Analysis

  • max time kernel
    94s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-09-2024 11:59

General

  • Target

    fa5db355d930b96f0e8a17a16eb995a4_JaffaCakes118.exe

  • Size

    566KB

  • MD5

    fa5db355d930b96f0e8a17a16eb995a4

  • SHA1

    c1fd477689b7769dd54460a141001d4a7cfe6ad9

  • SHA256

    16ad6580e3df177aa5c7bdb0a009e630e13800f98f97e9138b384d2f88f5280e

  • SHA512

    5095f61c153da5fcf9158013dfe6b9f9c58b6d7b64f08c2aba385148f22d2cfc1214933882c5a74ec882201f9b5674b067a4483ff2bf19f268938ba210c11ea3

  • SSDEEP

    6144:tKbsiJAXfCElJk12MetPHNaP+HI9ygY0bPmAHw4HFfEysVufBn597NX2L:tDAAXfXlJkEMYNaGU/jQysgfBnnl2L

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • RevengeRat Executable 1 IoCs
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa5db355d930b96f0e8a17a16eb995a4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fa5db355d930b96f0e8a17a16eb995a4_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:756
    • C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v6y.exe
      C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v6y.exe -install -228273 -dcu -c07f7b6842d1455f83f41b817891625a - -hu -goqxdfcojfcmwdfy
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2264

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\OCS\goqxdfcojfcmwdfy.dat

    Filesize

    91B

    MD5

    25678888b10c3e4d58de707877dbd5aa

    SHA1

    ed057f1111b2c19bb40fa1a1bedfed8d967bc1c9

    SHA256

    d51a6a1f606837337ab6c3b8f86e2d023ff75e0d527c3d470c79dd5661d07ffd

    SHA512

    22a5e64c61268c47852f96257f9e552c0dc880701c80feb7cf5594d413655f13597ce825d3e9f7ed97c21c70c7a6e1dfec7758e4ae0e561bdd4f699f14be3531

  • C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v6y.exe

    Filesize

    312KB

    MD5

    e4453576e0680ca18e0cfd2ffad226b0

    SHA1

    988e557e6896f2607b38de46886057f285bf1904

    SHA256

    5c3d2ddc13f7852d5c055cc4c719c5a64522cb04fa7eee730856fc3d5f40b0d4

    SHA512

    9329109c69e1ff0cc486a6d14aa88b3e2092867fd943e6083c5f674479e3cf58fd60a0782e1d2623f4b40a76d5ff280f1252c894591bb0790686e08eecf7aa8a

  • memory/2264-17-0x00007FFD1ABE0000-0x00007FFD1B581000-memory.dmp

    Filesize

    9.6MB

  • memory/2264-18-0x00007FFD1ABE0000-0x00007FFD1B581000-memory.dmp

    Filesize

    9.6MB

  • memory/2264-11-0x000000001BBF0000-0x000000001BC96000-memory.dmp

    Filesize

    664KB

  • memory/2264-12-0x000000001C760000-0x000000001C7FC000-memory.dmp

    Filesize

    624KB

  • memory/2264-13-0x00000000014A0000-0x00000000014A8000-memory.dmp

    Filesize

    32KB

  • memory/2264-10-0x000000001C1F0000-0x000000001C6BE000-memory.dmp

    Filesize

    4.8MB

  • memory/2264-15-0x00007FFD1ABE0000-0x00007FFD1B581000-memory.dmp

    Filesize

    9.6MB

  • memory/2264-16-0x00007FFD1ABE0000-0x00007FFD1B581000-memory.dmp

    Filesize

    9.6MB

  • memory/2264-8-0x00007FFD1AE95000-0x00007FFD1AE96000-memory.dmp

    Filesize

    4KB

  • memory/2264-9-0x00007FFD1ABE0000-0x00007FFD1B581000-memory.dmp

    Filesize

    9.6MB

  • memory/2264-19-0x00007FFD1ABE0000-0x00007FFD1B581000-memory.dmp

    Filesize

    9.6MB

  • memory/2264-20-0x00007FFD1ABE0000-0x00007FFD1B581000-memory.dmp

    Filesize

    9.6MB

  • memory/2264-21-0x00007FFD1ABE0000-0x00007FFD1B581000-memory.dmp

    Filesize

    9.6MB

  • memory/2264-22-0x00007FFD1ABE0000-0x00007FFD1B581000-memory.dmp

    Filesize

    9.6MB

  • memory/2264-23-0x00007FFD1AE95000-0x00007FFD1AE96000-memory.dmp

    Filesize

    4KB

  • memory/2264-24-0x00007FFD1ABE0000-0x00007FFD1B581000-memory.dmp

    Filesize

    9.6MB

  • memory/2264-25-0x00007FFD1ABE0000-0x00007FFD1B581000-memory.dmp

    Filesize

    9.6MB

  • memory/2264-26-0x00007FFD1ABE0000-0x00007FFD1B581000-memory.dmp

    Filesize

    9.6MB

  • memory/2264-27-0x00007FFD1ABE0000-0x00007FFD1B581000-memory.dmp

    Filesize

    9.6MB

  • memory/2264-29-0x00007FFD1ABE0000-0x00007FFD1B581000-memory.dmp

    Filesize

    9.6MB