Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
iJCj3AQIBC.exe

Overview

General Information

Sample name:iJCj3AQIBC.exe
renamed because original name is a hash value
Original sample name:88271db3546e63f0b5a769299165d230df7794aea1871f392cef9c074a068e9a.exe
Analysis ID:1588758
MD5:fc3d3b3c17850259571533e6cf2e8880
SHA1:f4a0c78798da0868741c160326866192be448939
SHA256:88271db3546e63f0b5a769299165d230df7794aea1871f392cef9c074a068e9a
Tags:exeuser-adrian__luca
Infos:

Detection

RevengeRAT
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected RevengeRAT
AI detected suspicious sample
Machine Learning detection for sample
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Detected non-DNS traffic on DNS port
May sleep (evasive loops) to hinder dynamic analysis
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • iJCj3AQIBC.exe (PID: 7260 cmdline: "C:\Users\user\Desktop\iJCj3AQIBC.exe" MD5: FC3D3B3C17850259571533E6CF2E8880)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
iJCj3AQIBC.exeJoeSecurity_RevengeRATYara detected RevengeRATJoe Security
    iJCj3AQIBC.exeRevengeRAT_Sep17Detects RevengeRAT malwareFlorian Roth
    • 0x3717:$x3: 03C7F4E8FB359AEC0EEF0814B66A704FC43FB3A8
    • 0x3740:$x4: 5B1EE7CAD3DFF220A95D1D6B91435D9E1520AC41
    iJCj3AQIBC.exeMALWARE_Win_RevengeRATRevengeRAT and variants payloadditekSHen
    • 0x3776:$s4: *-]NK[-*
    • 0x3923:$s5: RV_MUTEX
    • 0x30e5:$s6: set_SendBufferSize
    • 0x3717:$s7: 03C7F4E8FB359AEC0EEF0814B66A704FC43FB3A8
    • 0x3740:$s8: 5B1EE7CAD3DFF220A95D1D6B91435D9E1520AC41
    • 0x3ba1:$q1: Select * from AntiVirusProduct
    • 0x3bdf:$q2: SELECT * FROM FirewallProduct
    • 0x3c95:$q3: select * from Win32_Processor
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.1345622344.0000000000832000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_RevengeRATYara detected RevengeRATJoe Security
      Process Memory Space: iJCj3AQIBC.exe PID: 7260JoeSecurity_RevengeRATYara detected RevengeRATJoe Security
        SourceRuleDescriptionAuthorStrings
        0.0.iJCj3AQIBC.exe.830000.0.unpackJoeSecurity_RevengeRATYara detected RevengeRATJoe Security
          0.0.iJCj3AQIBC.exe.830000.0.unpackRevengeRAT_Sep17Detects RevengeRAT malwareFlorian Roth
          • 0x3717:$x3: 03C7F4E8FB359AEC0EEF0814B66A704FC43FB3A8
          • 0x3740:$x4: 5B1EE7CAD3DFF220A95D1D6B91435D9E1520AC41
          0.0.iJCj3AQIBC.exe.830000.0.unpackMALWARE_Win_RevengeRATRevengeRAT and variants payloadditekSHen
          • 0x3776:$s4: *-]NK[-*
          • 0x3923:$s5: RV_MUTEX
          • 0x30e5:$s6: set_SendBufferSize
          • 0x3717:$s7: 03C7F4E8FB359AEC0EEF0814B66A704FC43FB3A8
          • 0x3740:$s8: 5B1EE7CAD3DFF220A95D1D6B91435D9E1520AC41
          • 0x3ba1:$q1: Select * from AntiVirusProduct
          • 0x3bdf:$q2: SELECT * FROM FirewallProduct
          • 0x3c95:$q3: select * from Win32_Processor
          No Sigma rule has matched
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: iJCj3AQIBC.exeAvira: detected
          Source: iJCj3AQIBC.exeReversingLabs: Detection: 95%
          Source: Yara matchFile source: iJCj3AQIBC.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.iJCj3AQIBC.exe.830000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.1345622344.0000000000832000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: iJCj3AQIBC.exe PID: 7260, type: MEMORYSTR
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.6% probability
          Source: iJCj3AQIBC.exeJoe Sandbox ML: detected
          Source: iJCj3AQIBC.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: C:\Users\user\Desktop\iJCj3AQIBC.exeFile opened: C:\Windows\WinSxS\amd64_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_88e266cb2fac7c0d\MSVCR80.dllJump to behavior
          Source: iJCj3AQIBC.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: global trafficTCP traffic: 192.168.2.9:61734 -> 1.1.1.1:53
          Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: iJCj3AQIBC.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.iJCj3AQIBC.exe.830000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.1345622344.0000000000832000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: iJCj3AQIBC.exe PID: 7260, type: MEMORYSTR

