Analysis

  • max time kernel
    186s
  • max time network
    204s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-01-2025 00:14

General

  • Target

    SendBlaster Pro Edition v4.4.2 Full Activated.zip

  • Size

    43.1MB

  • MD5

    b1eb24d60ee31ae7f3416d3246b39755

  • SHA1

    277cbc5f5ce0596f6532ed189c64322b2d35fa74

  • SHA256

    d5b1ac3b25761e72ce3213775a37d41505c4cd1adf2f4c25fc806efb04f0500f

  • SHA512

    0ac65cc84dfb685a6169da31bbc8335a2d7c6a22980e4a3856e829209c3c157c30ec2cec0a649bc6b80ae2ee8d29dd89e37fc205f266e40d3d9784b9a1a9550b

  • SSDEEP

    786432:ItpOGxY7c2ps+KjC43AG5lwvbZOF2m9wnJXwTUO72bnsSQ0PEldBF:0pY7ckb831Uzc2m9wnJATKl1kd/

Malware Config

Extracted

Family

revengerat

Botnet

NyanCatRevenge

C2

amazon.capeturk.com:100

Mutex

eea5a83186824927836

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Revengerat family
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\SendBlaster Pro Edition v4.4.2 Full Activated.zip"
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4768
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4348
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\SendBlaster Pro Edition v4.4.2 Full Activated\Readme.txt
      1⤵
        PID:5024
      • C:\Users\Admin\Desktop\SendBlaster Pro Edition v4.4.2 Full Activated\Crack\sendblaster4.exe
        "C:\Users\Admin\Desktop\SendBlaster Pro Edition v4.4.2 Full Activated\Crack\sendblaster4.exe"
        1⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3184
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\SendBlaster Pro Edition v4.4.2 Full Activated\Crack\Keys.txt
        1⤵
          PID:3336
        • C:\Users\Admin\Desktop\SendBlaster Pro Edition v4.4.2 Full Activated\Sendblaster Setup.exe
          "C:\Users\Admin\Desktop\SendBlaster Pro Edition v4.4.2 Full Activated\Sendblaster Setup.exe"
          1⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1020
          • C:\Users\Admin\AppData\Local\Temp\Setup.exe
            "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
            2⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1688
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe
              "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe"
              3⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3100
              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"
                4⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:3876
          • C:\Users\Admin\AppData\Local\Temp\Setup.exe
            "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
            2⤵
            • Executes dropped EXE
            PID:4132
          • C:\Users\Admin\Desktop\SendBlaster Pro Edition v4.4.2 Full Activated\Sendblaster Setup .exe
            "C:\Users\Admin\Desktop\SendBlaster Pro Edition v4.4.2 Full Activated\Sendblaster Setup .exe"
            2⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:3600
            • C:\Windows\SysWOW64\MSIEXEC.EXE
              MSIEXEC.EXE /i "C:\Users\Admin\AppData\Local\Temp\_is645D\sendblaster4.msi" TRANSFORMS="C:\Users\Admin\AppData\Local\Temp\_is645D\1033.MST" SETUPEXEDIR="C:\Users\Admin\Desktop\SendBlaster Pro Edition v4.4.2 Full Activated"
              3⤵
              • Enumerates connected drives
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              PID:1020
        • C:\Windows\system32\NOTEPAD.EXE
          "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\SendBlaster Pro Edition v4.4.2 Full Activated\Readme.txt
          1⤵
            PID:1600
          • C:\Windows\system32\msiexec.exe
            C:\Windows\system32\msiexec.exe /V
            1⤵
            • Enumerates connected drives
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2160
            • C:\Windows\syswow64\MsiExec.exe
              C:\Windows\syswow64\MsiExec.exe -Embedding CEFA00423A7D9A237787581697A68EEF C
              2⤵
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              PID:4952

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\Setup.exe.log

            Filesize

            408B

            MD5

            8e1e19a5abcce21f8a12921d6a2eeeee

            SHA1

            b5704368dfd8fc7aeafb15c23b69895e809fe20e

            SHA256

            22cf24d10cc11a9bb23268f18afbc8f3481c27e1feb4cb42ba5c8775e12720e3

            SHA512

            48365f858592d677ef5d0e2948f672234898e47a153eec32592a2e079353702a64e41e1aa59250f05bd690690b9edfb8455dfac90c6695fb7c0b6907a057fe78

          • C:\Users\Admin\AppData\Local\Temp\MSI18F8.tmp

            Filesize

            80KB

            MD5

            ee3c6890f15356b39a30a3a13472b25b

            SHA1

            5db8d569d3b535608efa5fab89eb197f7bbee26e

            SHA256

            1695cbbfb7add4687249c37f180118d89f5c84739fac6901404f3b80d73fa513

            SHA512

            8d30ef80212e0ae4cb884c1653492fcdbe4bd1326ac12b790c19aadbbd8a14b432ac11cedf587c4dfd3849d685ea0113cf1f3d3b13852e3ec8a4e3ad251d85c4

