Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 13:56
Behavioral task
behavioral1
Sample
403b7e75b683a9e62b194aa319b6a89d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
403b7e75b683a9e62b194aa319b6a89d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
403b7e75b683a9e62b194aa319b6a89d_JaffaCakes118.exe
-
Size
268KB
-
MD5
403b7e75b683a9e62b194aa319b6a89d
-
SHA1
46ee35eb4792314d30cf554648c07f8f14683819
-
SHA256
1e5d173cffbdd36f13fcebb3e8be1648606e50196e8b4358fb8635fce8cd9dda
-
SHA512
92314a47ae40731775abb8c899a931cd6f38c8c0150fcc6fc0fc0d3dd5b103313c2a565b3667027e0b61c097595fee85bea309e333512a3241611c22a9819e16
-
SSDEEP
3072:yW7rphkqhtviNz4C6xV3mGnO927SEMWAD+QNNoJ82uzt4:/piG8bs76D+D2i
Malware Config
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
RevengeRat Executable 1 IoCs
resource yara_rule behavioral2/files/0x0009000000023c7c-19.dat revengerat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 403b7e75b683a9e62b194aa319b6a89d_JaffaCakes118.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ICEY2.exe ICEY2.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ICEY2.exe ICEY2.exe -
Executes dropped EXE 2 IoCs
pid Process 2012 ICEY1.exe 4792 ICEY2.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ICEY1.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 4792 ICEY2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4792 ICEY2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4792 ICEY2.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 824 wrote to memory of 2012 824 403b7e75b683a9e62b194aa319b6a89d_JaffaCakes118.exe 86 PID 824 wrote to memory of 2012 824 403b7e75b683a9e62b194aa319b6a89d_JaffaCakes118.exe 86 PID 824 wrote to memory of 2012 824 403b7e75b683a9e62b194aa319b6a89d_JaffaCakes118.exe 86 PID 824 wrote to memory of 4792 824 403b7e75b683a9e62b194aa319b6a89d_JaffaCakes118.exe 87 PID 824 wrote to memory of 4792 824 403b7e75b683a9e62b194aa319b6a89d_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\403b7e75b683a9e62b194aa319b6a89d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\403b7e75b683a9e62b194aa319b6a89d_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Local\Temp\ICEY1.exe"C:\Users\Admin\AppData\Local\Temp\ICEY1.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2012
-
-
C:\Users\Admin\AppData\Local\Temp\ICEY2.exe"C:\Users\Admin\AppData\Local\Temp\ICEY2.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5d30f3c599e5c9a9213bf004ed1572045
SHA137ca6c5e9becbaa39443419b6bfff15c4a9985eb
SHA25635eb1edc8986931f0e2ce98f0c8428adb49e89cab3f3acf9a307619744e97113
SHA5123d59ff4f04e16bb2dbc2213ec8235de56256f802c44c2668e761446fc9f6254da899ad064ff87d64905a51b2875cd67328f047fcbfe14d19676285e2ea746ebe
-
Filesize
192KB
MD57c0c00288fdbf932380027ec426b7024
SHA1dc0d19795d4d1169c72343d37071c9ecf2a7f710
SHA256f21584df80ee11cca8ad36f2108ce50900141dabc59a05cde0fc4cd868389104
SHA512b9792915ce0adef9b8efed8bde71eafaec57ecf2b1c6ef65fd323274d18dc132da76cbe05f05d067a5ecefbef7dd870d5a93b823b71d643ffa041c64e48b311e