          System Summary

          barindex
          Source: iJCj3AQIBC.exe, type: SAMPLEMatched rule: Detects RevengeRAT malware Author: Florian Roth
          Source: iJCj3AQIBC.exe, type: SAMPLEMatched rule: RevengeRAT and variants payload Author: ditekSHen
          Source: 0.0.iJCj3AQIBC.exe.830000.0.unpack, type: UNPACKEDPEMatched rule: Detects RevengeRAT malware Author: Florian Roth
          Source: 0.0.iJCj3AQIBC.exe.830000.0.unpack, type: UNPACKEDPEMatched rule: RevengeRAT and variants payload Author: ditekSHen
          Source: iJCj3AQIBC.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: iJCj3AQIBC.exe, type: SAMPLEMatched rule: RevengeRAT_Sep17 date = 2017-09-04, hash3 = fe00c4f9c8439eea50b44f817f760d8107f81e2dba7f383009fde508ff4b8967, hash2 = 7c271484c11795876972aabeb277c7b3035f896c9e860a852d69737df6e14213, hash1 = 2a86a4b2dcf1657bcb2922e70fc787aa9b66ec1c26dc2119f669bd2ce3f2e94a, author = Florian Roth, description = Detects RevengeRAT malware, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: iJCj3AQIBC.exe, type: SAMPLEMatched rule: MALWARE_Win_RevengeRAT author = ditekSHen, description = RevengeRAT and variants payload, snort_sid = 920000-920002
          Source: 0.0.iJCj3AQIBC.exe.830000.0.unpack, type: UNPACKEDPEMatched rule: RevengeRAT_Sep17 date = 2017-09-04, hash3 = fe00c4f9c8439eea50b44f817f760d8107f81e2dba7f383009fde508ff4b8967, hash2 = 7c271484c11795876972aabeb277c7b3035f896c9e860a852d69737df6e14213, hash1 = 2a86a4b2dcf1657bcb2922e70fc787aa9b66ec1c26dc2119f669bd2ce3f2e94a, author = Florian Roth, description = Detects RevengeRAT malware, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 0.0.iJCj3AQIBC.exe.830000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RevengeRAT author = ditekSHen, description = RevengeRAT and variants payload, snort_sid = 920000-920002
          Source: classification engineClassification label: mal80.troj.winEXE@1/0@0/0
          Source: C:\Users\user\Desktop\iJCj3AQIBC.exeMutant created: NULL
          Source: iJCj3AQIBC.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: iJCj3AQIBC.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
          Source: C:\Users\user\Desktop\iJCj3AQIBC.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: iJCj3AQIBC.exeReversingLabs: Detection: 95%
          Source: C:\Users\user\Desktop\iJCj3AQIBC.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\iJCj3AQIBC.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\iJCj3AQIBC.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\iJCj3AQIBC.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\iJCj3AQIBC.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\iJCj3AQIBC.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\iJCj3AQIBC.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\iJCj3AQIBC.exeSection loaded: uxtheme.dllJump to behavior
          Source: iJCj3AQIBC.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: C:\Users\user\Desktop\iJCj3AQIBC.exeFile opened: C:\Windows\WinSxS\amd64_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_88e266cb2fac7c0d\MSVCR80.dllJump to behavior
          Source: iJCj3AQIBC.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: C:\Users\user\Desktop\iJCj3AQIBC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\iJCj3AQIBC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\iJCj3AQIBC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\iJCj3AQIBC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\iJCj3AQIBC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\iJCj3AQIBC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\iJCj3AQIBC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\iJCj3AQIBC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\iJCj3AQIBC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\iJCj3AQIBC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\iJCj3AQIBC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\iJCj3AQIBC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\iJCj3AQIBC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\iJCj3AQIBC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\iJCj3AQIBC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\iJCj3AQIBC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\iJCj3AQIBC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\iJCj3AQIBC.exeMemory allocated: D80000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\iJCj3AQIBC.exeMemory allocated: 2EA0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\iJCj3AQIBC.exeMemory allocated: 1AEA0000 memory commit | memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\iJCj3AQIBC.exeThread delayed: delay time: 187000Jump to behavior
          Source: C:\Users\user\Desktop\iJCj3AQIBC.exe TID: 7264Thread sleep time: -187000s >= -30000sJump to behavior
          Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
          Source: C:\Users\user\Desktop\iJCj3AQIBC.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\iJCj3AQIBC.exeThread delayed: delay time: 187000Jump to behavior
          Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
          Source: C:\Users\user\Desktop\iJCj3AQIBC.exeMemory allocated: page read and write | page guardJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: iJCj3AQIBC.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.iJCj3AQIBC.exe.830000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.1345622344.0000000000832000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: iJCj3AQIBC.exe PID: 7260, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: iJCj3AQIBC.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.iJCj3AQIBC.exe.830000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.1345622344.0000000000832000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: iJCj3AQIBC.exe PID: 7260, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
          DLL Side-Loading
          1
          DLL Side-Loading
          1
          Disable or Modify Tools
          OS Credential Dumping31
          Virtualization/Sandbox Evasion
          Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts31
          Virtualization/Sandbox Evasion
          LSASS Memory1
