Analysis

  • max time kernel
    147s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    30/05/2024, 02:30

General

  • Target

    82c482f8af3d699aeb51034dc506cd1c_JaffaCakes118.exe

  • Size

    56KB

  • MD5

    82c482f8af3d699aeb51034dc506cd1c

  • SHA1

    1c65ce6be62627ee36db9c1b1d912297e6f99abe

  • SHA256

    e8da9985457f46542b7f8c9c2e48f252f6f0d998223271a1bf073754fda2e8e3

  • SHA512

    6f55468830a5fa9fdf30d12300e3fe71ce9ff48f3ebc1d261d2ef50579b0b1aef4b3aff3cf7b337cf92b9b18bc1fe0de9cc9166fa40f5136dfb7151e0fe62899

  • SSDEEP

    768:Bs+U4zL+fRTtmqOE1UpUrz5bLLgwernMqxNTzFNBvKKU1RkWEy7mELj2T0p:I4PCbOE1UpUn5TextFNlbU1RkUmEt

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • RevengeRat Executable 1 IoCs
  • Drops startup file 8 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\82c482f8af3d699aeb51034dc506cd1c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\82c482f8af3d699aeb51034dc506cd1c_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1228
    • C:\Users\Admin\AppData\Roaming\svnosht.exe
      "C:\Users\Admin\AppData\Roaming\svnosht.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2640
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\gtkrq_am.cmdline"
        3⤵
        • Drops startup file
        • Suspicious use of WriteProcessMemory
        PID:1336
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES250F.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc250E.tmp"
          4⤵
            PID:1840
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /sc minute /mo 1 /tn "svnosht.exe" /tr "C:\Users\Admin\AppData\Roaming\svnosht.exe"
          3⤵
          • Creates scheduled task(s)
          PID:344
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {0FD21FEA-8152-4078-B016-7AF19338AF5F} S-1-5-21-3452737119-3959686427-228443150-1000:QGTQZTRE\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1724
      • C:\Users\Admin\AppData\Roaming\svnosht.exe
        C:\Users\Admin\AppData\Roaming\svnosht.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1612
      • C:\Users\Admin\AppData\Roaming\svnosht.exe
        C:\Users\Admin\AppData\Roaming\svnosht.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:900

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RES250F.tmp

      Filesize

      1KB

      MD5

      582f057cd681bceb004ef69ea8b20f7c

      SHA1

      e6a6f0f51f1c4047a791ac2f6097504ca8c8bb49

      SHA256

      e89ddaaccf5f3de5a7a7151e0faa4e4d594767f344a3cf8782f077c0c5d45437

      SHA512

      c480c479e3bbe7c62a74ab76105c654eb828f70f700728cd03c30beb04590a4619e5c5f58db7110e2d9e80a83195aba5a4dc2aaee77f9a5ffde57d413c5a76eb

    • C:\Users\Admin\AppData\Local\Temp\gtkrq_am.0.vb

      Filesize

      151B

      MD5

      dbc11087af9a5a5bc73f3eec9e1a88bd

      SHA1

      d3a7da895f39e5377aafb2e3a25da4c482f99b67

      SHA256

      058e29b22e8495d1fcdb2ef994b9f6bf276066f5ab89d1d2d658d8945d55254b

      SHA512

      80a37a1b0dae14a673e82f869f170541f301a6c1d0c81842cc0ab5529bc68eb56c46e328a4d659e7d5b8ab9e105fa604b7b03c8f96c1412d39eabfe61939e599

    • C:\Users\Admin\AppData\Local\Temp\gtkrq_am.cmdline

      Filesize

      198B

      MD5

      0ff1dcbecc4bf68698e18ef7eaefa662

      SHA1

      704a752b6fce6eb64dc1f4e143c441acd929b1f3

      SHA256

      6ecdf069f33770da263efacd24a3e4f35d99600e4837463c65166c91e605a4b6

      SHA512

      85b2397e9aa0078ee728cc4cf757138f21e4d2c320127b17500701c0e347d36592ea08555e4c14097d2cfb3282771cee4af1790f2acdb4601a108a282136bf6f

    • C:\Users\Admin\AppData\Local\Temp\vbc250E.tmp

      Filesize

      676B

      MD5

      6c51e75b6e74d5d4c93ad5da8b15790e

      SHA1

      0f2f268d354c03fb11ac6b5548650de793583535

      SHA256

      a646a41cad107940e782bd4ccc785772521bd03851e65684defcc70bcab85995

      SHA512

      b9451ce5d60f4ce3b898cc9f5696d4a2146de5805f4fa36f055eb6a3d2176ec7818c8736712e51f64a4b02af0584ceac5c3f3bcb84918b01e4df0244ff42cbda

    • \Users\Admin\AppData\Roaming\svnosht.exe

      Filesize

      56KB

      MD5

      82c482f8af3d699aeb51034dc506cd1c

      SHA1

      1c65ce6be62627ee36db9c1b1d912297e6f99abe

      SHA256

      e8da9985457f46542b7f8c9c2e48f252f6f0d998223271a1bf073754fda2e8e3

      SHA512

      6f55468830a5fa9fdf30d12300e3fe71ce9ff48f3ebc1d261d2ef50579b0b1aef4b3aff3cf7b337cf92b9b18bc1fe0de9cc9166fa40f5136dfb7151e0fe62899

    • memory/1228-1-0x0000000074740000-0x0000000074CEB000-memory.dmp

      Filesize

      5.7MB

    • memory/1228-2-0x0000000074740000-0x0000000074CEB000-memory.dmp

      Filesize

      5.7MB

    • memory/1228-3-0x0000000074740000-0x0000000074CEB000-memory.dmp

      Filesize

      5.7MB

    • memory/1228-13-0x0000000074740000-0x0000000074CEB000-memory.dmp

      Filesize

      5.7MB

    • memory/1228-0-0x0000000074741000-0x0000000074742000-memory.dmp

      Filesize

      4KB

    • memory/2640-15-0x0000000074740000-0x0000000074CEB000-memory.dmp

      Filesize

      5.7MB

    • memory/2640-18-0x0000000074740000-0x0000000074CEB000-memory.dmp

      Filesize

      5.7MB

    • memory/2640-17-0x0000000074740000-0x0000000074CEB000-memory.dmp

      Filesize

      5.7MB

    • memory/2640-16-0x0000000074740000-0x0000000074CEB000-memory.dmp

      Filesize

      5.7MB