Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 22:56
Static task
static1
Behavioral task
behavioral1
Sample
acebab38e2cefb85e46de5b50dec7753_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
acebab38e2cefb85e46de5b50dec7753_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
acebab38e2cefb85e46de5b50dec7753_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
acebab38e2cefb85e46de5b50dec7753
-
SHA1
7dcbbd5f115c9d8a8028ebc21a06f45dbaceab08
-
SHA256
2f96b6d5ef6172428479cef8a3d2083438aed499b5d68cb3ce5672e6f661efd6
-
SHA512
d119cabc22dc8cbde7ba9c09af295fc48f3323c3e3b80bdebd326f16fe83cbe96da2692af16c59c6704dd859b4fa345fcf7a19b24f87f40060a5940412419364
-
SSDEEP
24576:bsWDjD9t8+vEoT3ZQcYH/NcfWU5JU8GVadPUhdA1/LG/oQaV+1LVO:bjDXf8+vEoT3u315Uw8sXdA1/L8aA1Y
Malware Config
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
RevengeRat Executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023467-5.dat revengerat -
Executes dropped EXE 1 IoCs
pid Process 4984 muBlinder.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acebab38e2cefb85e46de5b50dec7753_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4984 muBlinder.exe 4984 muBlinder.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 740 wrote to memory of 4984 740 acebab38e2cefb85e46de5b50dec7753_JaffaCakes118.exe 87 PID 740 wrote to memory of 4984 740 acebab38e2cefb85e46de5b50dec7753_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\acebab38e2cefb85e46de5b50dec7753_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\acebab38e2cefb85e46de5b50dec7753_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Users\Admin\AppData\Local\Temp\muBlinder.exe"C:\Users\Admin\AppData\Local\Temp\muBlinder.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD561129b8736077474cf665be845b03bb9
SHA1de42f7e97f7045652edc80bc89ec31369144f3fb
SHA25673b264f2012f0e97fedde037a5cb1dc18076539f77fbeafc142fe8804cd7196d
SHA5124a285030828b1999674911d5c8d760689f1461324f47c12b939b2fe92ee73fd18bc8aa89069c7b505614501cc33911081381040b5e9a1481c3d2f621411b997f