Analysis
-
max time kernel
137s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 01:42
Static task
static1
Behavioral task
behavioral1
Sample
85a0122c26928f1f588472f605cc54e5_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
85a0122c26928f1f588472f605cc54e5_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
85a0122c26928f1f588472f605cc54e5_JaffaCakes118.exe
-
Size
600KB
-
MD5
85a0122c26928f1f588472f605cc54e5
-
SHA1
b7b4f2c36a8327b73aa74ac7ad77d973e8e8206e
-
SHA256
119ef84f802be391316b0e472c8f819a3cd2f7fd751b754bb45f370f35209748
-
SHA512
e79ecc8229b267f1a75d41c182f3d1405e16946215ceb7daaec4f1676a0d0430cd6834e4ca7d74d76d2623616665523cb8014da1b322b4827b2dd8ec8e599aed
-
SSDEEP
12288:57lw1DxHpifX9IiyO9KWz3d7ysgfBnnl2w5:57m1Dw3yO9KWz3lysgpnncs
Malware Config
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
RevengeRat Executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023429-6.dat revengerat -
Executes dropped EXE 1 IoCs
pid Process 2696 ocs_v7f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2696 ocs_v7f.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4928 85a0122c26928f1f588472f605cc54e5_JaffaCakes118.exe 2696 ocs_v7f.exe 2696 ocs_v7f.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4928 wrote to memory of 2696 4928 85a0122c26928f1f588472f605cc54e5_JaffaCakes118.exe 83 PID 4928 wrote to memory of 2696 4928 85a0122c26928f1f588472f605cc54e5_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\85a0122c26928f1f588472f605cc54e5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\85a0122c26928f1f588472f605cc54e5_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v7f.exeC:\Users\Admin\AppData\Local\Temp\OCS\ocs_v7f.exe -install -54389457 -chipde -68bf03d9e7114775830ee28bf2eb6a83 - -ABdetected -bfhwimpsrxfstxun -4588342⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2696
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81B
MD5fcc1d62600f274b321807e7cafd7d36b
SHA12bff99acad7dbbcc8d8d7b4ded597f97e4eb2567
SHA256004b04024447fa6de4ed90a359261029e74d00b21302f8557bd307cdf2bd018e
SHA5124e8eae951d69999d34400c7c1f6d6fd58f7f234e78e890382725f393cd11ee37a24d568689ed5ac49b969d7cf893c8105e0256c00bb8c582584a60d379c31a80
-
Filesize
288KB
MD5ea3ccd42dbdc3500e3888daf53d8ef5d
SHA1848c686280eaa04b172fccffbd312132a0c46172
SHA256cd166eede0e0e5303fc3f5fe5f0dd44999020f116bde2adea15319cc214751b5
SHA5127126ec10c2301354f32f3f813958c61eaef63fe946b804ebd6f5934068b344ab75857886d867373f7a2ccf47f18a5a0f1dbe652e9649963a9fdea2b3de6dba50