Analysis

  • max time kernel
    95s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-01-2025 03:39

General

  • Target

    JaffaCakes118_6a01337d6dea1b6b9e16ce6e43e34340.exe

  • Size

    598KB

  • MD5

    6a01337d6dea1b6b9e16ce6e43e34340

  • SHA1

    ab079fa0b39428f98ab20ade4f866ef715ebe9a2

  • SHA256

    b8f90703c52e8e400e9582792477e25e2f18b511cde5612d8f07f02367e49ede

  • SHA512

    663e037f8f5b52770bd7525fba9d41536a648e7dcfd164ba58f01d10b75202b330f891c0edbbcc56c35dc7049a09f73cd5a61730d3a9faa1ec6831dc3319f2f0

  • SSDEEP

    6144:KKWlw1DxDtASIAfCEv2YUMNJlaJuNlK17Y4c83fhysVufBn597NX2XP:K7lw1DxR5zfXeYU43fiysgfBnnl2/

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Revengerat family
  • RevengeRat Executable 1 IoCs
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6a01337d6dea1b6b9e16ce6e43e34340.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6a01337d6dea1b6b9e16ce6e43e34340.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4456
    • C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v71a.exe
      C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v71a.exe -install -54389387 -chipde -160a74375bf9401bbf9b1ae893cfc341 - -BLUB1 -ptfobwnwnouiqxvg -327826
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:5000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v71a.exe

    Filesize

    288KB

    MD5

    317ec5f92cfbf04a53e8125b66b3b4af

    SHA1

    16068b8977b4dc562ae782d91bc009472667e331

    SHA256

    7612ef3877c3e4e305a6c22941141601b489a73bc088622a40ebd93bee25bae5

    SHA512

    ed772da641a5c128677c4c285c648c1d8e539c34522b95c14f614797bb0d188571c7c257441d45598809aa3f8b4690bd53230282726e077c86c8d9fe71c1db65

  • C:\Users\Admin\AppData\Local\Temp\OCS\ptfobwnwnouiqxvg.dat

    Filesize

    81B

    MD5

    39adc3d445f89b1e6f091ab1d5685d22

    SHA1

    4c1f54c79b969ccaa72ff0a4856680845643dab5

    SHA256

    8bcf44fe37f9e7baab2fc24b5f7690346cfcf006149cd8d4528648c76e41e8d5

    SHA512

    15f0bade4981763ee8146f6aedb066161025a97b91262c584494ca7b8a3cbd4ddb09d2704756c534ac3e36f63ab0c3436aa5c8c4e07bb6fbb0686784ebfb7536

  • memory/5000-11-0x00007FF9932A0000-0x00007FF993C41000-memory.dmp

    Filesize

    9.6MB

  • memory/5000-18-0x00007FF9932A0000-0x00007FF993C41000-memory.dmp

    Filesize

    9.6MB

  • memory/5000-10-0x000000001BF10000-0x000000001C3DE000-memory.dmp

    Filesize

    4.8MB

  • memory/5000-12-0x000000001C3E0000-0x000000001C486000-memory.dmp

    Filesize

    664KB

  • memory/5000-13-0x000000001C540000-0x000000001C5DC000-memory.dmp

    Filesize

    624KB

  • memory/5000-14-0x0000000001460000-0x0000000001468000-memory.dmp

    Filesize

    32KB

  • memory/5000-8-0x00007FF993555000-0x00007FF993556000-memory.dmp

    Filesize

    4KB

  • memory/5000-16-0x00007FF9932A0000-0x00007FF993C41000-memory.dmp

    Filesize

    9.6MB

  • memory/5000-17-0x00007FF9932A0000-0x00007FF993C41000-memory.dmp

    Filesize

    9.6MB

  • memory/5000-9-0x00007FF9932A0000-0x00007FF993C41000-memory.dmp

    Filesize

    9.6MB

  • memory/5000-19-0x00007FF9932A0000-0x00007FF993C41000-memory.dmp

    Filesize

    9.6MB

  • memory/5000-20-0x00007FF9932A0000-0x00007FF993C41000-memory.dmp

    Filesize

    9.6MB

  • memory/5000-21-0x00007FF9932A0000-0x00007FF993C41000-memory.dmp

    Filesize

    9.6MB

  • memory/5000-22-0x00007FF993555000-0x00007FF993556000-memory.dmp

    Filesize

    4KB

  • memory/5000-23-0x00007FF9932A0000-0x00007FF993C41000-memory.dmp

    Filesize

    9.6MB

  • memory/5000-24-0x00007FF9932A0000-0x00007FF993C41000-memory.dmp

    Filesize

    9.6MB

  • memory/5000-26-0x00007FF9932A0000-0x00007FF993C41000-memory.dmp

    Filesize

    9.6MB