Analysis
-
max time kernel
115s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
02-06-2022 13:51
Static task
static1
Behavioral task
behavioral1
Sample
b1313253704746db20556908eea196d8f909f7332a3ff934c57e7385facc2a9a.ps1
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
b1313253704746db20556908eea196d8f909f7332a3ff934c57e7385facc2a9a.ps1
Resource
win10v2004-20220414-en
General
-
Target
b1313253704746db20556908eea196d8f909f7332a3ff934c57e7385facc2a9a.ps1
-
Size
30KB
-
MD5
9c0e668b4ffffb0b2b9348cc0fd100d7
-
SHA1
6b1f8046633b3d4bca139d5601005a1a7b01aa99
-
SHA256
b1313253704746db20556908eea196d8f909f7332a3ff934c57e7385facc2a9a
-
SHA512
c3cfec27f0afd66ffa196679a2d5edd55b81c74dc854f707df188a00f9c8dce31df67843119f957c7788a099708f51c915e918a47ac567b3fc24d5da1d33b14b
Malware Config
Extracted
revengerat
NyanCatRevenge
alice2019.myftp.biz:5050
35dd546fe60c401
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Drops startup file 1 IoCs
Processes:
powershell.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SystemLoginWindows10.vbs powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 2388 set thread context of 2732 2388 powershell.exe AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 2388 powershell.exe 2388 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2388 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
powershell.execsc.exedescription pid process target process PID 2388 wrote to memory of 1312 2388 powershell.exe csc.exe PID 2388 wrote to memory of 1312 2388 powershell.exe csc.exe PID 1312 wrote to memory of 4556 1312 csc.exe cvtres.exe PID 1312 wrote to memory of 4556 1312 csc.exe cvtres.exe PID 2388 wrote to memory of 2732 2388 powershell.exe AppLaunch.exe PID 2388 wrote to memory of 2732 2388 powershell.exe AppLaunch.exe PID 2388 wrote to memory of 2732 2388 powershell.exe AppLaunch.exe PID 2388 wrote to memory of 2732 2388 powershell.exe AppLaunch.exe PID 2388 wrote to memory of 2732 2388 powershell.exe AppLaunch.exe PID 2388 wrote to memory of 2732 2388 powershell.exe AppLaunch.exe PID 2388 wrote to memory of 2732 2388 powershell.exe AppLaunch.exe PID 2388 wrote to memory of 2732 2388 powershell.exe AppLaunch.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\b1313253704746db20556908eea196d8f909f7332a3ff934c57e7385facc2a9a.ps11⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ox1a3ekd\ox1a3ekd.cmdline"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6C8A.tmp" "c:\Users\Admin\AppData\Local\Temp\ox1a3ekd\CSC52DA5C601900492DB87DFC33F4D46DB.TMP"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RES6C8A.tmpFilesize
1KB
MD5df604da4f06a86a1c57362d817ea5aad
SHA1cb52833f6efd70a2624d17765e9fdfbe92b12675
SHA25672c017ddfd86096d353ff0a2d084d1a54cc67217ef432dade5283653fb84b8ba
SHA512a71845ec9bf9b7c06ec067fc96c0ba5909054b205cb6ea0f19eadafd13c1551bf64dd355960c8e9bf9e782fab09eec21de6149dfe25a30fa7085bea55d32f636
-
C:\Users\Admin\AppData\Local\Temp\ox1a3ekd\ox1a3ekd.dllFilesize
13KB
MD5eabab81d93a5bbcb2a0137e13b57e83d
SHA1810b12f64a797d025d14e0a417ef0371f24798db
SHA2564c8819781f306d6e5a97f2f3501b1c6c54fe2eb37a71d1a91de2ca35dadfdfd4
SHA512cd8a416db5727c1e5e57175ee2b42c91f65bb2df6136b4c889d44854b6dcc99de8dea9678515bb2bb2aa5dd5d8d35ace46fc12843a3aac4127f0786332ee87e8
-
\??\c:\Users\Admin\AppData\Local\Temp\ox1a3ekd\CSC52DA5C601900492DB87DFC33F4D46DB.TMPFilesize
652B
MD5525e5e313657dcaefdd16b0dae80e0ef
SHA139e94f9320848ebb046ba16bc6a65e0f412162f3
SHA25694bc595829821516abffafa6c5c160a234a8e45832aa51978010f5e9a0d02f67
SHA512a45335b1d542843c8f4cc0b37ed5b79b18be4171361bc17aba201e3f97d36b8960cc0188c7132a68115624e1fad8474a32c09e003401ea187a473841df675e64
-
\??\c:\Users\Admin\AppData\Local\Temp\ox1a3ekd\ox1a3ekd.0.csFilesize
13KB
MD5e03b1e7ba7f1a53a7e10c0fd9049f437
SHA13bb851a42717eeb588eb7deadfcd04c571c15f41
SHA2563ca2d456cf2f8d781f2134e1481bd787a9cb6f4bcaa2131ebbe0d47a0eb36427
SHA512a098a8e2a60a75357ee202ed4bbe6b86fa7b2ebae30574791e0d13dcf3ee95b841a14b51553c23b95af32a29cc2265afc285b3b0442f0454ea730de4d647383f
-
\??\c:\Users\Admin\AppData\Local\Temp\ox1a3ekd\ox1a3ekd.cmdlineFilesize
327B
MD5608c603ef53c96b5266ea9543533f231
SHA1a79e6cb919d55bcb93b3e0f2bdd6ad39ecffe919
SHA2567a6bbfb06d5f98ee0ed06989effb24fceb6eb85b1bbe3da5a4fea11208b066b6
SHA5121d81bd7b4c2213dbe8230acb0c387d3dc28bffaf51f4938dbda48ebc4e340503325436aae8a0d77570e929ec5597409d6fcc1f08f8ddca0a0ce16587808d3cc2
-
memory/1312-134-0x0000000000000000-mapping.dmp
-
memory/2388-130-0x00000214B6A40000-0x00000214B6A62000-memory.dmpFilesize
136KB
-
memory/2388-133-0x00000214D1AD0000-0x00000214D1FF8000-memory.dmpFilesize
5.2MB
-
memory/2388-132-0x00000214D1520000-0x00000214D1596000-memory.dmpFilesize
472KB
-
memory/2388-131-0x00007FF8A2C90000-0x00007FF8A3751000-memory.dmpFilesize
10.8MB
-
memory/2388-143-0x00007FF8A2C90000-0x00007FF8A3751000-memory.dmpFilesize
10.8MB
-
memory/2732-141-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/2732-142-0x000000000040501E-mapping.dmp
-
memory/2732-144-0x0000000005850000-0x0000000005DF4000-memory.dmpFilesize
5.6MB
-
memory/4556-137-0x0000000000000000-mapping.dmp