Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    26-08-2024 09:34

General

  • Target

    c2baecf8605f3f4a1d399d822206464d_JaffaCakes118.exe

  • Size

    1.3MB

  • MD5

    c2baecf8605f3f4a1d399d822206464d

  • SHA1

    1041b0162ef359650e26c625828d57c360eb3a65

  • SHA256

    1605e1dd442b719f78e32a64c6863ee290dc4caabbad9092d8b593ace9274ea7

  • SHA512

    176de156b6b9639bfdab4390df01a374671b752242409a866cdbda5ac06e0b6cb1d7adfce9d97a466a4797a596f9722a7adcf37b10a8cd36c8cae17e055063c4

  • SSDEEP

    24576:bsTDjD9t8+vEoT3ZQcYH/NcfWU5JU8GVadPUhdA1/LG/oQaV+1LVX:bmDXf8+vEoT3u315Uw8sXdA1/L8aA1N

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • RevengeRat Executable 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c2baecf8605f3f4a1d399d822206464d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c2baecf8605f3f4a1d399d822206464d_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2584
    • C:\Users\Admin\AppData\Local\Temp\muBlinder.exe
      "C:\Users\Admin\AppData\Local\Temp\muBlinder.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2528
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
        dw20.exe -x -s 480
        3⤵
          PID:2420

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Local\Temp\muBlinder.exe

      Filesize

      1.4MB

      MD5

      61129b8736077474cf665be845b03bb9

      SHA1

      de42f7e97f7045652edc80bc89ec31369144f3fb

      SHA256

      73b264f2012f0e97fedde037a5cb1dc18076539f77fbeafc142fe8804cd7196d

      SHA512

      4a285030828b1999674911d5c8d760689f1461324f47c12b939b2fe92ee73fd18bc8aa89069c7b505614501cc33911081381040b5e9a1481c3d2f621411b997f

    • memory/2420-15-0x0000000000560000-0x0000000000561000-memory.dmp

      Filesize

      4KB

    • memory/2420-18-0x0000000000560000-0x0000000000561000-memory.dmp

      Filesize

      4KB

    • memory/2528-11-0x000007FEF6ACE000-0x000007FEF6ACF000-memory.dmp

      Filesize

      4KB

    • memory/2528-12-0x000007FEF6810000-0x000007FEF71AD000-memory.dmp

      Filesize

      9.6MB

    • memory/2528-13-0x000007FEF6810000-0x000007FEF71AD000-memory.dmp

      Filesize

      9.6MB

    • memory/2528-14-0x000007FEF6810000-0x000007FEF71AD000-memory.dmp

      Filesize

      9.6MB

    • memory/2528-16-0x000007FEF6810000-0x000007FEF71AD000-memory.dmp

      Filesize

      9.6MB

    • memory/2528-17-0x000007FEF6ACE000-0x000007FEF6ACF000-memory.dmp

      Filesize

      4KB