          • C:\Users\Admin\AppData\Local\Temp\MSI19C4.tmp

            Filesize

            40KB

            MD5

            73f88a86a315ce7e97ff9fbe33c13964

            SHA1

            3524c2d1d0d9e48bcdd634fcdadf2e96d185d4c9

            SHA256

            a1104b6aca5b08d0c1e3b60179bbed417907eda805967d54f380d527c75adf8d

            SHA512

            2989561804026fc10bc312beb403b31c3352585c7e91bb150822d6d1ee09d15b5dd6cf1909e1ffc47cef2dfed1847967a332def90c7d7972ed9f51354be31104

          • C:\Users\Admin\AppData\Local\Temp\Setup.exe

            Filesize

            356KB

            MD5

            fa0b327abd82686bb9d676a30fa89b46

            SHA1

            a5521f5e8e500f67b183542ffad65b83ebcb186f

            SHA256

            d01728070486e1abbf024db0eeeacf232e02fe326c4c0b762af73f728fc9392d

            SHA512

            ead84a6cbe44be5cb213154cf11f8cbe7cc992563549201500f11cf770e3b57b02da027fc982b436f8eebbfa60088f4dad8e10de1086dbb5781b2b3da004790d

          • C:\Users\Admin\AppData\Local\Temp\_is645D\0x0409.ini

            Filesize

            5KB

            MD5

            9f58efec8728c055771284ff8ed08d1f

            SHA1

            afc5cdd023539612f9e333353b05daa7c52529be

            SHA256

            e3bbb08ad52ba0222ab56edf8d2650cf6b1cbdf7c002aba0b6274c9329257b01

            SHA512

            eda026cf7939a015513b0b18b426704927d53db08152f608fdacf6c851227b039fafa0138c88c7c8915d6614b07fcc86becf17d70ffc7d9b4ef48f5d93c11134

          • C:\Users\Admin\AppData\Local\Temp\_is645D\1033.MST

            Filesize

            3KB

            MD5

            1eb4bbb0e86bccf386751a0d42722be5

            SHA1

            890ceac4491ba292a7a248eaf4c93a8b5441fb5d

            SHA256

            fb44fe97a77b072414e58827b94beb8ecb9285d1d06038ec01382ff806099c2f

            SHA512

            0736dae068ee7e0129dacbf0709ac6669d98b35bf21faaea35684f48e19cd0c13bb57e6c5bed1e54a2a3e0051a6041a3b97301add90e75bbac607937d1073b75

          • C:\Users\Admin\AppData\Local\Temp\_is645D\Setup.INI

            Filesize

            1KB

            MD5

            29734aa467258d50ad3793e5a99343b1

            SHA1

            5544e615052f2460f28a67678f28ce74278b2793

            SHA256

            55a58e83aa41e61277f94191a8de8ed2f8fee5cf0c63a4b6db8276ab9861fec5

            SHA512

            624b436c3643827e82635a4bfa77152017f276ee1c882264322b5551ca262c252718d6ac468073597d1f4d81f9a5795d79a8ac7c96571b726127c9a67c9d4dfd

          • C:\Users\Admin\AppData\Local\Temp\_is645D\_ISMSIDEL.INI

            Filesize

            1KB

            MD5

            4d33a93492866d10aa4721893f518fbb

            SHA1

            ceda7e8552e0a53314f479cf1a895b021578faca

            SHA256

            186f8407cf11be20cca89bac348df44424813cd6ca98c2179e3f2f9ec71eb05b

            SHA512

            3635408aec2b032b99d5efd1ec5c1cede44921a82ead538d4a58d977d3d7639cc8408bac12a168f84297486b56cd1ec427a612e4e423354ef70b4d51eb0953ed

          • C:\Users\Admin\AppData\Local\Temp\_is645D\_ISMSIDEL.INI

            Filesize

            1KB

            MD5

            ee962bd0827430d7553dbdd77cd00dc1

            SHA1

            aaab0dd85e3b655e2d300b66a91aa443c94d2c2b

            SHA256

            01df533762e2bf3348e49aa7f62323e20a0e24540de94c70d5a65afa08c0a329

            SHA512

            1d6f9fd9b8f8d36630a18c141cad9244eb6f3b9ffa98813b43cc96841c2f4a8f8c972d0789c4a7a37491cd110475d3c84924704a79e0fd7b04682cbda32407e2

          • C:\Users\Admin\AppData\Local\Temp\_is645D\sendblaster4.msi

            Filesize

            42.9MB

            MD5

            b987cda02227661e13441f5e857ab38c

            SHA1

            0da0d2b812969d94b0af45a3d85978eded41f832

            SHA256

            ca26a192a93b0cfa7952ac84ae8cae7e46e037bd8651be90bf71293f28caac23

            SHA512

            22613bc4dec4da8e13e0c84c294000c61b942991ac892f84ff640b869a4a50403b9f8d100df79acae3833513109117f5809248236401e1ca241d57cda563fbb7

