Analysis

  • max time kernel
    147s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24/05/2024, 10:31

General

  • Target

    ce41a9f64a7a779c3e9857fab04eb46d6b157b57ab5a28952589b362150cdd49.ps1

  • Size

    332KB

  • MD5

    6d6f56be47f1fd8551249a13ddf6bcb2

  • SHA1

    7502ace445cb00f99aaaf2c1ace6cef4d45158fe

  • SHA256

    ce41a9f64a7a779c3e9857fab04eb46d6b157b57ab5a28952589b362150cdd49

  • SHA512

    ddd5198be281d042ec349d1c26a9399a3cdf803fcb65ae880cc8f23cfffa53ada34f9464e438dfb03087ab40902a1a6d676a1099028e3e0475dddfdb3ad20da6

  • SSDEEP

    1536:kG7MA34KtGjNnRm9aTpYlIgayfLyhmyORtjIPxplXCZInfLwbkSOW+69Vu2Ip3vU:z

Malware Config

Extracted

Family

revengerat

Botnet

MR_ahmed

C2

windowusers.ddns.net:1188

Mutex

74c924b78701433294

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Suspicious use of SetThreadContext 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\ce41a9f64a7a779c3e9857fab04eb46d6b157b57ab5a28952589b362150cdd49.ps1
    1⤵
    • Suspicious use of SetThreadContext
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2324
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
        PID:3008

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2324-20-0x0000000002BE0000-0x0000000002BF8000-memory.dmp

      Filesize

      96KB

    • memory/2324-13-0x0000000002BE0000-0x0000000002BF8000-memory.dmp

      Filesize

      96KB

    • memory/2324-8-0x000007FEF5C90000-0x000007FEF662D000-memory.dmp

      Filesize

      9.6MB

    • memory/2324-7-0x000007FEF5C90000-0x000007FEF662D000-memory.dmp

      Filesize

      9.6MB

    • memory/2324-6-0x0000000002790000-0x0000000002798000-memory.dmp

      Filesize

      32KB

    • memory/2324-9-0x000007FEF5C90000-0x000007FEF662D000-memory.dmp

      Filesize

      9.6MB

    • memory/2324-10-0x000007FEF5C90000-0x000007FEF662D000-memory.dmp

      Filesize

      9.6MB

    • memory/2324-11-0x000007FEF5C90000-0x000007FEF662D000-memory.dmp

      Filesize

      9.6MB

    • memory/2324-12-0x0000000002BE0000-0x0000000002C00000-memory.dmp

      Filesize

      128KB

    • memory/2324-14-0x0000000002BE0000-0x0000000002BF8000-memory.dmp

      Filesize

      96KB

    • memory/2324-24-0x0000000002BE0000-0x0000000002BF8000-memory.dmp

      Filesize

      96KB

    • memory/2324-22-0x0000000002BE0000-0x0000000002BF8000-memory.dmp

      Filesize

      96KB

    • memory/2324-18-0x0000000002BE0000-0x0000000002BF8000-memory.dmp

      Filesize

      96KB

    • memory/2324-16-0x0000000002BE0000-0x0000000002BF8000-memory.dmp

      Filesize

      96KB

    • memory/2324-5-0x000000001B6D0000-0x000000001B9B2000-memory.dmp

      Filesize

      2.9MB

    • memory/2324-4-0x000007FEF5F4E000-0x000007FEF5F4F000-memory.dmp

      Filesize

      4KB

    • memory/2324-37-0x000007FEF5C90000-0x000007FEF662D000-memory.dmp

      Filesize

      9.6MB

    • memory/2324-35-0x000007FEF5C90000-0x000007FEF662D000-memory.dmp

      Filesize

      9.6MB

    • memory/3008-32-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/3008-30-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/3008-28-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/3008-26-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/3008-25-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/3008-29-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/3008-27-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/3008-34-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/3008-36-0x00000000745BE000-0x00000000745BF000-memory.dmp

      Filesize

      4KB

    • memory/3008-38-0x00000000745B0000-0x0000000074C9E000-memory.dmp

      Filesize

      6.9MB

    • memory/3008-39-0x00000000745BE000-0x00000000745BF000-memory.dmp

      Filesize

      4KB

    • memory/3008-40-0x00000000745B0000-0x0000000074C9E000-memory.dmp

      Filesize

      6.9MB