Analysis
-
max time kernel
170s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
19-02-2022 09:01
Static task
static1
Behavioral task
behavioral1
Sample
721e44289afb034e90a67fb97eb5efd4d469bc95ba9863f16aed5e5909c76c61.ps1
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
721e44289afb034e90a67fb97eb5efd4d469bc95ba9863f16aed5e5909c76c61.ps1
Resource
win10v2004-en-20220112
General
-
Target
721e44289afb034e90a67fb97eb5efd4d469bc95ba9863f16aed5e5909c76c61.ps1
-
Size
42KB
-
MD5
2bd198d265d67c9f4021eca5bb341900
-
SHA1
e3559a0d69e988877ce69d66b69cb41619521272
-
SHA256
721e44289afb034e90a67fb97eb5efd4d469bc95ba9863f16aed5e5909c76c61
-
SHA512
fa00e4b59b41ccbe865d342815001262323db96f99ebd30b1a5728111f9959c2e2775a5f279652649505ad23afe7a5551a705c650b985829cd2690f92f50e8f4
Malware Config
Extracted
revengerat
Client
kimjoy.ddns.net:2021
RXQLV8XYTDNHNSA
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 3772 set thread context of 4092 3772 powershell.exe InstallUtil.exe -
Drops file in Windows directory 2 IoCs
Processes:
TiWorker.exedescription ioc process File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
MusNotifyIcon.exedescription ioc process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MusNotifyIcon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MusNotifyIcon.exe -
Modifies data under HKEY_USERS 47 IoCs
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyGroupBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthID = "2" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\InternetConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkUsageBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DownloadMode_BackCompat = "1" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PeerInfoCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadPendingCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthlyUploadRestriction = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCacheHostBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LANConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadPendingCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4028" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "1.282028" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Settings svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLinkLocalBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\GroupConnectionCount = "0" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DODownloadMode = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\FrDownloadRatePct = "90" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadRatePct = "100" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CacheSizeBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4048" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkUsageBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\BkDownloadRatePct = "45" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadCount = "0" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCdnBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CDNConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LinkLocalConnectionCount = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.574714" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.000000" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4052" svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 3772 powershell.exe 3772 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exeTiWorker.exedescription pid process Token: