Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 18:40
Static task
static1
Behavioral task
behavioral1
Sample
a37f2f45a233828e2035f91ec005f365_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a37f2f45a233828e2035f91ec005f365_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a37f2f45a233828e2035f91ec005f365_JaffaCakes118.exe
-
Size
542KB
-
MD5
a37f2f45a233828e2035f91ec005f365
-
SHA1
2b4f730eadd0436b4a00692eef4891396957b3e3
-
SHA256
bb5153cb1dc1c17397679ea865fb6b29120e2c95e5a2e346fe5cfcdc63e8c7ad
-
SHA512
dc818d52e7806c69aa592e844cf0ff0f11c8025281c62e4904f4010c6cfbda3909ebc957e27b12b6a75459cb925d8ade4a31d01525f0363cd6fe274389f80a58
-
SSDEEP
12288:w49XfXlJkE5sDe+RI6Inw3uAGeREkOWW2tZEkbBEkuHgAkfmerAQYgysgfBnnl20:wNE2fXYgysgpnnc0
Malware Config
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Revengerat family
-
RevengeRat Executable 1 IoCs
resource yara_rule behavioral1/files/0x0008000000015d75-10.dat revengerat -
Executes dropped EXE 1 IoCs
pid Process 2196 ocs_v6u.exe -
Loads dropped DLL 2 IoCs
pid Process 2500 a37f2f45a233828e2035f91ec005f365_JaffaCakes118.exe 2500 a37f2f45a233828e2035f91ec005f365_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a37f2f45a233828e2035f91ec005f365_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2500 a37f2f45a233828e2035f91ec005f365_JaffaCakes118.exe 2196 ocs_v6u.exe 2196 ocs_v6u.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2500 wrote to memory of 2196 2500 a37f2f45a233828e2035f91ec005f365_JaffaCakes118.exe 30 PID 2500 wrote to memory of 2196 2500 a37f2f45a233828e2035f91ec005f365_JaffaCakes118.exe 30 PID 2500 wrote to memory of 2196 2500 a37f2f45a233828e2035f91ec005f365_JaffaCakes118.exe 30 PID 2500 wrote to memory of 2196 2500 a37f2f45a233828e2035f91ec005f365_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a37f2f45a233828e2035f91ec005f365_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a37f2f45a233828e2035f91ec005f365_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v6u.exeC:\Users\Admin\AppData\Local\Temp\OCS\ocs_v6u.exe -install -FFpt -proxtubede -9f6149c0b6eb42608234399359b9674f - - -diutocqargcjprka2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2196
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
899B
MD5105d7cdf5bfed8bb2722dc4fbfe1fa60
SHA1966f4abe94a78efe5ed790f662275f82d3ad0ab5
SHA25613376ce26ebb485a1e961e27f4cb8e3e9233bbe3d34373b88b9161b789bb4297
SHA512d5b88c76f8752142664c003d2c789fea8d4d2e41546b331889df2888064fb8d7b11fd2ce66110954c68c568dd523283a94ef3bf50643433d4743e32565bd3bf6
-
Filesize
288KB
MD55449579e336a2bab36ba7eda76ff08b6
SHA151c88959d05e56c412807e15d03696112ba4a02a
SHA256c8dc05bea62487bd3b930add57922a37523900d61011a827ddc8cf576b1d1445
SHA512f0b11e6fd6dd7278c99451d0fd698fff3fbffe6528bd5361e6fc1ca78a40f1989e58be4f7cd68a9309259eb69a53630bb6b2242b731738536431b57156faa97a