          System Information Discovery
          Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
          DLL Side-Loading
          Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          iJCj3AQIBC.exe96%ReversingLabsByteCode-MSIL.Backdoor.RevengeRAT
          iJCj3AQIBC.exe100%AviraTR/ATRAPS.Gen
          iJCj3AQIBC.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          s-part-0017.t-0009.t-msedge.net
          13.107.246.45
          truefalse
            high
            No contacted IP infos
            Joe Sandbox version:42.0.0 Malachite
            Analysis ID:1588758
            Start date and time:2025-01-11 05:12:14 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 4m 56s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Run name:Run with higher sleep bypass
            Number of analysed new started processes analysed:8
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:iJCj3AQIBC.exe
            renamed because original name is a hash value
            Original Sample Name:88271db3546e63f0b5a769299165d230df7794aea1871f392cef9c074a068e9a.exe
            Detection:MAL
            Classification:mal80.troj.winEXE@1/0@0/0
            EGA Information:Failed
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 3
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
            • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
            • Excluded IPs from analysis (whitelisted): 13.107.246.45, 52.149.20.212
            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net, dns.msftncsi.com, fe3cr.delivery.mp.microsoft.com
            • Execution Graph export aborted for target iJCj3AQIBC.exe, PID 7260 because it is empty
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtQueryValueKey calls found.
            • VT rate limit hit for: iJCj3AQIBC.exe
            No simulations
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            s-part-0017.t-0009.t-msedge.netleUmNO9XPu.exeGet hashmaliciousHawkEye, MailPassViewBrowse
            • 13.107.246.45
            2976587-987347589.08.exeGet hashmaliciousNitolBrowse
            • 13.107.246.45
            of5HklY9qP.exeGet hashmaliciousUnknownBrowse
            • 13.107.246.45
            yMXFgPOdf2.exeGet hashmaliciousGuLoaderBrowse
            • 13.107.246.45
            1dVtYIvfHz.exeGet hashmaliciousUnknownBrowse
            • 13.107.246.45
            FJRUb5lb9m.exeGet hashmaliciousFormBookBrowse
            • 13.107.246.45
            5hD3Yjf7xD.exeGet hashmaliciousAgentTeslaBrowse
            • 13.107.246.45
            02Eh1ah35H.exeGet hashmaliciousGuLoaderBrowse
            • 13.107.246.45
            AJ5zYYsisA.exeGet hashmaliciousUnknownBrowse
            • 13.107.246.45
            suBpo1g13Q.exeGet hashmaliciousFormBookBrowse
            • 13.107.246.45
            No context
            No context
            No context
            No created / dropped files found
            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Entropy (8bit):5.316970965681892
            TrID:
            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
            • Win32 Executable (generic) a (10002005/4) 49.78%
            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
            • Generic Win/DOS Executable (2004/3) 0.01%
            • DOS Executable Generic (2002/1) 0.01%
            File name:iJCj3AQIBC.exe
            File size:17'920 bytes
            MD5:fc3d3b3c17850259571533e6cf2e8880
            SHA1:f4a0c78798da0868741c160326866192be448939
            SHA256:88271db3546e63f0b5a769299165d230df7794aea1871f392cef9c074a068e9a
            SHA512:9b2ca105f21f8e751098efc03bf4501fdb868223116ba455f492491359b9766bd4854537fdbff7a265ab91412e0f00baaa00cf0abb9fe7bc67c1f25f574e419a
            SSDEEP:384:6ClfEbMFEcg53vRPJnMZUCG4A3DBXM0sXu5syswG9:pflFWOUPFt0J
            TLSH:0082196677B9CA12C2FD2B7D486161212734CB5B9611CBAE19D081FB63237D19E807E3
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Wu.g.................B..........^`... ........@.. ....................................@................................
            Icon Hash:00928e8e8686b000
            Entrypoint:0x40605e
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Time Stamp:0x67147557 [Sun Oct 20 03:13:27 2024 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:4
            OS Version Minor:0
            File Version Major:4
            File Version Minor:0
            Subsystem Version Major:4
            Subsystem Version Minor:0
            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
            Instruction
            jmp dword ptr [00402000h]
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x60100x4b.text
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x80000xc.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x20000x40640x4200c5dfa9023ac487ed21dc8db2f4c2c489False0.4745501893939394data5.4871807214154105IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .reloc0x80000xc0x2005db08305553f7d1dca1f43d9c6b13816False0.044921875data0.07763316234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            DLLImport
            mscoree.dll_CorExeMain
            TimestampSource PortDest PortSource IPDest IP
            Jan 11, 2025 05:13:24.649821997 CET6173453192.168.2.91.1.1.1
            Jan 11, 2025 05:13:24.655180931 CET53617341.1.1.1192.168.2.9
            Jan 11, 2025 05:13:24.655272007 CET6173453192.168.2.91.1.1.1
            Jan 11, 2025 05:13:24.660192013 CET53617341.1.1.1192.168.2.9
            Jan 11, 2025 05:13:25.104424953 CET6173453192.168.2.91.1.1.1
            Jan 11, 2025 05:13:25.115307093 CET53617341.1.1.1192.168.2.9
            Jan 11, 2025 05:13:25.115475893 CET6173453192.168.2.91.1.1.1
            TimestampSource PortDest PortSource IPDest IP
            Jan 11, 2025 05:13:24.649378061 CET53570631.1.1.1192.168.2.9
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Jan 11, 2025 05:13:02.743451118 CET1.1.1.1192.168.2.90xaa5No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
            Jan 11, 2025 05:13:02.743451118 CET1.1.1.1192.168.2.90xaa5No error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false

