Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-09-2024 20:44

General

  • Target

    ee644d5a137decb42ecf02a3659b66c1_JaffaCakes118.exe

  • Size

    46KB

  • MD5

    ee644d5a137decb42ecf02a3659b66c1

  • SHA1

    ed8bd208b88ce90cfc56747396e58ec52c824ec9

  • SHA256

    21df0596cc4b76aae778749e3b1639ba9f4f60cdda0c86e0f20211204954c9ee

  • SHA512

    3d16bc645da0a017c93b2b134ccbca2795b406050aa0c7605a049f1168a062a0270eb5fc558d6dae25481537098dccccad22ed7c2bfab118379c0afb5aa72fa2

  • SSDEEP

    768:Pe1ztwss2KTDLN6aw5lnurQxjIz68yFAr9HzYcCe:AVs2KTDslnurGkzoeBV

Malware Config

Extracted

Family

revengerat

Botnet

VirusCDT

C2

systen32.ddns.net:777

systen32.ddns.net:333

systen32.ddns.net:6000

office365update.duckdns.org:777

office365update.duckdns.org:333

office365update.duckdns.org:6000

Mutex

RV_MUTEX-KJHGjfiTRITIyiuyoiYTItdfigfiyTIUYGKJGHjh

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • RevengeRat Executable 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee644d5a137decb42ecf02a3659b66c1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ee644d5a137decb42ecf02a3659b66c1_JaffaCakes118.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious use of AdjustPrivilegeToken
    PID:2464

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2464-0-0x000007FEF628E000-0x000007FEF628F000-memory.dmp

    Filesize

    4KB

  • memory/2464-1-0x0000000000410000-0x0000000000418000-memory.dmp

    Filesize

    32KB

  • memory/2464-2-0x000007FEF5FD0000-0x000007FEF696D000-memory.dmp

    Filesize

    9.6MB

  • memory/2464-3-0x000007FEF5FD0000-0x000007FEF696D000-memory.dmp

    Filesize

    9.6MB

  • memory/2464-4-0x000007FEF5FD0000-0x000007FEF696D000-memory.dmp

    Filesize

    9.6MB