Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 20:44
Static task
static1
Behavioral task
behavioral1
Sample
ee644d5a137decb42ecf02a3659b66c1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee644d5a137decb42ecf02a3659b66c1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ee644d5a137decb42ecf02a3659b66c1_JaffaCakes118.exe
-
Size
46KB
-
MD5
ee644d5a137decb42ecf02a3659b66c1
-
SHA1
ed8bd208b88ce90cfc56747396e58ec52c824ec9
-
SHA256
21df0596cc4b76aae778749e3b1639ba9f4f60cdda0c86e0f20211204954c9ee
-
SHA512
3d16bc645da0a017c93b2b134ccbca2795b406050aa0c7605a049f1168a062a0270eb5fc558d6dae25481537098dccccad22ed7c2bfab118379c0afb5aa72fa2
-
SSDEEP
768:Pe1ztwss2KTDLN6aw5lnurQxjIz68yFAr9HzYcCe:AVs2KTDslnurGkzoeBV
Malware Config
Extracted
revengerat
VirusCDT
systen32.ddns.net:777
systen32.ddns.net:333
systen32.ddns.net:6000
office365update.duckdns.org:777
office365update.duckdns.org:333
office365update.duckdns.org:6000
RV_MUTEX-KJHGjfiTRITIyiuyoiYTItdfigfiyTIUYGKJGHjh
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
RevengeRat Executable 1 IoCs
resource yara_rule behavioral1/memory/2464-1-0x0000000000410000-0x0000000000418000-memory.dmp revengerat -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 ee644d5a137decb42ecf02a3659b66c1_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ee644d5a137decb42ecf02a3659b66c1_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2464 ee644d5a137decb42ecf02a3659b66c1_JaffaCakes118.exe