Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-12-2024 01:57

General

  • Target

    JaffaCakes118_004e47880c770fa60c79861ed35a9120.exe

  • Size

    600KB

  • MD5

    004e47880c770fa60c79861ed35a9120

  • SHA1

    c0887b5a3c5b6bea83a22d36c992a22f39eb01e2

  • SHA256

    4a66bff9dfec69d49a55da1d3449c1a5faa52555a94945d4a4d9797ab5b660d8

  • SHA512

    1c35b6f0c0908fd839441dc599df96a8ff7af13680a5e7dc6457ee08a2afceb62204ffca581692cc6f73f0d06a36c9c1111659908937558a92570c0a41bd3962

  • SSDEEP

    6144:8KWlw1Dx1MgzK7Yi06sCxVajmzx9S9HNBLlpY4Yi0flysVufBn597NX2c:87lw1Dx2gzaY5MxVaRPKxysgfBnnl2c

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Revengerat family
  • RevengeRat Executable 1 IoCs
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_004e47880c770fa60c79861ed35a9120.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_004e47880c770fa60c79861ed35a9120.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1280
    • C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v8.exe
      C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v8.exe -install -54388859 -chipde -1662a9df3e984c9e861fc9b75480069b - -BLUB1 -tdjckbmhlbbabhue -589920
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1160

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v8.exe

    Filesize

    288KB

    MD5

    f1ac19e315094f6cd302aaa8d47a1890

    SHA1

    7fd3db54264a63c00b3b3894b8f9c76e86215068

    SHA256

    1629b563d90ab134bf38804f489724ed3c6047817ff673b82979444e84c99e9d

    SHA512

    dcdfae6c6568170cfda31f247a9c0a322d924164c79328cdc8e2334c1569436fae34d31e5b78755505529b1aac9cc83f7c7ea38f73eb6e08c076c5c9c9e7b11a

  • C:\Users\Admin\AppData\Local\Temp\OCS\tdjckbmhlbbabhue.dat

    Filesize

    81B

    MD5

    76459c2fa068b7f3abf795ba19ce4861

    SHA1

    5966581b70c927c5f797d6ce97db09536e8a0afd

    SHA256

    052c43be80d678bd022df55ce556a7434035a23cb0c450c6bb9493b5072afc8d

    SHA512

    eb39bf8df79a4d0730f876d8b0d96f9686f432b2c42b63de1bd9b4c4645da8938fdeca58ba75923696ee0930283a6f4835c1431a7ccc097f4979dc77cf4a7c0c

  • memory/1160-12-0x00007FFB25CE0000-0x00007FFB26681000-memory.dmp

    Filesize

    9.6MB

  • memory/1160-16-0x00007FFB25CE0000-0x00007FFB26681000-memory.dmp

    Filesize

    9.6MB

  • memory/1160-10-0x000000001C210000-0x000000001C6DE000-memory.dmp

    Filesize

    4.8MB

  • memory/1160-11-0x000000001BC80000-0x000000001BD26000-memory.dmp

    Filesize

    664KB

  • memory/1160-13-0x000000001C780000-0x000000001C81C000-memory.dmp

    Filesize

    624KB

  • memory/1160-14-0x0000000001600000-0x0000000001608000-memory.dmp

    Filesize

    32KB

  • memory/1160-8-0x00007FFB25F95000-0x00007FFB25F96000-memory.dmp

    Filesize

    4KB

  • memory/1160-9-0x00007FFB25CE0000-0x00007FFB26681000-memory.dmp

    Filesize

    9.6MB

  • memory/1160-17-0x00007FFB25CE0000-0x00007FFB26681000-memory.dmp

    Filesize

    9.6MB

  • memory/1160-18-0x00007FFB25CE0000-0x00007FFB26681000-memory.dmp

    Filesize

    9.6MB

  • memory/1160-19-0x00007FFB25CE0000-0x00007FFB26681000-memory.dmp

    Filesize

    9.6MB

  • memory/1160-20-0x00007FFB25CE0000-0x00007FFB26681000-memory.dmp

    Filesize

    9.6MB

  • memory/1160-21-0x00007FFB25F95000-0x00007FFB25F96000-memory.dmp

    Filesize

    4KB

  • memory/1160-22-0x00007FFB25CE0000-0x00007FFB26681000-memory.dmp

    Filesize

    9.6MB

  • memory/1160-24-0x00007FFB25CE0000-0x00007FFB26681000-memory.dmp

    Filesize

    9.6MB

  • memory/1160-25-0x00007FFB25CE0000-0x00007FFB26681000-memory.dmp

    Filesize

    9.6MB