ee64b69d36841e09b6bf6f52f464c
-
SHA256
fd624887b0486e9f1eb6d52eff959fc247d0fc03b8b306eff81994b59352f4a1
-
SHA512
e8441c3093a09a0b23c20a46c60eb0092618554f7fbfe39fe9430350786bb4be5fda449e7c08e7ccb5924f5ef15e0b591d2b7e6f3ac45795dfdd032a3a68fe11
-
SSDEEP
98304:NQDjWM8JEE1rU/amaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYKJJcGhEIFL:NQ0kieNTfm/pf+xk4dWRptrbWOjgrI
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 3016 Revshit.exe -
resource yara_rule behavioral1/files/0x000500000001950f-21.dat upx behavioral1/memory/3016-23-0x000007FEF5E90000-0x000007FEF6478000-memory.dmp upx -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2884 chrome.exe 2884 chrome.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeShutdownPrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2376 wrote to memory of 3016 2376 Revshit.exe 29 PID 2376 wrote to memory of 3016 2376 Revshit.exe 29 PID 2376 wrote to memory of 3016 2376 Revshit.exe 29 PID 2884 wrote to memory of 2932 2884 chrome.exe 31 PID 2884 wrote to memory of 2932 2884 chrome.exe 31 PID 2884 wrote to memory of 2932 2884 chrome.exe 31 PID 2884 wrote to memory of 2688 2884 chrome.exe 33 PID 2884 wrote to memory of 2688 2884 chrome.exe 33 PID 2884 wrote to memory of 2688 2884 chrome.exe 33 PID 2884 wrote to memory of 2688 2884 chrome.exe 33 PID 2884 wrote to memory of 2688 2884 chrome.exe 33 PID 2884 wrote to memory of 2688 2884 chrome.exe 33 PID 2884 wrote to memory of 2688 2884 chrome.exe 33 PID 2884 wrote to memory of 2688 2884 chrome.exe 33 PID 2884 wrote to memory of 2688 2884 chrome.exe 33 PID 2884 wrote to memory of 2688 2884 chrome.exe 33 PID 2884 wrote to memory of 2688 2884 chrome.exe 33 PID 2884 wrote to memory of 2688 2884 chrome.exe 33 PID 2884 wrote to memory of 2688 2884 chrome.exe 33 PID 2884 wrote to memory of 2688 2884 chrome.exe 33 PID 2884 wrote to memory of 2688 2884 chrome.exe 33 PID 2884 wrote to memory of 2688 2884 chrome.exe 33 PID 2884 wrote to memory of 2688 2884 chrome.exe 33 PID 2884 wrote to memory of 2688 2884 chrome.exe 33 PID 2884 wrote to memory of 2688 2884 chrome.exe 33 PID 2884 wrote to memory of 2688 2884 chrome.exe 33 PID 2884 wrote to memory of 2688 2884 chrome.exe 33 PID 2884 wrote to memory of 2688 2884 chrome.exe 33 PID 2884 wrote to memory of 2688 2884 chrome.exe 33 PID 2884 wrote to memory of 2688 2884 chrome.exe 33 PID 2884 wrote to memory of 2688 2884 chrome.exe 33 PID 2884 wrote to memory of 2688 2884 chrome.exe 33 PID 2884 wrote to memory of 2688 2884 chrome.exe 33 PID 2884 wrote to memory of 2688 2884 chrome.exe 33 PID 2884 wrote to memory of 2688 2884 chrome.exe 33 PID 2884 wrote to memory of 2688 2884 chrome.exe 33 PID 2884 wrote to memory of 2688 2884 chrome.exe 33 PID 2884 wrote to memory of 2688 2884 chrome.exe 33 PID 2884 wrote to memory of 2688 2884 chrome.exe 33 PID 2884 wrote to memory of 2688 2884 chrome.exe 33 PID 2884 wrote to memory of 2688 2884 chrome.exe 33 PID 2884 wrote to memory of 2688 2884 chrome.exe 33 PID 2884 wrote to memory of 2688 2884 chrome.exe 33 PID 2884 wrote to memory of 2688 2884 chrome.exe 33 PID 2884 wrote to memory of 2688 2884 chrome.exe 33 PID 2884 wrote to memory of 2744 2884 chrome.exe 34 PID 2884 wrote to memory of 2744 2884 chrome.exe 34 PID 2884 wrote to memory of 2744 2884 chrome.exe 34 PID 2884 wrote to memory of 2220 2884 chrome.exe 35 PID 2884 wrote to memory of 2220 2884 chrome.exe 35 PID 2884 wrote to memory of 2220 2884 chrome.exe 35 PID 2884 wrote to memory of 2220 2884 chrome.exe 35 PID 2884 wrote to memory of 2220 2884 chrome.exe 35 PID 2884 wrote to memory of 2220 2884 chrome.exe 35 PID 2884 wrote to memory of 2220 2884 chrome.exe 35 PID 2884 wrote to memory of 2220 2884 chrome.exe 35 PID 2884 wrote to memory of 2220 2884 chrome.exe 35 PID 2884 wrote to memory of 2220 2884 chrome.exe 35 PID 2884 wrote to memory of 2220 2884 chrome.exe 35 PID 2884 wrote to memory of 2220 2884 chrome.exe 35 PID 2884 wrote to memory of 2220 2884 chrome.exe 35 PID 2884 wrote to memory of 2220 2884 chrome.exe 35 PID 2884 wrote to memory of 2220 2884 chrome.exe 35 PID 2884 wrote to memory of 2220 2884 chrome.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\Revshit.exe"C:\Users\Admin\AppData\Local\Temp\Revshit.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\Revshit.exe"C:\Users\Admin\AppData\Local\Temp\Revshit.exe"2⤵
