Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 23:47
Behavioral task
behavioral1
Sample
JaffaCakes118_5792e1610df899d8fb7564e6fdf5cc5b8cf13162bd17c88b3351009c738d6924.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5792e1610df899d8fb7564e6fdf5cc5b8cf13162bd17c88b3351009c738d6924.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_5792e1610df899d8fb7564e6fdf5cc5b8cf13162bd17c88b3351009c738d6924.exe
-
Size
20KB
-
MD5
c9bc80980cd6b0deaf7d24a0d6c479a8
-
SHA1
7cd003e70561acd1d7792fec9a76ed44d2ffd3e6
-
SHA256
5792e1610df899d8fb7564e6fdf5cc5b8cf13162bd17c88b3351009c738d6924
-
SHA512
7fcd2a7c1a62ddcca3e0e7c05fcfb715009e404d822f3da03c732b6b432cb4c5e5c3248e81259f1eadebbf080dd07c20d9e2add47e0ee2e1d7b42fcbcdaa0484
-
SSDEEP
192:u10ntu2f2k5pKTkyp6aeFknKNM8YB2YhvnklZBldmMs4kblmf+jF9nsa3V5p9EyG:u1N2f2kSb2ivk1lls4almMscDp6ytXY
Malware Config
Extracted
revengerat
Client
127.0.0.1:333
127.0.0.1:37337
RV_MUTEX
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Revengerat family
-
RevengeRat Executable 1 IoCs
resource yara_rule behavioral1/files/0x0004000000004ed7-45.dat revengerat -
Executes dropped EXE 2 IoCs
pid Process 3048 teamviewer.exe 3000 teamviewer.exe -
Loads dropped DLL 2 IoCs
pid Process 2512 RegSvcs.exe 2512 RegSvcs.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 1992 set thread context of 2512 1992 JaffaCakes118_5792e1610df899d8fb7564e6fdf5cc5b8cf13162bd17c88b3351009c738d6924.exe 30 PID 2512 set thread context of 1796 2512 RegSvcs.exe 31 PID 3048 set thread context of 2364 3048 teamviewer.exe 35 PID 2364 set thread context of 2908 2364 RegSvcs.exe 36 PID 3000 set thread context of 444 3000 teamviewer.exe 42 PID 444 set thread context of 684 444 RegSvcs.exe 43 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1496 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1992 JaffaCakes118_5792e1610df899d8fb7564e6fdf5cc5b8cf13162bd17c88b3351009c738d6924.exe Token: SeDebugPrivilege 2512 RegSvcs.exe Token: SeDebugPrivilege 3048 teamviewer.exe Token: SeDebugPrivilege 2364 RegSvcs.exe Token: SeDebugPrivilege 3000 teamviewer.exe Token: SeDebugPrivilege 444 RegSvcs.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2512 1992 JaffaCakes118_5792e1610df899d8fb7564e6fdf5cc5b8cf13162bd17c88b3351009c738d6924.exe 30 PID 1992 wrote to memory of 2512 1992 JaffaCakes118_5792e1610df899d8fb7564e6fdf5cc5b8cf13162bd17c88b3351009c738d6924.exe 30 PID 1992 wrote to memory of 2512 1992 JaffaCakes118_5792e1610df899d8fb7564e6fdf5cc5b8cf13162bd17c88b3351009c738d6924.exe 30 PID 1992 wrote to memory of 2512 1992 JaffaCakes118_5792e1610df899d8fb7564e6fdf5cc5b8cf13162bd17c88b3351009c738d6924.exe 30 PID 1992 wrote to memory of 2512 1992 JaffaCakes118_5792e1610df899d8fb7564e6fdf5cc5b8cf13162bd17c88b3351009c738d6924.exe 30 PID 1992 wrote to memory of 2512 1992 JaffaCakes118_5792e1610df899d8fb7564e6fdf5cc5b8cf13162bd17c88b3351009c738d6924.exe 30 PID 1992 wrote to memory of 2512 1992 JaffaCakes118_5792e1610df899d8fb7564e6fdf5cc5b8cf13162bd17c88b3351009c738d6924.exe 30 PID 1992 wrote to memory of 2512 1992 JaffaCakes118_5792e1610df899d8fb7564e6fdf5cc5b8cf13162bd17c88b3351009c738d6924.exe 30 PID 1992 wrote to memory of 2512 1992 JaffaCakes118_5792e1610df899d8fb7564e6fdf5cc5b8cf13162bd17c88b3351009c738d6924.exe 30 PID 1992 wrote to memory of 2512 1992 JaffaCakes118_5792e1610df899d8fb7564e6fdf5cc5b8cf13162bd17c88b3351009c738d6924.exe 30 PID 1992 wrote to memory of 2512 1992 JaffaCakes118_5792e1610df899d8fb7564e6fdf5cc5b8cf13162bd17c88b3351009c738d6924.exe 30 PID 2512 wrote to memory of 1796 2512 RegSvcs.exe 31 PID 2512 wrote to memory of 1796 2512 RegSvcs.exe 31 PID 2512 wrote to memory of 1796 2512 RegSvcs.exe 31 PID 2512 wrote to memory of 1796 2512 RegSvcs.exe 31 PID 2512 wrote to memory of 1796 2512 RegSvcs.exe 31 PID 2512 wrote to memory of 1796 2512 RegSvcs.exe 31 PID 2512 wrote to memory of 1796 2512 RegSvcs.exe 31 PID 2512 wrote to memory of 1796 2512 RegSvcs.exe 31 PID 2512 wrote to memory of 1796 2512 RegSvcs.exe 31 PID 2512 wrote to memory of 1796 2512 RegSvcs.exe 31 PID 2512 wrote to memory of 1796 2512 RegSvcs.exe 31 PID 2512 wrote to memory of 1796 2512 RegSvcs.exe 31 PID 2512 wrote to memory of 3048 2512 RegSvcs.exe 34 PID 2512 wrote to memory of 