SeDebugPrivilege 3772 powershell.exe Token: SeSecurityPrivilege 1692 TiWorker.exe Token: SeRestorePrivilege 1692 TiWorker.exe Token: SeBackupPrivilege 1692 TiWorker.exe Token: SeBackupPrivilege 1692 TiWorker.exe Token: SeRestorePrivilege 1692 TiWorker.exe Token: SeSecurityPrivilege 1692 TiWorker.exe Token: SeBackupPrivilege 1692 TiWorker.exe Token: SeRestorePrivilege 1692 TiWorker.exe Token: SeSecurityPrivilege 1692 TiWorker.exe Token: SeBackupPrivilege 1692 TiWorker.exe Token: SeRestorePrivilege 1692 TiWorker.exe Token: SeSecurityPrivilege 1692 TiWorker.exe Token: SeBackupPrivilege 1692 TiWorker.exe Token: SeRestorePrivilege 1692 TiWorker.exe Token: SeSecurityPrivilege 1692 TiWorker.exe Token: SeBackupPrivilege 1692 TiWorker.exe Token: SeRestorePrivilege 1692 TiWorker.exe Token: SeSecurityPrivilege 1692 TiWorker.exe Token: SeBackupPrivilege 1692 TiWorker.exe Token: SeRestorePrivilege 1692 TiWorker.exe Token: SeSecurityPrivilege 1692 TiWorker.exe Token: SeBackupPrivilege 1692 TiWorker.exe Token: SeRestorePrivilege 1692 TiWorker.exe Token: SeSecurityPrivilege 1692 TiWorker.exe Token: SeBackupPrivilege 1692 TiWorker.exe Token: SeRestorePrivilege 1692 TiWorker.exe Token: SeSecurityPrivilege 1692 TiWorker.exe Token: SeBackupPrivilege 1692 TiWorker.exe Token: SeRestorePrivilege 1692 TiWorker.exe Token: SeSecurityPrivilege 1692 TiWorker.exe Token: SeBackupPrivilege 1692 TiWorker.exe Token: SeRestorePrivilege 1692 TiWorker.exe Token: SeSecurityPrivilege 1692 TiWorker.exe Token: SeBackupPrivilege 1692 TiWorker.exe Token: SeRestorePrivilege 1692 TiWorker.exe Token: SeSecurityPrivilege 1692 TiWorker.exe Token: SeBackupPrivilege 1692 TiWorker.exe Token: SeRestorePrivilege 1692 TiWorker.exe Token: SeSecurityPrivilege 1692 TiWorker.exe Token: SeBackupPrivilege 1692 TiWorker.exe Token: SeRestorePrivilege 1692 TiWorker.exe Token: SeSecurityPrivilege 1692 TiWorker.exe Token: SeBackupPrivilege 1692 TiWorker.exe Token: SeRestorePrivilege 1692 TiWorker.exe Token: SeSecurityPrivilege 1692 TiWorker.exe Token: SeBackupPrivilege 1692 TiWorker.exe Token: SeRestorePrivilege 1692 TiWorker.exe Token: SeSecurityPrivilege 1692 TiWorker.exe Token: SeBackupPrivilege 1692 TiWorker.exe Token: SeRestorePrivilege 1692 TiWorker.exe Token: SeSecurityPrivilege 1692 TiWorker.exe Token: SeBackupPrivilege 1692 TiWorker.exe Token: SeRestorePrivilege 1692 TiWorker.exe Token: SeSecurityPrivilege 1692 TiWorker.exe Token: SeBackupPrivilege 1692 TiWorker.exe Token: SeRestorePrivilege 1692 TiWorker.exe Token: SeSecurityPrivilege 1692 TiWorker.exe Token: SeBackupPrivilege 1692 TiWorker.exe Token: SeRestorePrivilege 1692 TiWorker.exe Token: SeSecurityPrivilege 1692 TiWorker.exe Token: SeBackupPrivilege 1692 TiWorker.exe Token: SeRestorePrivilege 1692 TiWorker.exe Token: SeSecurityPrivilege 1692 TiWorker.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
powershell.execsc.exedescription pid process target process PID 3772 wrote to memory of 1976 3772 powershell.exe csc.exe PID 3772 wrote to memory of 1976 3772 powershell.exe csc.exe PID 1976 wrote to memory of 448 1976 csc.exe cvtres.exe PID 1976 wrote to memory of 448 1976 csc.exe cvtres.exe PID 3772 wrote to memory of 4092 3772 powershell.exe InstallUtil.exe PID 3772 wrote to memory of 4092 3772 powershell.exe InstallUtil.exe PID 3772 wrote to memory of 4092 3772 powershell.exe InstallUtil.exe PID 3772 wrote to memory of 4092 3772 powershell.exe InstallUtil.exe PID 3772 wrote to memory of 4092 3772 powershell.exe InstallUtil.exe PID 3772 wrote to memory of 4092 3772 powershell.exe InstallUtil.exe PID 3772 wrote to memory of 4092 3772 powershell.exe InstallUtil.exe PID 3772 wrote to memory of 4092 3772 powershell.exe InstallUtil.