Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 07:59
Static task
static1
Behavioral task
behavioral1
Sample
eaa25f5c998000358ae1d0f452165336_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaa25f5c998000358ae1d0f452165336_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
eaa25f5c998000358ae1d0f452165336_JaffaCakes118.exe
-
Size
496KB
-
MD5
eaa25f5c998000358ae1d0f452165336
-
SHA1
346df6eacfadb8a3f2b0a83a4b22d33b8e343f98
-
SHA256
b938e69762a0e79b7131f18ad26aa58ab99c5fae833a2850e53bb2b320da2465
-
SHA512
13ab1e18cf90c3e61126ad98e68fa5e988e67f61d525caedeb56127a38abfbae374559fa63990cf99b459c7a44c2e9485b5cbd1565b2d0dccaca90518fc5c69b
-
SSDEEP
6144:cKQGSCYcMeg5DOD4K16rf0PL56cSyf4/rdD2PDl88888888bYR3Nwf9ysVufBn5y:cbtegBO9P96cStQdOOysgfBnnl2
Malware Config
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Revengerat family
-
RevengeRat Executable 1 IoCs
resource yara_rule behavioral1/files/0x0007000000016033-5.dat revengerat -
Executes dropped EXE 1 IoCs
pid Process 2984 ocs_v5b.exe -
Loads dropped DLL 2 IoCs
pid Process 2384 eaa25f5c998000358ae1d0f452165336_JaffaCakes118.exe 2384 eaa25f5c998000358ae1d0f452165336_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eaa25f5c998000358ae1d0f452165336_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2384 eaa25f5c998000358ae1d0f452165336_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2984 2384 eaa25f5c998000358ae1d0f452165336_JaffaCakes118.exe 30 PID 2384 wrote to memory of 2984 2384 eaa25f5c998000358ae1d0f452165336_JaffaCakes118.exe 30 PID 2384 wrote to memory of 2984 2384 eaa25f5c998000358ae1d0f452165336_JaffaCakes118.exe 30 PID 2384 wrote to memory of 2984 2384 eaa25f5c998000358ae1d0f452165336_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\eaa25f5c998000358ae1d0f452165336_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eaa25f5c998000358ae1d0f452165336_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v5b.exeC:\Users\Admin\AppData\Local\Temp\OCS\ocs_v5b.exe -install -97 -fotofreeware -f09f9fa74eca4b9ea009a679ba0efc64 - -2⤵
- Executes dropped EXE
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD5ca9954dcd8523d48bf10c767d3487038
SHA1908b9bc08dbc53e9a062fa122e526a83428d1d0b
SHA2565357dd74bc72998b6a0d9d50d45913d3d469ee68a68cd583e88d7a27738717f3
SHA512e84ba4a846dab37414ef9798c7a4db4ce0fd994f41494282f230c473e928716eb84bd23221a6b79d8ce753f56c1cc0f9b6b8dea0f6ed3955edad7ae37e4666e6