Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-01-2025 03:39

General

  • Target

    JaffaCakes118_6a01337d6dea1b6b9e16ce6e43e34340.exe

  • Size

    598KB

  • MD5

    6a01337d6dea1b6b9e16ce6e43e34340

  • SHA1

    ab079fa0b39428f98ab20ade4f866ef715ebe9a2

  • SHA256

    b8f90703c52e8e400e9582792477e25e2f18b511cde5612d8f07f02367e49ede

  • SHA512

    663e037f8f5b52770bd7525fba9d41536a648e7dcfd164ba58f01d10b75202b330f891c0edbbcc56c35dc7049a09f73cd5a61730d3a9faa1ec6831dc3319f2f0

  • SSDEEP

    6144:KKWlw1DxDtASIAfCEv2YUMNJlaJuNlK17Y4c83fhysVufBn597NX2XP:K7lw1DxR5zfXeYU43fiysgfBnnl2/

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Revengerat family
  • RevengeRat Executable 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6a01337d6dea1b6b9e16ce6e43e34340.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6a01337d6dea1b6b9e16ce6e43e34340.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2100
    • C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v71a.exe
      C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v71a.exe -install -54389387 -chipde -160a74375bf9401bbf9b1ae893cfc341 - -BLUB1 -lqkhrktpgtdsiewo -524702
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2188

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\OCS\lqkhrktpgtdsiewo.dat

    Filesize

    81B

    MD5

    39adc3d445f89b1e6f091ab1d5685d22

    SHA1

    4c1f54c79b969ccaa72ff0a4856680845643dab5

    SHA256

    8bcf44fe37f9e7baab2fc24b5f7690346cfcf006149cd8d4528648c76e41e8d5

    SHA512

    15f0bade4981763ee8146f6aedb066161025a97b91262c584494ca7b8a3cbd4ddb09d2704756c534ac3e36f63ab0c3436aa5c8c4e07bb6fbb0686784ebfb7536

  • \Users\Admin\AppData\Local\Temp\OCS\ocs_v71a.exe

    Filesize

    288KB

    MD5

    317ec5f92cfbf04a53e8125b66b3b4af

    SHA1

    16068b8977b4dc562ae782d91bc009472667e331

    SHA256

    7612ef3877c3e4e305a6c22941141601b489a73bc088622a40ebd93bee25bae5

    SHA512

    ed772da641a5c128677c4c285c648c1d8e539c34522b95c14f614797bb0d188571c7c257441d45598809aa3f8b4690bd53230282726e077c86c8d9fe71c1db65

  • memory/2188-12-0x000007FEF628E000-0x000007FEF628F000-memory.dmp

    Filesize

    4KB

  • memory/2188-14-0x000007FEF5FD0000-0x000007FEF696D000-memory.dmp

    Filesize

    9.6MB

  • memory/2188-15-0x000007FEF5FD0000-0x000007FEF696D000-memory.dmp

    Filesize

    9.6MB

  • memory/2188-16-0x000007FEF5FD0000-0x000007FEF696D000-memory.dmp

    Filesize

    9.6MB

  • memory/2188-17-0x000007FEF5FD0000-0x000007FEF696D000-memory.dmp

    Filesize

    9.6MB

  • memory/2188-18-0x000007FEF5FD0000-0x000007FEF696D000-memory.dmp

    Filesize

    9.6MB

  • memory/2188-19-0x000007FEF5FD0000-0x000007FEF696D000-memory.dmp

    Filesize

    9.6MB

  • memory/2188-20-0x000007FEF5FD0000-0x000007FEF696D000-memory.dmp

    Filesize

    9.6MB

  • memory/2188-21-0x000007FEF5FD0000-0x000007FEF696D000-memory.dmp

    Filesize

    9.6MB

  • memory/2188-22-0x000007FEF5FD0000-0x000007FEF696D000-memory.dmp

    Filesize

    9.6MB