Analysis
-
max time kernel
140s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
08-01-2025 06:43
Behavioral task
behavioral1
Sample
JaffaCakes118_91104d8f4ecd179a4ed5432d892756db.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_91104d8f4ecd179a4ed5432d892756db.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_91104d8f4ecd179a4ed5432d892756db.exe
-
Size
60KB
-
MD5
91104d8f4ecd179a4ed5432d892756db
-
SHA1
39e745d84e1d6bcad456730a22ea6f8ce52192ba
-
SHA256
5da2b86d941d0c24e21a5a49f1a6764dc73096a5f5e2128f05581147e7b548e7
-
SHA512
e4ba79056502b0f8c0966bd12ef0dab8e56009623f888f034d24fc85323f091e571cdf3bbc8e46c401e2a33a231190e2b4a00ae50171a47afd00067028389167
-
SSDEEP
1536:6FIKcG3XCvYtGq2gkXp1z7r5bjzjFnpVjyl+:6FIE3Cyh2th7NL1jq+
Malware Config
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Revengerat family
-
RevengeRat Executable 1 IoCs
resource yara_rule behavioral1/files/0x00360000000194ef-44.dat revengerat -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2336 set thread context of 2296 2336 JaffaCakes118_91104d8f4ecd179a4ed5432d892756db.exe 29 PID 2296 set thread context of 2812 2296 CasPol.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_91104d8f4ecd179a4ed5432d892756db.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CasPol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CasPol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\_auto_file\ rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2508 AcroRd32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2336 JaffaCakes118_91104d8f4ecd179a4ed5432d892756db.exe Token: SeDebugPrivilege 2296 CasPol.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2508 AcroRd32.exe 2508 AcroRd32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2296 2336 JaffaCakes118_91104d8f4ecd179a4ed5432d892756db.exe 29 PID 2336 wrote to memory of 2296 2336 JaffaCakes118_91104d8f4ecd179a4ed5432d892756db.exe 29 PID 2336 wrote to memory of 2296 2336 JaffaCakes118_91104d8f4ecd179a4ed5432d892756db.exe 29 PID 2336 wrote to memory of 2296 2336 JaffaCakes118_91104d8f4ecd179a4ed5432d892756db.exe 29 PID 2336 wrote to memory of 2296 2336 JaffaCakes118_91104d8f4ecd179a4ed5432d892756db.exe 29 PID 2336 wrote to memory of 2296 2336 JaffaCakes118_91104d8f4ecd179a4ed5432d892756db.exe 29 PID 2336 wrote to memory of 2296 2336 JaffaCakes118_91104d8f4ecd179a4ed5432d892756db.exe 29 PID 2336 wrote to memory of 2296 2336 JaffaCakes118_91104d8f4ecd179a4ed5432d892756db.exe 29 PID 2336 wrote to memory of 2296 2336 JaffaCakes118_91104d8f4ecd179a4ed5432d892756db.exe 29 PID 2336 wrote to memory of 2296 2336 JaffaCakes118_91104d8f4ecd179a4ed5432d892756db.exe 29 PID 2296 wrote to memory of 2812 2296 CasPol.exe 30 PID 2296 wrote to memory of 2812 2296 CasPol.exe 30 PID 2296 wrote to memory of 2812 2296 CasPol.exe 30 PID 2296 wrote to memory of 2812 2296 CasPol.exe 30 PID 2296 wrote to memory of 2812 2296 CasPol.exe 30 PID 2296 wrote to memory of 2812 2296 CasPol.exe 30 PID 2296 wrote to memory of 2812 2296 CasPol.exe 30 PID 2296 wrote to memory of 2812 2296 CasPol.exe 30 PID 2296 wrote to memory of 2812 2296 CasPol.exe 30 PID 2296 wrote to memory of 2044 2296 CasPol.exe 32 PID 2296 wrote to memory of 2044 2296 CasPol.exe 32 PID 2296 wrote to memory of 2044 2296 CasPol.exe 32 PID 2296 wrote to memory of 2044 2296 CasPol.exe 32 PID 2296 wrote to memory of 2044 2296 CasPol.exe 32 PID 2296 wrote to memory of 2044 2296 CasPol.exe 32 PID 2296 wrote to memory of 2044 2296 CasPol.exe 32 PID 2044 wrote to memory of 2508 2044 rundll32.exe 33 PID 2044 wrote to memory of 2508 2044 rundll32.exe 33 PID 2044 wrote to memory of 2508 2044 rundll32.exe 33 PID 2044 wrote to memory of 2508 2044 rundll32.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_91104d8f4ecd179a4ed5432d892756db.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_91104d8f4ecd179a4ed5432d892756db.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2812
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Roaming\Casspol3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Roaming\Casspol"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2508
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84B
MD580b8964f9daa5fb1ff283bb95aea723b
SHA19da3c3251d8a16073416f8d7383fda4368d0c2eb
SHA256b29a91b2f873bea7971caf95fcb7a6f795e89d87408d915df62c51aff40c423c
SHA512b735f87723a17e73cfdc1215090c6ce56a6c56c869bceb7f8b4e2951d5f87721c3b371d9fbd10fc1488742ffa47981293d184ba66a3ec68ac922dc627b3eb0ad
-
Filesize
3KB
MD505de1f33e8b6ede44c79d2c4d77d9486
SHA157d10c908e4d8540546021b351d596487b7303c9
SHA25610f8dc456414dbc6024bd21af46e8c2e6e623f89b8730b7ec178b4f4a3503a8b
SHA512fe8fa63d28aeb56aed94e5bb87650d488696ff32dc5cf245201d35333263440c73c61f9f89378bab35df7eff99a0dc78ca434470c20d9ccef968e3a1a20b2d86
-
Filesize
60KB
MD591104d8f4ecd179a4ed5432d892756db
SHA139e745d84e1d6bcad456730a22ea6f8ce52192ba
SHA2565da2b86d941d0c24e21a5a49f1a6764dc73096a5f5e2128f05581147e7b548e7
SHA512e4ba79056502b0f8c0966bd12ef0dab8e56009623f888f034d24fc85323f091e571cdf3bbc8e46c401e2a33a231190e2b4a00ae50171a47afd00067028389167