Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-12-2024 22:23

General

  • Target

    4e55e69fc8eb24876c73a8d7d518c1587ebb5ee045d2da2dbf4277617c663d1a.exe

  • Size

    938KB

  • MD5

    bb4ad4b9e0ad4477825276b36a07955b

  • SHA1

    3da0c323aca68e43249d23defe77cfd6c89aa8b9

  • SHA256

    4e55e69fc8eb24876c73a8d7d518c1587ebb5ee045d2da2dbf4277617c663d1a

  • SHA512

    3c7af5e58d1af227945d138c54b045714f7581d850b736af8d42d084036357a8f21aa55150b8ac99b52a6e5965beca9eb8ad3820bd27ee6831386e5586dc4466

  • SSDEEP

    12288:e7lw1DxhCe6QhDiT5DQKI4k9n3eaeQkLKaL44nhPysgfBnnl27:e7m1Deej4k9n3eaeB44nhPysgpnnc7

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Revengerat family
  • RevengeRat Executable 1 IoCs
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4e55e69fc8eb24876c73a8d7d518c1587ebb5ee045d2da2dbf4277617c663d1a.exe
    "C:\Users\Admin\AppData\Local\Temp\4e55e69fc8eb24876c73a8d7d518c1587ebb5ee045d2da2dbf4277617c663d1a.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3204
    • C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v71b.exe
      C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v71b.exe -install -59235408 -chipde -095021f7ef184a518aeaa00f83725248 - -BLUB2 -xuctwgdpmdphrzyb -262286
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v71b.exe

    Filesize

    312KB

    MD5

    06e5f4da9fc01e28708ccd62815e56c0

    SHA1

    99f97ad369e8621ab4d17df53e80e60fee99c727

    SHA256

    bdcb135d79ad72c7e7f0e3e6970ffbfb72af697794c953741517f857f6751e80

    SHA512

    6c98a23e2d65db2feef46a96fd811384255838e0bd9ab7122d3206bafe8229c5da3c45de4b578c411da6a03851956133e44a4e8db147b59422d5f017159054eb

  • C:\Users\Admin\AppData\Local\Temp\OCS\xuctwgdpmdphrzyb.dat

    Filesize

    81B

    MD5

    4558a835279bf92229dad8299110237b

    SHA1

    25f95aff9bfa225d808aafa2b73f78868a3c402c

    SHA256

    ed780676b735c81e845b041fd1778b0a96226a5c471bf835268882ccc922e3db

    SHA512

    a8d531790b28026e6dc6f2aa78be1e902c2f2750fb12621f8e5df401431de6788596ef54e5d50675df68511d488dcdc70b1dca5c487481fd64bfb9d05f74735f

  • memory/3044-21-0x00007FFD6EFA0000-0x00007FFD6FA61000-memory.dmp

    Filesize

    10.8MB

  • memory/3044-13-0x00007FFD6EFA0000-0x00007FFD6FA61000-memory.dmp

    Filesize

    10.8MB

  • memory/3044-23-0x000000001AF50000-0x000000001B0F9000-memory.dmp

    Filesize

    1.7MB

  • memory/3044-12-0x00007FFD6EFA0000-0x00007FFD6FA61000-memory.dmp

    Filesize

    10.8MB

  • memory/3044-24-0x000000001AF50000-0x000000001B0F9000-memory.dmp

    Filesize

    1.7MB

  • memory/3044-14-0x00007FFD6EFA0000-0x00007FFD6FA61000-memory.dmp

    Filesize

    10.8MB

  • memory/3044-15-0x00007FFD6EFA0000-0x00007FFD6FA61000-memory.dmp

    Filesize

    10.8MB

  • memory/3044-16-0x00007FFD6EFA3000-0x00007FFD6EFA5000-memory.dmp

    Filesize

    8KB

  • memory/3044-17-0x00007FFD6EFA0000-0x00007FFD6FA61000-memory.dmp

    Filesize

    10.8MB

  • memory/3044-18-0x00007FFD6EFA0000-0x00007FFD6FA61000-memory.dmp

    Filesize

    10.8MB

  • memory/3044-19-0x000000001AF50000-0x000000001B0F9000-memory.dmp

    Filesize

    1.7MB

  • memory/3044-25-0x000000001AF50000-0x000000001B0F9000-memory.dmp

    Filesize

    1.7MB

  • memory/3044-8-0x00007FFD6EFA3000-0x00007FFD6EFA5000-memory.dmp

    Filesize

    8KB

  • memory/3044-22-0x00007FFD6EFA0000-0x00007FFD6FA61000-memory.dmp

    Filesize

    10.8MB

  • memory/3044-11-0x00007FFD6EFA0000-0x00007FFD6FA61000-memory.dmp

    Filesize

    10.8MB

  • memory/3044-9-0x00000000001D0000-0x0000000000226000-memory.dmp

    Filesize

    344KB

  • memory/3044-20-0x00007FFD6EFA0000-0x00007FFD6FA61000-memory.dmp

    Filesize

    10.8MB

  • memory/3044-26-0x00007FFD6EFA0000-0x00007FFD6FA61000-memory.dmp

    Filesize

    10.8MB

  • memory/3044-27-0x000000001AF50000-0x000000001B0F9000-memory.dmp

    Filesize

    1.7MB

  • memory/3044-28-0x00007FFD6EFA0000-0x00007FFD6FA61000-memory.dmp

    Filesize

    10.8MB

  • memory/3044-29-0x000000001AF50000-0x000000001B0F9000-memory.dmp

    Filesize

    1.7MB

  • memory/3044-30-0x000000001AF50000-0x000000001B0F9000-memory.dmp

    Filesize

    1.7MB

  • memory/3044-31-0x000000001AF50000-0x000000001B0F9000-memory.dmp

    Filesize

    1.7MB

  • memory/3044-32-0x000000001AF50000-0x000000001B0F9000-memory.dmp

    Filesize

    1.7MB

  • memory/3044-33-0x000000001AF50000-0x000000001B0F9000-memory.dmp

    Filesize

    1.7MB

  • memory/3044-34-0x000000001AF50000-0x000000001B0F9000-memory.dmp

    Filesize

    1.7MB

  • memory/3044-35-0x000000001AF50000-0x000000001B0F9000-memory.dmp

    Filesize

    1.7MB

  • memory/3044-36-0x000000001AF50000-0x000000001B0F9000-memory.dmp

    Filesize

    1.7MB

  • memory/3044-37-0x000000001AF50000-0x000000001B0F9000-memory.dmp

    Filesize

    1.7MB