Analysis

  • max time kernel
    125s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/05/2024, 13:39

General

  • Target

    34da8ede6e0b9e07af2a8dd00322a3e9_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    34da8ede6e0b9e07af2a8dd00322a3e9

  • SHA1

    cd03a12801204768043d4ff9b227dab53cc61138

  • SHA256

    15ff1329be3e7d2e9153a0379db6ad0f1253595192764ca9b4ff0e1493559fa4

  • SHA512

    040d7d75d73a7c615de29ac6b245efe9a0f463a536f0b4cbb99057261b17f2cd575f213800c8c6cc8346e2256b152f3c991c007ab533c98f6ff9c4700df23abc

  • SSDEEP

    24576:7q5TfcdHj4fmb02qT0MmV0VMXLG3on1Gx1s4oo5osSxv:7UTsamQxto1no5oB

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • RevengeRat Executable 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\34da8ede6e0b9e07af2a8dd00322a3e9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\34da8ede6e0b9e07af2a8dd00322a3e9_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:528
    • C:\Users\Admin\AppData\Local\Temp\DMR\dmr_72.exe
      "C:\Users\Admin\AppData\Local\Temp\DMR\dmr_72.exe" -install -54456225 -dhtechradar -ba92fb46c63d4c24b4cbf6991664c623 - - -ulkxhotpkfvgqzxx -528
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3292
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3888,i,13281073920029625837,8253721632651544158,262144 --variations-seed-version --mojo-platform-channel-handle=3628 /prefetch:8
    1⤵
      PID:1632

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\DMR\dmr_72.exe

      Filesize

      373KB

      MD5

      7563de18185a34b3717528c1f18f0e60

      SHA1

      4e5e8b54dda603d7e83f3ede2bcdd8064d4edf22

      SHA256

      266b2766df8a91a8baa41ae47b5cbe03e80023516c6c69613ebf956b2574e82d

      SHA512

      2ea8afc613bb175a5399045017f306d12da1d300c443570039937896b66fffa346baaba46d2a7b45817db955fc4d86dc6e658677bfe30ef74355a0cef7ea6cbb

    • C:\Users\Admin\AppData\Local\Temp\DMR\ulkxhotpkfvgqzxx.dat

      Filesize

      69B

      MD5

      e6f681ffe2d111b022583d71517673af

      SHA1

      c6b91ec4b5cadd7cf930e4c03904cd1270b9a082

      SHA256

      03af2e99a85b4e27bbc5c78591548f5e5ae9ed02b42e5174a88bcd91bec69a89

      SHA512

      fe14c2ba30060e3e8e8c087527c1de1d05f73974c3a32fda821911964dd4258e66e48b711b1920cea96a4552218db146d06be95fc59236d76883f638acd74ed4

    • memory/528-0-0x00000000003F0000-0x0000000000666000-memory.dmp

      Filesize

      2.5MB

    • memory/528-20-0x00000000003F0000-0x0000000000666000-memory.dmp

      Filesize

      2.5MB

    • memory/3292-13-0x00007FFE864C3000-0x00007FFE864C5000-memory.dmp

      Filesize

      8KB

    • memory/3292-14-0x0000000000120000-0x0000000000182000-memory.dmp

      Filesize

      392KB

    • memory/3292-16-0x00007FFE864C0000-0x00007FFE86F81000-memory.dmp

      Filesize

      10.8MB

    • memory/3292-17-0x00007FFE864C0000-0x00007FFE86F81000-memory.dmp

      Filesize

      10.8MB

    • memory/3292-18-0x00007FFE864C0000-0x00007FFE86F81000-memory.dmp

      Filesize

      10.8MB

    • memory/3292-19-0x00007FFE864C0000-0x00007FFE86F81000-memory.dmp

      Filesize

      10.8MB

    • memory/3292-22-0x00007FFE864C0000-0x00007FFE86F81000-memory.dmp

      Filesize

      10.8MB