Analysis

  • max time kernel
    147s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-09-2024 22:13

General

  • Target

    d08d3da27ef135cfa0d2bafb3da842af_JaffaCakes118.exe

  • Size

    101KB

  • MD5

    d08d3da27ef135cfa0d2bafb3da842af

  • SHA1

    0c6806f2449a8762f6667a8bd8deb2cb6bf40270

  • SHA256

    75909f316e1962762a4fd1d2c6f6f8a2e9678cc2026b57343f9ed9e0380602c8

  • SHA512

    f956632aa5e4921212c12ff1cae05f6150aed4c05e82746b44fe0f6318d110488d79581a1c573a157b0808cdc00654c51acacc942e8d718a4db44c779b0eadda

  • SSDEEP

    768:gxHjjlITm9we8640dIG9RWDv1AG3BlIWs02:gBqTmR

Malware Config

Extracted

Family

revengerat

Botnet

@คนมันเกรียน

C2

127.0.0.1:333

Mutex

f28c837f4bd2

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d08d3da27ef135cfa0d2bafb3da842af_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d08d3da27ef135cfa0d2bafb3da842af_JaffaCakes118.exe"
    1⤵
      PID:2188

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2188-0-0x000007FEF547E000-0x000007FEF547F000-memory.dmp

      Filesize

      4KB

    • memory/2188-1-0x000007FEF51C0000-0x000007FEF5B5D000-memory.dmp

      Filesize

      9.6MB

    • memory/2188-2-0x000007FEF51C0000-0x000007FEF5B5D000-memory.dmp

      Filesize

      9.6MB

    • memory/2188-3-0x00000000004B0000-0x00000000004BA000-memory.dmp

      Filesize

      40KB