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\721e44289afb034e90a67fb97eb5efd4d469bc95ba9863f16aed5e5909c76c61.ps11⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\xpa5bkmt\xpa5bkmt.cmdline"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3AD.tmp" "c:\Users\Admin\AppData\Local\Temp\xpa5bkmt\CSC850012BC50E24FF8B177AC36A6D04234.TMP"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
-
C:\Windows\system32\MusNotifyIcon.exe%systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 131⤵
- Checks processor information in registry
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p1⤵
- Modifies data under HKEY_USERS
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RES3AD.tmpMD5
6aa5d156fb38656901f3c1a50a3c91cb
SHA1d56595d2e68e6f585fd987ba61d63f4166e153a9
SHA2562483327ac7adb7979b4a273cadd33b3223e00cb052373cb41e20418f9356b9f1
SHA512d16c8792ad57b3348ff61d05fe762201757fd289de6f5d77b10badc49a65001635444eeec0bfccc66b55b9bd608dec59f1a33f0e330180d18ff7ce3b32b7c711
-
C:\Users\Admin\AppData\Local\Temp\xpa5bkmt\xpa5bkmt.dllMD5
d523f13338db9713b8722335bb007fb3
SHA1d74fb03622279fe2ad0961d157f6eee6e895d2f0
SHA2560015d196b5832a12bf25f5cd848722a20ec485bdd3ee59d6115bded86a848481
SHA512c5ca5cb844bf197c1f9694c5283e5f597b8e629d5edd6f28d14b18e9439ecffcacf338deefd48d41424db0aba10c3f2b5f09ed74fe1c3b4a3e57393bb1a777c6
-
\??\c:\Users\Admin\AppData\Local\Temp\xpa5bkmt\CSC850012BC50E24FF8B177AC36A6D04234.TMPMD5
603ca1b12671c055eb66e17ab235df71
SHA1e48e41c2370909a642c6e3f123fc9d0c2ff4a50b
SHA2568c940f33de26133009069f31f9c2a7d3170761f87236d8172d78a9c869dd0781
SHA5123b2e20140596c770e2a2c09960bde53a03acb0cf8948c0334f7193bcb9abff006c817a2990ed4eea4c9e58ae577abfd265fc90fd3b5410009ab02784c92d5f1d
-
\??\c:\Users\Admin\AppData\Local\Temp\xpa5bkmt\xpa5bkmt.0.csMD5
e03b1e7ba7f1a53a7e10c0fd9049f437
SHA13bb851a42717eeb588eb7deadfcd04c571c15f41
SHA2563ca2d456cf2f8d781f2134e1481bd787a9cb6f4bcaa2131ebbe0d47a0eb36427
SHA512a098a8e2a60a75357ee202ed4bbe6b86fa7b2ebae30574791e0d13dcf3ee95b841a14b51553c23b95af32a29cc2265afc285b3b0442f0454ea730de4d647383f
-
\??\c:\Users\Admin\AppData\Local\Temp\xpa5bkmt\xpa5bkmt.cmdlineMD5
17a20ca49916bfb88c1b6b87241c65df
SHA123f8d0b372c8b69c5f5d141ed2e4e911471225bf
SHA25659445fbab4219517cd5aeeef1f29b15e6d89b1a4bead4cfb59c31373db79624e
SHA512c54965e5f80ee79e1068b7e387ff25cb11d8b808c1ebd45746b6e6a92d26c9a8fc53e1b128c8654b349f0825e43b99c868331a1ddbc673dd43a4a8891ec74273
-
memory/3772-140-0x000002F30A676000-0x000002F30A678000-memory.dmpFilesize
8KB
-
memory/3772-141-0x000002F323E90000-0x000002F323F06000-memory.dmpFilesize
472KB
-
memory/3772-134-0x00007FFB81063000-0x00007FFB81065000-memory.dmpFilesize
8KB
-
memory/3772-137-0x000002F323990000-0x000002F3239B2000-memory.dmpFilesize
136KB
-
memory/3772-136-0x000002F30A670000-0x000002F30A672000-memory.dmpFilesize
8KB
-
memory/3772-135-0x000002F30A673000-0x000002F30A675000-memory.dmpFilesize
8KB
-
memory/4092-147-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/4092-149-0x000000007500E000-0x000000007500F000-memory.dmpFilesize
4KB
-
memory/4092-150-0x0000000005FE0000-0x0000000006584000-memory.dmpFilesize
5.6MB
-
memory/4092-151-0x0000000005A10000-0x0000000005A11000-memory.dmpFilesize
4KB
-
memory/4092-152-0x0000000005B30000-0x0000000005BCC000-memory.dmpFilesize
624KB