File name:

IEXPLORE.EXE

Full analysis: https://app.any.run/tasks/a5eaffd8-90d3-4629-bc01-3ef2267d067b
Verdict: Malicious activity
Analysis date: November 02, 2023, 19:51:33
OS: Windows 7 Professional Service Pack 1 (build: 7601, 64 bit)
Tags:
revengerat
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

875A806F3B37F0268E47DB10E410A761

SHA1:

2408B526DB41CAD7CFF345AA5753476147F8F0B4

SHA256:

0B4CBE7838D5C2E166B446A2FDF63FEC79E033C4CED7EB5CC60431B8F22E6700

SSDEEP:

24576:hV67iNkjibmEFhOHGo4uh68QqyxBXSCXPGms1lw3F0YmKDSd0ujsE58Vq84wE8hI:f6WNkebmEFhOHGo4uh68QqyxBXSCXPGB

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • IEXPLORE.EXE (PID: 2704)
    • REVENGERAT has been detected (YARA)

      • RegAsm.exe (PID: 2584)
    • Create files in the Startup directory

      • IEXPLORE.EXE (PID: 2704)
  • SUSPICIOUS

    • Connects to unusual port

      • RegAsm.exe (PID: 2584)
    • Process drops legitimate windows executable

      • IEXPLORE.EXE (PID: 2704)
  • INFO

    • Reads the machine GUID from the registry

      • RegAsm.exe (PID: 2584)
      • IEXPLORE.EXE (PID: 2704)
    • Checks supported languages

      • IEXPLORE.EXE (PID: 2704)
      • RegAsm.exe (PID: 2584)
    • Reads the computer name

      • RegAsm.exe (PID: 2584)
      • IEXPLORE.EXE (PID: 2704)
    • Reads mouse settings

      • IEXPLORE.EXE (PID: 2704)
    • Reads Environment values

      • RegAsm.exe (PID: 2584)
    • Creates files or folders in the user directory

      • IEXPLORE.EXE (PID: 2704)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

RevengeRat

(PID) Process(2584) RegAsm.exe
C2 (1)marzorevenger.duckdns.org
Ports (1)4230
BotnetMarzo26
Options
MutexRV_MUTEX-PiGGjjtnxDpn
Splitter*-]NK[-*
KeyRevenge-RAT
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:04:15 15:41:58+02:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 12
CodeSize: 581632
InitializedDataSize: 339456
UninitializedDataSize: -
EntryPoint: 0x2800a
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Dynamic link library
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
FileDescription: Internet Explorer
OriginalFileName: IEXPLORE.EXE.MUI
CompanyName: Microsoft Corporation
FileVersion: ...
LegalCopyright: © Microsoft Corporation. Todos los derechos reservados.
ProductName: Internet Explorer
ProductVersion: ...
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
33
Monitored processes
2
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe #REVENGERAT regasm.exe

Process information

PID
CMD
Path
Indicators
Parent process
2584"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
IEXPLORE.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Assembly Registration Utility
Exit code:
0
Version:
2.0.50727.5483 (Win7SP1GDR.050727-5400)
Modules
Images
c:\windows\microsoft.net\framework\v2.0.50727\regasm.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\mscoree.dll
RevengeRat
(PID) Process(2584) RegAsm.exe
C2 (1)marzorevenger.duckdns.org
Ports (1)4230
BotnetMarzo26
Options
MutexRV_MUTEX-PiGGjjtnxDpn
Splitter*-]NK[-*
KeyRevenge-RAT
2704"C:\Users\admin\AppData\Local\Temp\IEXPLORE.EXE" C:\Users\admin\AppData\Local\Temp\IEXPLORE.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
...
Modules
Images
c:\users\admin\appdata\local\temp\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
Total events
389
Read events
389
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
0
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
2704IEXPLORE.EXEC:\Users\admin\AppData\Roaming\at\MicrosoftEdgeCP.exeexecutable
MD5:DF7CA896742E5F5964132BC177A6DAD2
SHA256:88172DC9F086C4663440E4CA6287B1664794E5EB62F20203F6B499AA3FE3207B
2704IEXPLORE.EXEC:\Users\admin\AppData\Roaming\at\AudioHandlers.vbstext
MD5:5DC739721EE149250F350789982A45A7
SHA256:D71D4C789B61109A93C8FDBC766FC4F5965D7A8AE8985DA38216B6B2E4314A64
2704IEXPLORE.EXEC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AudioHandlers.urltext
MD5:C3980403F528C8ED9DD1479439EEA951
SHA256:2CC1E7EA2DA97B01A70FA5158622DF1286C747B61B37073953E97E736006DA1A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
12
DNS requests
3
Threats
4

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
unknown
2584
RegAsm.exe
186.85.86.137:4230
marzorevenger.duckdns.org
Telmex Colombia S.A.
CO
unknown
324
svchost.exe
224.0.0.252:5355
unknown
4
System
192.168.100.255:138
unknown
1956
svchost.exe
239.255.255.250:1900
unknown

DNS requests

Domain
IP
Reputation
marzorevenger.duckdns.org
  • 186.85.86.137
unknown
dns.msftncsi.com
  • 131.107.255.255
unknown

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET INFO DYNAMIC_DNS Query to a *.duckdns .org Domain
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
Potentially Bad Traffic
ET INFO DYNAMIC_DNS Query to a *.duckdns .org Domain
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
No debug info