- Loads dropped DLL
PID:3016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fefb019758,0x7fefb019768,0x7fefb0197782⤵PID:2932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1092 --field-trial-handle=1016,i,8939486656907761697,6376318892711117694,131072 /prefetch:22⤵PID:2688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1496 --field-trial-handle=1016,i,8939486656907761697,6376318892711117694,131072 /prefetch:82⤵PID:2744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1600 --field-trial-handle=1016,i,8939486656907761697,6376318892711117694,131072 /prefetch:82⤵PID:2220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2232 --field-trial-handle=1016,i,8939486656907761697,6376318892711117694,131072 /prefetch:12⤵PID:1992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2248 --field-trial-handle=1016,i,8939486656907761697,6376318892711117694,131072 /prefetch:12⤵PID:2996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1388 --field-trial-handle=1016,i,8939486656907761697,6376318892711117694,131072 /prefetch:22⤵PID:3048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1396 --field-trial-handle=1016,i,8939486656907761697,6376318892711117694,131072 /prefetch:12⤵PID:960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3476 --field-trial-handle=1016,i,8939486656907761697,6376318892711117694,131072 /prefetch:82⤵PID:856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3628 --field-trial-handle=1016,i,8939486656907761697,6376318892711117694,131072 /prefetch:82⤵PID:932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2604 --field-trial-handle=1016,i,8939486656907761697,6376318892711117694,131072 /prefetch:82⤵PID:1744
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:576
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2240
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x47c1⤵PID:2432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
359KB
MD506cc5d7830b2d7ef803b0693458b1d5b
SHA114e03419a745e79f780c05cc4963de5f04f9b45a
SHA25672045ecfad26331f99297b59ac0bdc2e18b0535a022fdc581f504f0090d526c6
SHA5126f4e97b8f031e3ab5413830fd9639bda96260316ea5fb7bfe0988769a7f75d7e85065e613f4a10cda607f5e96931ff9edaab752c0da866db2ae536df61f27217
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\6a120aea-e652-4aa9-9abe-2b41a366d0d0.tmp
Filesize4KB
MD54bf41509978ee82ff2a4c6580efc1739
SHA139ab14772367d0f73d3cd3281e3121836b8d8bfe
SHA256bff60cc8a7aeec3dc7c74a9b04a8ef63c2550dce49d6da69be0cc725e555857d
SHA5122d33f78572ab717c2b891273b3860e9e2d09d59f7545764ec1aadfb978cd0b36c355700d7462ea0195c0668392a2c37bf19ccdf504babc557365cd2e3d2fe9d7
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
359KB
MD5f7aeee1982fa55e3bee900a2eb413754
SHA1e90f36a71412f49e0ba2e8c2c3752d291c246754
SHA256c1e4b485c91877324f7e4663b24324d41fc821840b4ca3e69d06ceaeaf31c671
SHA5125eaabdd9026676615702b419a219ebd1e103160c8d24e5474cede7d9bf7b25f013f1f5d7eae1462b91d74e38eaf5a6a42c09bb5b2abb54fb881cbe86df63464a
-
Filesize
1.6MB
MD5bb46b85029b543b70276ad8e4c238799
SHA1123bdcd9eebcac1ec0fd2764a37e5e5476bb0c1c
SHA25672c24e1db1ba4df791720a93ca9502d77c3738eebf8b9092a5d82aa8d80121d0
SHA5125e993617509c1cf434938d6a467eb0494e04580ad242535a04937f7c174d429da70a6e71792fc3de69e103ffc5d9de51d29001a4df528cfffefdaa2cef4eaf31