Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 05:36
Behavioral task
behavioral1
Sample
JaffaCakes118_ca58619fd5de06d3b93040f7c7436887d73bfd11f5d8abc6abaa07fb35fbc454.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_ca58619fd5de06d3b93040f7c7436887d73bfd11f5d8abc6abaa07fb35fbc454.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_ca58619fd5de06d3b93040f7c7436887d73bfd11f5d8abc6abaa07fb35fbc454.exe
-
Size
20KB
-
MD5
126bd8afd4b7c1ad5676e489e7463511
-
SHA1
f08b87f487d7ea75a97ac10a7d995b5e83187f72
-
SHA256
ca58619fd5de06d3b93040f7c7436887d73bfd11f5d8abc6abaa07fb35fbc454
-
SHA512
71a541dcf831a8d0b684356e777beb95dfe838d71c781b92c7128691cd5f9418c30340511891239500e60f2feeed3bb383adc0b212b97a37b40cff9af814bf06
-
SSDEEP
384:cr565ODk2ib/FPK+2tMs4wlmMsq3puy7XY:cr5615D2tMwlXY
Malware Config
Extracted
revengerat
Client
127.0.0.1:333
127.0.0.1:37337
RV_MUTEX
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Revengerat family
-
RevengeRat Executable 1 IoCs
resource yara_rule behavioral2/files/0x0009000000023c02-27.dat revengerat -
Executes dropped EXE 2 IoCs
pid Process 1464 teamviewer.exe 3916 teamviewer.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 2164 set thread context of 3528 2164 JaffaCakes118_ca58619fd5de06d3b93040f7c7436887d73bfd11f5d8abc6abaa07fb35fbc454.exe 82 PID 3528 set thread context of 4572 3528 RegSvcs.exe 83 PID 1464 set thread context of 4424 1464 teamviewer.exe 95 PID 4424 set thread context of 660 4424 RegSvcs.exe 96 PID 3916 set thread context of 3144 3916 teamviewer.exe 101 PID 3144 set thread context of 2880 3144 RegSvcs.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3900 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2164 JaffaCakes118_ca58619fd5de06d3b93040f7c7436887d73bfd11f5d8abc6abaa07fb35fbc454.exe Token: SeDebugPrivilege 3528 RegSvcs.exe Token: SeDebugPrivilege 1464 teamviewer.exe Token: SeDebugPrivilege 4424 RegSvcs.exe Token: SeDebugPrivilege 3916 teamviewer.exe Token: SeDebugPrivilege 3144 RegSvcs.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 2164 wrote to memory of 3528 2164 JaffaCakes118_ca58619fd5de06d3b93040f7c7436887d73bfd11f5d8abc6abaa07fb35fbc454.exe 82 PID 2164 wrote to memory of 3528 2164 JaffaCakes118_ca58619fd5de06d3b93040f7c7436887d73bfd11f5d8abc6abaa07fb35fbc454.exe 82 PID 2164 wrote to memory of 3528 2164 JaffaCakes118_ca58619fd5de06d3b93040f7c7436887d73bfd11f5d8abc6abaa07fb35fbc454.exe 82 PID 2164 wrote to memory of 3528 2164 JaffaCakes118_ca58619fd5de06d3b93040f7c7436887d73bfd11f5d8abc6abaa07fb35fbc454.exe 82 PID 2164 wrote to memory of 3528 2164 JaffaCakes118_ca58619fd5de06d3b93040f7c7436887d73bfd11f5d8abc6abaa07fb35fbc454.exe 82 PID 2164 wrote to memory of 3528 2164 JaffaCakes118_ca58619fd5de06d3b93040f7c7436887d73bfd11f5d8abc6abaa07fb35fbc454.exe 82 PID 2164 wrote to memory of 3528 2164 JaffaCakes118_ca58619fd5de06d3b93040f7c7436887d73bfd11f5d8abc6abaa07fb35fbc454.exe 82 PID 3528 wrote to memory of 4572 3528 RegSvcs.exe 83 PID 3528 wrote to memory of 4572 3528 RegSvcs.exe 83 PID 3528 wrote to memory of 4572 3528 RegSvcs.exe 83 PID 3528 wrote to memory of 4572 3528 RegSvcs.exe 83 PID 3528 wrote to memory of 4572 3528 RegSvcs.exe 83 PID 3528 wrote to memory of 4572 3528 RegSvcs.exe 83 PID 3528 wrote to memory of 4572 3528 RegSvcs.exe 83 PID 3528 wrote to memory of 4572 3528 RegSvcs.exe 83 PID 3528 wrote to memory of 1464 3528 RegSvcs.exe 94 PID 3528 wrote to memory of 1464 3528 RegSvcs.exe 94 PID 1464 wrote to memory of 4424 1464 teamviewer.exe 95 PID 1464 wrote to memory of 4424 1464 teamviewer.exe 95 PID 1464 wrote to memory of 4424 1464 teamviewer.exe 95 PID 1464 wrote to memory of 4424 1464 teamviewer.exe 95 PID 