Analysis
-
max time kernel
147s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 21:08
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f4f5ec10baed6ad8a7f824f2a2506a8338db4b7e71815b2f6bf466645dac7245.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_f4f5ec10baed6ad8a7f824f2a2506a8338db4b7e71815b2f6bf466645dac7245.vbs
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_f4f5ec10baed6ad8a7f824f2a2506a8338db4b7e71815b2f6bf466645dac7245.vbs
-
Size
77KB
-
MD5
4e69333b05d347f5383146cb52f2069d
-
SHA1
b20c2dfec1d341e33caab1826ee49cedb2029db6
-
SHA256
f4f5ec10baed6ad8a7f824f2a2506a8338db4b7e71815b2f6bf466645dac7245
-
SHA512
be303a7bcdf7ab9954e025dac326c518c3ac27e5449122fa0e8f729c6c46dc35e993481decbdbc7375f5067dc4ceee4848d576a431fe4056176d7867c9af0a8d
-
SSDEEP
1536:1Jgz0H2SkJmJere42kaI+NiQtRCDKZX9n3jLNYPu:Hgc7
Malware Config
Extracted
revengerat
Client
kimjoy.ddns.net:2021
YX0NUIJIFJ582LY
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Revengerat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Installation.vbs powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Installation.vbs powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4324 set thread context of 2156 4324 powershell.exe 88 -
pid Process 4324 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4324 powershell.exe 4324 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4324 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1332 wrote to memory of 4324 1332 WScript.exe 83 PID 1332 wrote to memory of 4324 1332 WScript.exe 83 PID 4324 wrote to memory of 2692 4324 powershell.exe 86 PID 4324 wrote to memory of 2692 4324 powershell.exe 86 PID 2692 wrote to memory of 2000 2692 csc.exe 87 PID 2692 wrote to memory of 2000 2692 csc.exe 87 PID 4324 wrote to memory of 2156 4324 powershell.exe 88 PID 4324 wrote to memory of 2156 4324 powershell.exe 88 PID 4324 wrote to memory of 2156 4324 powershell.exe 88 PID 4324 wrote to memory of 2156 4324 powershell.exe 88 PID 4324 wrote to memory of 2156 4324 powershell.exe 88 PID 4324 wrote to memory of 2156 4324 powershell.exe 88 PID 4324 wrote to memory of 2156 4324 powershell.exe 88 PID 4324 wrote to memory of 2156 4324 powershell.exe 88
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f4f5ec10baed6ad8a7f824f2a2506a8338db4b7e71815b2f6bf466645dac7245.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EXECUTIONPOLICY REMOTESIGNED -FILE C:\Users\Admin\AppData\Local\Temp\Systray64.PS12⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\zxywy5pw\zxywy5pw.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8AFA.tmp" "c:\Users\Admin\AppData\Local\Temp\zxywy5pw\CSCA3DF6BD07BDA420480E735F33EA5B45.TMP"4⤵PID:2000
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2156
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c1013d058bd1c426c548c5904d759e19
SHA13dc213420d0000f9ac1ca2b2bd57098acb4e2b8e
SHA256f82086bbdbc6387f50930fb3b44c451d626f2a8aef7e0af18d33e5e2a986c84b
SHA51292e0a8857683277fc3492d0924e741614cbdc09cbd4718c08dc4b24bbb66a0af54405a590038ea3a8caa4d26c760111597191c37e571e3f543a01d6ac47d6e53
-
Filesize
51KB
MD538fb9ae219cc70744abe72a8d03de55f
SHA1e200e3264f91ccc900a5f043d6df741c05bca298
SHA2561d3555606bf01f6597609dc4eea06695b8fde77fe886052ed72b60907ca22146
SHA51250a1b3c464e5e6dd1fa1b790de8e964b9f3394450ba6a55e2150a9d0d610e30c1ec49925a37aa57080ce57e2524dbcb1183ebd83531e6a2c0ff3ebf1593bf4b6
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
13KB
MD510212592c22b3193bc070a5aa4cb4497
SHA18210a0315656c94f315cfde78bd0bc505b783d57
SHA256e73caeacca164ed91dbd535a09852975f421dcd9c94331eaa700be986dfc04f9
SHA512ed79875f803dd930b582763b661e4a3e56a1e1c716d1a66f8bef6a5bcdabb635cee9491d121164953dc2c293b9aae59092d3a3a4b5b611821d4a3abdfbe2ab19
-
Filesize
652B
MD5415ef947a00dcab35512b26ab2fcbc7d
SHA19080b9d576edc97d242c984a3d88185952f85b7b
SHA256da367ed290e263bdb98749409a7482fde0e834ff7b1519163fc97be810475cb7
SHA512c906443d4dd6c8ba61ed706d7d63a7ed4a9defa7f9a9dfbae60fa088d8a0264b613a5e1a21072d0407704ee427d29769966c10732e70c0d170839de49fa35874
-
Filesize
13KB
MD5e03b1e7ba7f1a53a7e10c0fd9049f437
SHA13bb851a42717eeb588eb7deadfcd04c571c15f41
SHA2563ca2d456cf2f8d781f2134e1481bd787a9cb6f4bcaa2131ebbe0d47a0eb36427
SHA512a098a8e2a60a75357ee202ed4bbe6b86fa7b2ebae30574791e0d13dcf3ee95b841a14b51553c23b95af32a29cc2265afc285b3b0442f0454ea730de4d647383f
-
Filesize
327B
MD5a59795a2e0b6883979ad4cc3b3cadc1f
SHA10b8ad116f6b4f77a8a6e96889a09e04ca05ddb33
SHA256b4d5e5b7dd8fbf842134748f277f3272aac25bbed7b802bd5005fa370fee4751
SHA512138b32a0ea6293f82a91cc59fe1851366146aba9f8cd4f7e5befa4b18ac58d83eca632457aae462d6312efbedb13e84bd35414f9ebcce48be0e6473af4c99d01