Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 15:38
Static task
static1
Behavioral task
behavioral1
Sample
924b5216f581858cf223149da2273e0a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
924b5216f581858cf223149da2273e0a_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
924b5216f581858cf223149da2273e0a_JaffaCakes118.exe
-
Size
138KB
-
MD5
924b5216f581858cf223149da2273e0a
-
SHA1
05c859484e219e339a7b982725177aa44027c9a6
-
SHA256
741e8c52db85376d5443147e247ee42141cf6920ec197ac71d7e43eee60bd9ec
-
SHA512
6a568362cf6b1fe7ec48ca5f27f1c9ace682f1755e5c6f06228efd907628bb1daf5e6b431adf77d990d68aa97f44c11ce45af74ce85198bdb1249d03999ae979
-
SSDEEP
3072:uR5l0e3tqa3Y2qS4Io8v7W00cwhnK2laNQevCF91moklJZ:9e3AmqSO8KNEXNhv01UlJ
Malware Config
Extracted
revengerat
LimeBuilder
nocbaba1.duckdns.org:81
RV_MUTEX-FZMONFueOciq
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
RevengeRat Executable 1 IoCs
resource yara_rule behavioral2/memory/4292-2-0x00000126A5540000-0x00000126A554C000-memory.dmp revengerat -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 924b5216f581858cf223149da2273e0a_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 924b5216f581858cf223149da2273e0a_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4292 924b5216f581858cf223149da2273e0a_JaffaCakes118.exe