1464 wrote to memory of 4424 1464 teamviewer.exe 95 PID 1464 wrote to memory of 4424 1464 teamviewer.exe 95 PID 1464 wrote to memory of 4424 1464 teamviewer.exe 95 PID 4424 wrote to memory of 660 4424 RegSvcs.exe 96 PID 4424 wrote to memory of 660 4424 RegSvcs.exe 96 PID 4424 wrote to memory of 660 4424 RegSvcs.exe 96 PID 4424 wrote to memory of 660 4424 RegSvcs.exe 96 PID 4424 wrote to memory of 660 4424 RegSvcs.exe 96 PID 4424 wrote to memory of 660 4424 RegSvcs.exe 96 PID 4424 wrote to memory of 660 4424 RegSvcs.exe 96 PID 4424 wrote to memory of 660 4424 RegSvcs.exe 96 PID 4424 wrote to memory of 3900 4424 RegSvcs.exe 98 PID 4424 wrote to memory of 3900 4424 RegSvcs.exe 98 PID 4424 wrote to memory of 3900 4424 RegSvcs.exe 98 PID 3916 wrote to memory of 3144 3916 teamviewer.exe 101 PID 3916 wrote to memory of 3144 3916 teamviewer.exe 101 PID 3916 wrote to memory of 3144 3916 teamviewer.exe 101 PID 3916 wrote to memory of 3144 3916 teamviewer.exe 101 PID 3916 wrote to memory of 3144 3916 teamviewer.exe 101 PID 3916 wrote to memory of 3144 3916 teamviewer.exe 101 PID 3916 wrote to memory of 3144 3916 teamviewer.exe 101 PID 3144 wrote to memory of 2880 3144 RegSvcs.exe 102 PID 3144 wrote to memory of 2880 3144 RegSvcs.exe 102 PID 3144 wrote to memory of 2880 3144 RegSvcs.exe 102 PID 3144 wrote to memory of 2880 3144 RegSvcs.exe 102 PID 3144 wrote to memory of 2880 3144 RegSvcs.exe 102 PID 3144 wrote to memory of 2880 3144 RegSvcs.exe 102 PID 3144 wrote to memory of 2880 3144 RegSvcs.exe 102 PID 3144 wrote to memory of 2880 3144 RegSvcs.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ca58619fd5de06d3b93040f7c7436887d73bfd11f5d8abc6abaa07fb35fbc454.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ca58619fd5de06d3b93040f7c7436887d73bfd11f5d8abc6abaa07fb35fbc454.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4572
-
-
C:\Users\Admin\AppData\Roaming\teamviewer.exe"C:\Users\Admin\AppData\Roaming\teamviewer.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"5⤵
- System Location Discovery: System Language Discovery
PID:660
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "teamviewer" /tr "C:\Users\Admin\AppData\Roaming\teamviewer.exe"5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3900
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\teamviewer.exeC:\Users\Admin\AppData\Roaming\teamviewer.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2880
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
142B
MD58c0458bb9ea02d50565175e38d577e35
SHA1f0b50702cd6470f3c17d637908f83212fdbdb2f2
SHA256c578e86db701b9afa3626e804cf434f9d32272ff59fb32fa9a51835e5a148b53
SHA512804a47494d9a462ffa6f39759480700ecbe5a7f3a15ec3a6330176ed9c04695d2684bf6bf85ab86286d52e7b727436d0bb2e8da96e20d47740b5ce3f856b5d0f
-
Filesize
116B
MD55a6c908109cc2f65cb7a8bfd64bb874e
SHA1268daea3b4b28556e0dded357109b05ef267ce6f
SHA256b7d4593ed79288605f74b410ce344c855251c65ec5cc7ce09f1752eba29b30d6
SHA512f33468a912b296859b211613dae44bada1b004a915356902980a7f58da7765c2b37f0cc44406a9365a4088f50454f5db68db567b46bb4ba47ca530f494b5a91f
-
Filesize
45B
MD501c97a9ee076601d1c5420a013bf3230
SHA1125b4e7f4ea862a632a929ae6c95688f46ddb5d0
SHA2561eaede495cd8133b36ee2667cbd47b070aa59fd4fdb1e7e8b54f341f86193f94
SHA512730854ebb294edf1f10a20150962a6df58b9fdfef498f40aa3c4909b8ed54e3bf292cc2826dd3fc83cd792ffe005a50290af6d94e22b5fbeba10d6f674f17238
-
Filesize
20KB
MD5126bd8afd4b7c1ad5676e489e7463511
SHA1f08b87f487d7ea75a97ac10a7d995b5e83187f72
SHA256ca58619fd5de06d3b93040f7c7436887d73bfd11f5d8abc6abaa07fb35fbc454
SHA51271a541dcf831a8d0b684356e777beb95dfe838d71c781b92c7128691cd5f9418c30340511891239500e60f2feeed3bb383adc0b212b97a37b40cff9af814bf06