Analysis

  • max time kernel
    134s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2024, 14:18

General

  • Target

    1ce4f9aa121cae10e960ecb824d787b2_JaffaCakes118.exe

  • Size

    1.5MB

  • MD5

    1ce4f9aa121cae10e960ecb824d787b2

  • SHA1

    d659868e019c741bb80dbcf60336277bf759ea2e

  • SHA256

    6d7516fe69e0dd2f9399bd04fecc0fcb3cfc7eb0a87eea799d8f7d8ada1c3400

  • SHA512

    d882ad4d1276062434f81d93ea2e57477f7bb4231fb8256efd3f0a6902d3c4f9880307d8b9bd35cb04a107004e4b2014092f164698fbcf8889c4a60f7059d3f3

  • SSDEEP

    24576:2q5TfcdHj4fmb22qVjzKJ9Ttrd0IT7fify/jdfcFzQJ9TtFM6VRAjdMgI:2UTsamixk5Vjd75+jdI

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • RevengeRat Executable 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1ce4f9aa121cae10e960ecb824d787b2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1ce4f9aa121cae10e960ecb824d787b2_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1760
    • C:\Users\Admin\AppData\Local\Temp\DMR\dmr_72.exe
      "C:\Users\Admin\AppData\Local\Temp\DMR\dmr_72.exe" -install -54492608 -chipderedesign -c57f807d43904bc49cb0d44f6a86defd - -1click -xtgtptwhcpoerivx -1760
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3412

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\DMR\dmr_72.exe

    Filesize

    532KB

    MD5

    e1abe46ef5b6efea85f8dfc3e2978b17

    SHA1

    315c622d3bf2d7c823733dc9d3f007bdc8815fdf

    SHA256

    a014aad7f2e1cc714d15c1a6d56adc15cd7a8733ba304ed408a41d642fc1c79a

    SHA512

    8bf46962f12cca0da7134e158643f2814d0ebcc52f1c8ae650d43af345b5841a74c1378011de75bf39c5fa839176697305748572effd868754d859a008a6a9b8

  • C:\Users\Admin\AppData\Local\Temp\DMR\xtgtptwhcpoerivx.dat

    Filesize

    127B

    MD5

    6d5e5070c62787b051bba9932e86e10b

    SHA1

    6d6335042ec71b3f12ce1f11b2a5f9aba0538b17

    SHA256

    667000dddd4a112fdf9f4da3f5aa3b0e3949b20a973f1cec58c5f8a1017c2621

    SHA512

    0b8213ed0f3f55008fc755fcf8c6fb5b6df84d8e002695fc2ade37c2a73cdc314ef433a0837b881215799e2a4c8915d6221b26ff8991f9a605d8e32133fc3acb

  • memory/1760-0-0x0000000000E50000-0x0000000001166000-memory.dmp

    Filesize

    3.1MB

  • memory/1760-20-0x0000000000E50000-0x0000000001166000-memory.dmp

    Filesize

    3.1MB

  • memory/3412-13-0x00007FFDF4D53000-0x00007FFDF4D55000-memory.dmp

    Filesize

    8KB

  • memory/3412-14-0x0000000000FC0000-0x000000000104C000-memory.dmp

    Filesize

    560KB

  • memory/3412-16-0x00007FFDF4D50000-0x00007FFDF5811000-memory.dmp

    Filesize

    10.8MB

  • memory/3412-17-0x00007FFDF4D50000-0x00007FFDF5811000-memory.dmp

    Filesize

    10.8MB

  • memory/3412-18-0x00007FFDF4D50000-0x00007FFDF5811000-memory.dmp

    Filesize

    10.8MB

  • memory/3412-19-0x00007FFDF4D50000-0x00007FFDF5811000-memory.dmp

    Filesize

    10.8MB

  • memory/3412-22-0x00007FFDF4D50000-0x00007FFDF5811000-memory.dmp

    Filesize

    10.8MB