            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Target ID:0
            Start time:23:13:05
            Start date:10/01/2025
            Path:C:\Users\user\Desktop\iJCj3AQIBC.exe
            Wow64 process (32bit):false
            Commandline:"C:\Users\user\Desktop\iJCj3AQIBC.exe"
            Imagebase:0x830000
            File size:17'920 bytes
            MD5 hash:FC3D3B3C17850259571533E6CF2E8880
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_RevengeRAT, Description: Yara detected RevengeRAT, Source: 00000000.00000000.1345622344.0000000000832000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
            Reputation:low
            Has exited:false

            Reset < >
              Memory Dump Source
              • Source File: 00000000.00000002.3202208984.00007FF887D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D60000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff887d60000_iJCj3AQIBC.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9674786acb9e7d5bae21b1571c45fdb602fb34336c628d159ab397f9a400a8e8
              • Instruction ID: ecb09f882c23c66e60b12b078c02bb640ac21ee2733b7538a0f31a9dd176e305
              • Opcode Fuzzy Hash: 9674786acb9e7d5bae21b1571c45fdb602fb34336c628d159ab397f9a400a8e8
              • Instruction Fuzzy Hash: B051B721A1CB854FD395E7788856769BBE2EF5A340F1406FAD04EC76C7DE2CA8058342
              Memory Dump Source
              • Source File: 00000000.00000002.3202208984.00007FF887D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D60000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff887d60000_iJCj3AQIBC.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a315ae064dcbe95772b4e7c58d75d78cb42966a8806b7de8f4658c9a084a048f
              • Instruction ID: 15170c6dd7bc35b62b8f5d167b733eb9de3585dd8dc2ebee1d72c7fdba47376e
              • Opcode Fuzzy Hash: a315ae064dcbe95772b4e7c58d75d78cb42966a8806b7de8f4658c9a084a048f
              • Instruction Fuzzy Hash: 0851C59298EBD64FE39756340C755682FB1AE6318071E01E7D099DF2E7E90D6C0AC3A3
              Memory Dump Source
              • Source File: 00000000.00000002.3202208984.00007FF887D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D60000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff887d60000_iJCj3AQIBC.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3e5cb6efb5e993b8c975dcc1e1f055dcb2bd28031eae245a6ac1fb6961f91378
              • Instruction ID: 3f7717c46ace9b65cd202876f25f0e3d37d5274bbfbbb20f2be9cc18377ded6e
              • Opcode Fuzzy Hash: 3e5cb6efb5e993b8c975dcc1e1f055dcb2bd28031eae245a6ac1fb6961f91378
              • Instruction Fuzzy Hash: 5611936181CAC94EE367AB3484216AD7F64AF13280F0983EBE09EAA097DE187545C343