General
-
Target
937d529200eb2649e1439ddd2171d4f5_JaffaCakes118
-
Size
63KB
-
Sample
240813-rv9djsyenb
-
MD5
937d529200eb2649e1439ddd2171d4f5
-
SHA1
a551b43234854d879d8cdd7f0e8696d55d32b7d9
-
SHA256
2af5fc505458297afd7d8dd4611c03e791b26ba2772517a796431c2d868e3eee
-
SHA512
4b158daa7153597661a25a4f3ad346dbd462bc9496fe6bf9eb3911cf670ba572b9e1ef3166998a2e20b5c9257caa6f57ed683a3ae307c80c8a931240f3c60e1e
-
SSDEEP
768:WkIsGuotaVrL6l4ubFzsjhcv+cerumYeamq19zPN4QVmDVyR8XJBrUIz2T6:qwoTfKFw+hJYeaVbCQVmDVvDwIL
Behavioral task
behavioral1
Sample
937d529200eb2649e1439ddd2171d4f5_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
937d529200eb2649e1439ddd2171d4f5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
937d529200eb2649e1439ddd2171d4f5_JaffaCakes118
-
Size
63KB
-
MD5
937d529200eb2649e1439ddd2171d4f5
-
SHA1
a551b43234854d879d8cdd7f0e8696d55d32b7d9
-
SHA256
2af5fc505458297afd7d8dd4611c03e791b26ba2772517a796431c2d868e3eee
-
SHA512
4b158daa7153597661a25a4f3ad346dbd462bc9496fe6bf9eb3911cf670ba572b9e1ef3166998a2e20b5c9257caa6f57ed683a3ae307c80c8a931240f3c60e1e
-
SSDEEP
768:WkIsGuotaVrL6l4ubFzsjhcv+cerumYeamq19zPN4QVmDVyR8XJBrUIz2T6:qwoTfKFw+hJYeaVbCQVmDVvDwIL
-
RevengeRat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Scripting
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1