Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-11-2024 05:24
Static task
static1
Behavioral task
behavioral1
Sample
ff3c8c522482eee98c32bc9603afe4dad13099c2fb8e8c5a0603ea8b2db03362.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff3c8c522482eee98c32bc9603afe4dad13099c2fb8e8c5a0603ea8b2db03362.exe
Resource
win10v2004-20241007-en
General
-
Target
ff3c8c522482eee98c32bc9603afe4dad13099c2fb8e8c5a0603ea8b2db03362.exe
-
Size
600KB
-
MD5
597e7f369f75fe5a16443f3b3c7f54de
-
SHA1
3be2732c1745731b238148c5d1bbf7cbfd504bac
-
SHA256
ff3c8c522482eee98c32bc9603afe4dad13099c2fb8e8c5a0603ea8b2db03362
-
SHA512
b8701cae2e91e771974a0c7aee147394b624d71b46b52b3b5fffc789a11ed958b873b4b9e1dcf5159964187fde6d2035cb3b1314ddec88802e1801dac63c697d
-
SSDEEP
6144:aKWlw1DxDnASIAfCEv2YUMNJlaJuNlK17Y4c83fhysVufBn597NX2ph:a7lw1DxD5zfXeYU43fiysgfBnnl2ph
Malware Config
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Revengerat family
-
RevengeRat Executable 1 IoCs
Processes:
resource yara_rule behavioral1/files/0x0006000000019229-5.dat revengerat -
Executes dropped EXE 1 IoCs
Processes:
ocs_v71a.exepid Process 1596 ocs_v71a.exe -
Loads dropped DLL 2 IoCs
Processes:
ff3c8c522482eee98c32bc9603afe4dad13099c2fb8e8c5a0603ea8b2db03362.exepid Process 2248 ff3c8c522482eee98c32bc9603afe4dad13099c2fb8e8c5a0603ea8b2db03362.exe 2248 ff3c8c522482eee98c32bc9603afe4dad13099c2fb8e8c5a0603ea8b2db03362.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ff3c8c522482eee98c32bc9603afe4dad13099c2fb8e8c5a0603ea8b2db03362.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff3c8c522482eee98c32bc9603afe4dad13099c2fb8e8c5a0603ea8b2db03362.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
ff3c8c522482eee98c32bc9603afe4dad13099c2fb8e8c5a0603ea8b2db03362.exeocs_v71a.exepid Process 2248 ff3c8c522482eee98c32bc9603afe4dad13099c2fb8e8c5a0603ea8b2db03362.exe 1596 ocs_v71a.exe 1596 ocs_v71a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
ff3c8c522482eee98c32bc9603afe4dad13099c2fb8e8c5a0603ea8b2db03362.exedescription pid Process procid_target PID 2248 wrote to memory of 1596 2248 ff3c8c522482eee98c32bc9603afe4dad13099c2fb8e8c5a0603ea8b2db03362.exe 31 PID 2248 wrote to memory of 1596 2248 ff3c8c522482eee98c32bc9603afe4dad13099c2fb8e8c5a0603ea8b2db03362.exe 31 PID 2248 wrote to memory of 1596 2248 ff3c8c522482eee98c32bc9603afe4dad13099c2fb8e8c5a0603ea8b2db03362.exe 31 PID 2248 wrote to memory of 1596 2248 ff3c8c522482eee98c32bc9603afe4dad13099c2fb8e8c5a0603ea8b2db03362.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff3c8c522482eee98c32bc9603afe4dad13099c2fb8e8c5a0603ea8b2db03362.exe"C:\Users\Admin\AppData\Local\Temp\ff3c8c522482eee98c32bc9603afe4dad13099c2fb8e8c5a0603ea8b2db03362.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v71a.exeC:\Users\Admin\AppData\Local\Temp\OCS\ocs_v71a.exe -install -54383364 -chipde -f90379f0b8db4a66955a8391d2dd3edb - -BLUB1 -nzlehtfobxpefqam -3935582⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1596
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81B
MD5f8a2551280d2240714fa339a96c42797
SHA16c2294d26e7de9b489d6bfd6012f66f8132378a3
SHA256fb3563b426e0b2e5203139a9baf0da92aad0a948cce74b9605f96bef1640636a
SHA512cba134a0d2e971a9942f7f67ba4f2bb29b271fbbafd57d1faff242a6f27288a54b36cd8fdabdbeb568a541fb2c9adab23d608e3a51f80ff095560b5797620630
-
Filesize
288KB
MD5317ec5f92cfbf04a53e8125b66b3b4af
SHA116068b8977b4dc562ae782d91bc009472667e331
SHA2567612ef3877c3e4e305a6c22941141601b489a73bc088622a40ebd93bee25bae5
SHA512ed772da641a5c128677c4c285c648c1d8e539c34522b95c14f614797bb0d188571c7c257441d45598809aa3f8b4690bd53230282726e077c86c8d9fe71c1db65