Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    27-08-2024 05:21

General

  • Target

    c468249e66c3dbbd32bd1532678346b6_JaffaCakes118.ps1

  • Size

    19KB

  • MD5

    c468249e66c3dbbd32bd1532678346b6

  • SHA1

    2ff240eba351216b93518220c83189e1759f987c

  • SHA256

    7b897d3e7ab3c74d79a72101af439a2671edf797d8f4129db9159c99b1a27604

  • SHA512

    80893f40ee5a164fdd21d2d8b925ed362fa389a3dad64440a79b1833f55049515df4d3c2d68b95e8162e9f03cc068973adc949e8883c919ea3804347223b154c

  • SSDEEP

    384:wz0qvq955sm6Ve9yUGCTPaPsOWkEyJ/5Fyp:c9iuVe9z9aUOFEQOp

Malware Config

Extracted

Family

revengerat

Botnet

NyanCatRevenge

C2

masterlovecocacola.ddns.com.br:5552

Mutex

7cb9d57ac45743

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\c468249e66c3dbbd32bd1532678346b6_JaffaCakes118.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2628-4-0x000007FEF61EE000-0x000007FEF61EF000-memory.dmp

    Filesize

    4KB

  • memory/2628-5-0x000000001B6A0000-0x000000001B982000-memory.dmp

    Filesize

    2.9MB

  • memory/2628-6-0x0000000001F70000-0x0000000001F78000-memory.dmp

    Filesize

    32KB

  • memory/2628-7-0x0000000002B10000-0x0000000002B1A000-memory.dmp

    Filesize

    40KB

  • memory/2628-8-0x000007FEF5F30000-0x000007FEF68CD000-memory.dmp

    Filesize

    9.6MB

  • memory/2628-9-0x000007FEF5F30000-0x000007FEF68CD000-memory.dmp

    Filesize

    9.6MB

  • memory/2628-10-0x000007FEF5F30000-0x000007FEF68CD000-memory.dmp

    Filesize

    9.6MB