Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 17:25
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_66d548d40e897278eca4bd84367f23e0.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_66d548d40e897278eca4bd84367f23e0.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_66d548d40e897278eca4bd84367f23e0.exe
-
Size
602KB
-
MD5
66d548d40e897278eca4bd84367f23e0
-
SHA1
694c13ec8a23055910442f8c256e39b4e7c5596a
-
SHA256
4155858c88f64e8d3ea61255cdc85e33ee36238d897f7371045cac475fa509d8
-
SHA512
c315f0b3e6b04031778a41856115e04521a7d775830527fe5d1fde710687e4473336d392bfae94af97ad494550487bc9e9dde8a386f5dfce01482226ed2a225e
-
SSDEEP
12288:E7lw1DxepPfX9F59l3N8aF7ysgfBnnl2W:E7m1DGFDl3maF7ysgpnncW
Malware Config
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Revengerat family
-
RevengeRat Executable 1 IoCs
resource yara_rule behavioral1/files/0x0008000000017342-10.dat revengerat -
Executes dropped EXE 1 IoCs
pid Process 2128 ocs_v7d.exe -
Loads dropped DLL 2 IoCs
pid Process 2364 JaffaCakes118_66d548d40e897278eca4bd84367f23e0.exe 2364 JaffaCakes118_66d548d40e897278eca4bd84367f23e0.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_66d548d40e897278eca4bd84367f23e0.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2364 JaffaCakes118_66d548d40e897278eca4bd84367f23e0.exe 2128 ocs_v7d.exe 2128 ocs_v7d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2128 2364 JaffaCakes118_66d548d40e897278eca4bd84367f23e0.exe 30 PID 2364 wrote to memory of 2128 2364 JaffaCakes118_66d548d40e897278eca4bd84367f23e0.exe 30 PID 2364 wrote to memory of 2128 2364 JaffaCakes118_66d548d40e897278eca4bd84367f23e0.exe 30 PID 2364 wrote to memory of 2128 2364 JaffaCakes118_66d548d40e897278eca4bd84367f23e0.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_66d548d40e897278eca4bd84367f23e0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_66d548d40e897278eca4bd84367f23e0.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v7d.exeC:\Users\Admin\AppData\Local\Temp\OCS\ocs_v7d.exe -install -3913255 -dcude -d571f616a3b241959137fee958a1f069 - -noJS -eqpdzajjykupcynq -3935042⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27B
MD51b6d927247036009daa251d57c3bb8b2
SHA1a4800bdc168486fc2369ff2c3452a64990ac1c17
SHA2569f7b06f4e98b261d5eade459b05e1193841c9c07bd497d185a978ccd2239fea8
SHA5122638d1c9c27384f9d57cd8071e110690d08d8e7d8d4e6e15dbe14c50a0fcd7086f09fd5097af8ffe914b1016fc6b01e3bd6f302518afc261bd0f047079645525
-
Filesize
292KB
MD50f152d15cd6845999b6fe329e87ca52b
SHA134bcde11a22683ec42f88cf11a55df978a1ca53b
SHA2566b0c155bd3f1129d78dc8e076841211963d05f0ec41db5fbbe28199531f611b2
SHA512966f9388dfc106b1e2aed752ec3b2003ed9dc3371098a349232e9aaa47e7e1a58cbba3a85d95334511ebfebe3a14a4429bb354106de72a592c1b8462ca005a5a