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe

            Filesize

            63KB

            MD5

            d298454882caac154fc9217fc7e90499

            SHA1

            11970a2f8b9d1153fbc7fe925a846bd95e07e96f

            SHA256

            badaa2312457f3d08ca1f72287989456f9e62d6b417af6fb9b5e39ca1e8c8100

            SHA512

            e28a4d7c827b5c816503ddba4fee0bc82b16a0acb2eed9c81b20bb1b043d69b89cd3a1cf2beafb27a2471b6172f707d53e3c90568636b0c65e484e051dfde86f

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe

            Filesize

            256KB

            MD5

            c4e4407b5fcf49586ddd5d5573ae4b95

            SHA1

            0f60aaaaac09d4f9273207114fcc78c0bfb250eb

            SHA256

            8f1e6eb0269fbe449678ce4863d494fda78bc648f27ad1c129270575efce4f7a

            SHA512

            95a89aae7f135b3355f2f0f751607742d8dfa5dfb04bf86cad0fff99d6c687a18a2f0be30d92a79d004cba49823c73f0208f40bb5e9cff3b26f72d1fe5f3d47b

          • C:\Users\Admin\Desktop\SendBlaster Pro Edition v4.4.2 Full Activated\Crack\Keys.txt

            Filesize

            322B

            MD5

            c2a1f4cd3be4a6f1dcb0f94507a774bf

            SHA1

            10e27dc146b73d496e88554ce27622512986106c

            SHA256

            25d912d729d3705e5cc76e66399315a2e37c1a115a1d42968504c468dd20e33f

            SHA512

            5ce4742692a6702970a620236bb1e8ae15b89a8a96ea04af0943b443dbecfb30bcba5e224450fd9b1e7e6d10325adf8ec632e860329f0d34b3aad0a33cb41394

          • C:\Users\Admin\Desktop\SendBlaster Pro Edition v4.4.2 Full Activated\Crack\sendblaster4.exe

            Filesize

            13.3MB

            MD5

            e63d295971421b43438fca8b151f6a9a

            SHA1

            b55ee9c37a573a340407c6bf2f9cb774bf2e9efb

            SHA256

            2b0da63ac42341947e4cd3d328ea1944ad48ae14f909477933c7efcd4a3f2e64

            SHA512

            3dddf727b9e39e7f389852718bc7f4e395c09e8e5a509dd2ae432cad8fd3e85dee9354017add79a82f907efbf3ee6ed043f8648b9db88eb3425e668a5ef36fa0

          • C:\Users\Admin\Desktop\SendBlaster Pro Edition v4.4.2 Full Activated\Readme.txt

            Filesize

            170B

            MD5

            640fabc9199e83873e36ce89b8f922bf

            SHA1

            e925027f8bbb0afe6f4205b1a64ea84149c7bcc4

            SHA256

            caece8822822c0c3b63c95d45ab24a19167004bddaa8740090ab336bd7d1cf8a

            SHA512

            78cc942bb20f883bb73459b6db651711ffef289dd43a87cf0084ef331779881a200ea4f9f1a6197e61755b969bcfdef663512447f38fa4c4e783ed37f8743aca

          • C:\Users\Admin\Desktop\SendBlaster Pro Edition v4.4.2 Full Activated\Sendblaster Setup .exe

            Filesize

            44.2MB

            MD5

            cb35f5035892519e1983e56883f97324

            SHA1

            5db984bda6037424378fb955ffc6003118196e7c

            SHA256

            55fde366d7b5f6ddeaf28db682e6b6b9ee7de95b3f91d6713df78e37c67d51e8

            SHA512

            94fbcae015dd031d18bc833bb8251565a6c6f2752df597840d60e5de977308e38c3eb4b1f05aa855237be26fc8ca2941f882b4c01cc14d75d920af8475e71d2e

          • C:\Users\Admin\Desktop\SendBlaster Pro Edition v4.4.2 Full Activated\Sendblaster Setup.exe

            Filesize

            44.6MB

            MD5

            227915d05ebba701f451ddff34341f8a

            SHA1

            f7f1b90626a41b86c170df89a8734e57b5b1c364

            SHA256

            90a768fd29d2852b719938bb18a0727889a44793cbf64ea77498124746fd6f7d

            SHA512

            1cb6a6680dacc2960574b10f7e9c6c27e735daa38ff5b4e8b7cba2f817770c2d45971be33b42a6ee2ea839cc16be9cfbd689458c9242160912aeb1ba88f4ba0f

          • memory/1020-38-0x000000001EA30000-0x000000001EACC000-memory.dmp

            Filesize

            624KB

          • memory/1020-37-0x000000001E4C0000-0x000000001E98E000-memory.dmp

            Filesize

            4.8MB

          • memory/1020-36-0x000000001DEC0000-0x000000001DF66000-memory.dmp

            Filesize

            664KB

          • memory/3876-353-0x000000001B450000-0x000000001B45A000-memory.dmp

            Filesize

            40KB