Analysis

  • max time kernel
    144s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23-10-2024 06:41

General

  • Target

    Revenge-RAT v3 - NYANxCAT/Builder.exe

  • Size

    100KB

  • MD5

    be03c752691189795254cebab618c21d

  • SHA1

    cb5feaa0d9ff34a54cfad1297fb784d0929dd9bd

  • SHA256

    313a9d09f096b4eb2efe37e3c0b51268f601c0c9d1ca3508f46769ec89e0594b

  • SHA512

    29f586cf63d3038ea1ada19367a7d96a714a0a9e18d0085fc074f3df319f66f20b58d69360b08095d80ad07d9775000b3aadbeb5784fbe30f36a62ecb8df9841

  • SSDEEP

    3072:sJDNTv7xhz06GXwnTqRGXuuoNTv7xhz0Y:sfTkprTk

Malware Config

Extracted

Family

revengerat

Botnet

NyanCatRevenge

C2

127.0.0.1:333

Mutex

3a6ac9783c3e

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Executes dropped EXE 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 31 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 39 IoCs
  • Suspicious use of SendNotifyMessage 39 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Revenge-RAT v3 - NYANxCAT\Builder.exe
    "C:\Users\Admin\AppData\Local\Temp\Revenge-RAT v3 - NYANxCAT\Builder.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1884
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\11aewgyr\11aewgyr.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2820
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESEEE2.tmp" "c:\Users\Admin\Documents\CSCEEE1.tmp"
        3⤵
          PID:3036
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      1⤵
        PID:2232
      • C:\Users\Admin\Documents\Client.exe
        "C:\Users\Admin\Documents\Client.exe"
        1⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2084
      • C:\Windows\SysWOW64\DllHost.exe
        C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
        1⤵
        • System Location Discovery: System Language Discovery
        PID:2592
      • C:\Windows\system32\taskmgr.exe
        "C:\Windows\system32\taskmgr.exe"
        1⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1788
      • C:\Users\Admin\Documents\Client.exe
        "C:\Users\Admin\Documents\Client.exe"
        1⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2448
      • C:\Users\Admin\Documents\Client.exe
        "C:\Users\Admin\Documents\Client.exe"
        1⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1628

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\RESEEE2.tmp

        Filesize

        1KB

        MD5

        5583c9e1d381e8762b090eec66616d78

        SHA1

        eeef0a0790d9190835f43725eba4663111d1ebb4

        SHA256

        6bff9d18728d6a7af628678d7107bac5d3fc5c4c0733e0fb7fe0121704cddcd7

        SHA512

        fb94f3055e10ecde54407ee7f8e32514465ad60267a8c38dc6e42000d43ed062f6dee212e11a7d7c51b45530dc670aa03fb66826000283f29a8d2e3c74a5763a

      • C:\Users\Admin\Documents\Client.exe

        Filesize

        24KB

        MD5

        798a8394a500da3f3d524d0f8686fdb4

        SHA1

        5cdb6f14ccd4da5291c5618d19b6494b851068a6

        SHA256

        03788a00cf1ce2f697f3d037ab667038a35c023c3f417738eeb499e932f52f76

        SHA512

        6dc102b59abd9578df1682080d0ce87aaaeeddf2a5020e41d4fb8d52913c31257344225bbfd82ad6ac688955d0673f351a51c713a21446bf480e6ab2ab8d2ce2

      • \??\c:\Users\Admin\AppData\Local\Temp\11aewgyr\11aewgyr.0.cs

        Filesize

        21KB

        MD5

        2dcb363b969b7901b58efcc5856b2b4f

        SHA1

        4828eefea04a7682355c4453eab3a1273a3f4cf2

        SHA256

        76cbb8aa269c57bc565561e7b6c486fcf10f2e7c849f20b7b6fe102a0352e68b

        SHA512

        4d0368d4e6663788b9062e2abd2edb3e2be479229d9220b373cac54178c75f6ad8945d14b6f1757da5863679a1ebbf2f27fea778076527d39a84e7a9364f7f75

      • \??\c:\Users\Admin\AppData\Local\Temp\11aewgyr\11aewgyr.cmdline

        Filesize

        287B

        MD5

        893d2d007f21a5c872fd6ced6c8c541e

        SHA1

        360f7a1ca1a8f66435aa1070bce8bcd8c4853d88

        SHA256

        04f99a767049f1d38a14fa3cd4ad4b4e800fee764fc539b7d59580de389cf7bf

        SHA512

        e6f21bb25fb44b1ccb912f0cdea4eb4c3739d2c7c7f33ae554946255d65dafee808b1ab586c24a1f62931b7ebe63205216d28be001669a7316eed6337ce1ee6d

      • \??\c:\Users\Admin\Documents\CSCEEE1.tmp

        Filesize

        644B

        MD5

        23c5f6c5bb4e5de59ec5aa884ea098d3

        SHA1

        7240ba716de1d9ddaa3f9e3a0adcd7e00c4e6a83

        SHA256

        7e090465b6d810c988f61a89f11debded56b4bff54c07369c26ab8afd9e8ba27

        SHA512

        bef35b5af9bb58041f3783a43e85f204a088f44e19168815eea881c2864f9c9038f0e8ba2ab136b6514028e6c22652496cee61fe6dab467b56f0a31809ca1f51

      • memory/1788-25-0x0000000140000000-0x00000001405E8000-memory.dmp

        Filesize

        5.9MB

      • memory/1788-24-0x0000000140000000-0x00000001405E8000-memory.dmp

        Filesize

        5.9MB

      • memory/1788-23-0x0000000140000000-0x00000001405E8000-memory.dmp

        Filesize

        5.9MB

      • memory/1788-22-0x0000000140000000-0x00000001405E8000-memory.dmp

        Filesize

        5.9MB

      • memory/1884-6-0x000000001E770000-0x000000001E780000-memory.dmp

        Filesize

        64KB

      • memory/1884-2-0x000007FEF5280000-0x000007FEF5C6C000-memory.dmp

        Filesize

        9.9MB

      • memory/1884-19-0x000007FEF5280000-0x000007FEF5C6C000-memory.dmp

        Filesize

        9.9MB

      • memory/1884-1-0x0000000001270000-0x000000000128E000-memory.dmp

        Filesize

        120KB

      • memory/1884-0-0x000007FEF5283000-0x000007FEF5284000-memory.dmp

        Filesize

        4KB

      • memory/1884-3-0x000007FEF5280000-0x000007FEF5C6C000-memory.dmp

        Filesize

        9.9MB

      • memory/1884-5-0x000007FEF5280000-0x000007FEF5C6C000-memory.dmp

        Filesize

        9.9MB

      • memory/1884-4-0x000007FEF5283000-0x000007FEF5284000-memory.dmp

        Filesize

        4KB