3048 2512 RegSvcs.exe 34 PID 2512 wrote to memory of 3048 2512 RegSvcs.exe 34 PID 2512 wrote to memory of 3048 2512 RegSvcs.exe 34 PID 3048 wrote to memory of 2364 3048 teamviewer.exe 35 PID 3048 wrote to memory of 2364 3048 teamviewer.exe 35 PID 3048 wrote to memory of 2364 3048 teamviewer.exe 35 PID 3048 wrote to memory of 2364 3048 teamviewer.exe 35 PID 3048 wrote to memory of 2364 3048 teamviewer.exe 35 PID 3048 wrote to memory of 2364 3048 teamviewer.exe 35 PID 3048 wrote to memory of 2364 3048 teamviewer.exe 35 PID 3048 wrote to memory of 2364 3048 teamviewer.exe 35 PID 3048 wrote to memory of 2364 3048 teamviewer.exe 35 PID 3048 wrote to memory of 2364 3048 teamviewer.exe 35 PID 3048 wrote to memory of 2364 3048 teamviewer.exe 35 PID 2364 wrote to memory of 2908 2364 RegSvcs.exe 36 PID 2364 wrote to memory of 2908 2364 RegSvcs.exe 36 PID 2364 wrote to memory of 2908 2364 RegSvcs.exe 36 PID 2364 wrote to memory of 2908 2364 RegSvcs.exe 36 PID 2364 wrote to memory of 2908 2364 RegSvcs.exe 36 PID 2364 wrote to memory of 2908 2364 RegSvcs.exe 36 PID 2364 wrote to memory of 2908 2364 RegSvcs.exe 36 PID 2364 wrote to memory of 2908 2364 RegSvcs.exe 36 PID 2364 wrote to memory of 2908 2364 RegSvcs.exe 36 PID 2364 wrote to memory of 2908 2364 RegSvcs.exe 36 PID 2364 wrote to memory of 2908 2364 RegSvcs.exe 36 PID 2364 wrote to memory of 2908 2364 RegSvcs.exe 36 PID 2364 wrote to memory of 1496 2364 RegSvcs.exe 38 PID 2364 wrote to memory of 1496 2364 RegSvcs.exe 38 PID 2364 wrote to memory of 1496 2364 RegSvcs.exe 38 PID 2364 wrote to memory of 1496 2364 RegSvcs.exe 38 PID 376 wrote to memory of 3000 376 taskeng.exe 41 PID 376 wrote to memory of 3000 376 taskeng.exe 41 PID 376 wrote to memory of 3000 376 taskeng.exe 41 PID 3000 wrote to memory of 444 3000 teamviewer.exe 42 PID 3000 wrote to memory of 444 3000 teamviewer.exe 42 PID 3000 wrote to memory of 444 3000 teamviewer.exe 42 PID 3000 wrote to memory of 444 3000 teamviewer.exe 42 PID 3000 wrote to memory of 444 3000 teamviewer.exe 42 PID 3000 wrote to memory of 444 3000 teamviewer.exe 42 PID 3000 wrote to memory of 444 3000 teamviewer.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5792e1610df899d8fb7564e6fdf5cc5b8cf13162bd17c88b3351009c738d6924.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5792e1610df899d8fb7564e6fdf5cc5b8cf13162bd17c88b3351009c738d6924.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1796
-
-
C:\Users\Admin\AppData\Roaming\teamviewer.exe"C:\Users\Admin\AppData\Roaming\teamviewer.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"5⤵
- System Location Discovery: System Language Discovery
PID:2908
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "teamviewer" /tr "C:\Users\Admin\AppData\Roaming\teamviewer.exe"5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1496
-
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {2E6C6500-ADE7-40BA-8673-A3CE6AFA5C01} S-1-5-21-3290804112-2823094203-3137964600-1000:VORHPBAB\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Users\Admin\AppData\Roaming\teamviewer.exeC:\Users\Admin\AppData\Roaming\teamviewer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:444 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵
- System Location Discovery: System Language Discovery
PID:684
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116B
MD558667f8708f0cde87aa2cf2624a162fb
SHA109acd79a6d5d0be373c66098ffc641d0630fead3
SHA2569ff0296ff849b4b8659b8b5c97f5ed77cc1b4de9aa1bf8c02be2fc21249d8b6e
SHA512ecc6173cd0c8c61e35e8b1b6c7eb25201d2b1a91fa8058339a530f1cb56aaf630f7c33b7cd842f0bbf03fe18acaac3502ceda298ffa4d3a443286451d2254713
-
Filesize
45B
MD501c97a9ee076601d1c5420a013bf3230
SHA1125b4e7f4ea862a632a929ae6c95688f46ddb5d0
SHA2561eaede495cd8133b36ee2667cbd47b070aa59fd4fdb1e7e8b54f341f86193f94
SHA512730854ebb294edf1f10a20150962a6df58b9fdfef498f40aa3c4909b8ed54e3bf292cc2826dd3fc83cd792ffe005a50290af6d94e22b5fbeba10d6f674f17238
-
Filesize
20KB
MD5c9bc80980cd6b0deaf7d24a0d6c479a8
SHA17cd003e70561acd1d7792fec9a76ed44d2ffd3e6
SHA2565792e1610df899d8fb7564e6fdf5cc5b8cf13162bd17c88b3351009c738d6924
SHA5127fcd2a7c1a62ddcca3e0e7c05fcfb715009e404d822f3da03c732b6b432cb4c5e5c3248e81259f1eadebbf080dd07c20d9e2add47e0ee2e1d7b42fcbcdaa0484