Analysis
-
max time kernel
147s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 10:31
Static task
static1
Behavioral task
behavioral1
Sample
ce41a9f64a7a779c3e9857fab04eb46d6b157b57ab5a28952589b362150cdd49.ps1
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ce41a9f64a7a779c3e9857fab04eb46d6b157b57ab5a28952589b362150cdd49.ps1
Resource
win10v2004-20240508-en
General
-
Target
ce41a9f64a7a779c3e9857fab04eb46d6b157b57ab5a28952589b362150cdd49.ps1
-
Size
332KB
-
MD5
6d6f56be47f1fd8551249a13ddf6bcb2
-
SHA1
7502ace445cb00f99aaaf2c1ace6cef4d45158fe
-
SHA256
ce41a9f64a7a779c3e9857fab04eb46d6b157b57ab5a28952589b362150cdd49
-
SHA512
ddd5198be281d042ec349d1c26a9399a3cdf803fcb65ae880cc8f23cfffa53ada34f9464e438dfb03087ab40902a1a6d676a1099028e3e0475dddfdb3ad20da6
-
SSDEEP
1536:kG7MA34KtGjNnRm9aTpYlIgayfLyhmyORtjIPxplXCZInfLwbkSOW+69Vu2Ip3vU:z
Malware Config
Extracted
revengerat
MR_ahmed
windowusers.ddns.net:1188
74c924b78701433294
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2324 set thread context of 3008 2324 powershell.exe 29 -
pid Process 2324 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2324 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2324 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2324 wrote to memory of 3008 2324 powershell.exe 29 PID 2324 wrote to memory of 3008 2324 powershell.exe 29 PID 2324 wrote to memory of 3008 2324 powershell.exe 29 PID 2324 wrote to memory of 3008 2324 powershell.exe 29 PID 2324 wrote to memory of 3008 2324 powershell.exe 29 PID 2324 wrote to memory of 3008 2324 powershell.exe 29 PID 2324 wrote to memory of 3008 2324 powershell.exe 29 PID 2324 wrote to memory of 3008 2324 powershell.exe 29 PID 2324 wrote to memory of 3008 2324 powershell.exe 29 PID 2324 wrote to memory of 3008 2324 powershell.exe 29 PID 2324 wrote to memory of 3008 2324 powershell.exe 29 PID 2324 wrote to memory of 3008 2324 powershell.exe 29
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\ce41a9f64a7a779c3e9857fab04eb46d6b157b57ab5a28952589b362150cdd49.ps11⤵
- Suspicious use of SetThreadContext
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:3008
-