Analysis

  • max time kernel
    95s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-01-2025 06:43

General

  • Target

    JaffaCakes118_91104d8f4ecd179a4ed5432d892756db.exe

  • Size

    60KB

  • MD5

    91104d8f4ecd179a4ed5432d892756db

  • SHA1

    39e745d84e1d6bcad456730a22ea6f8ce52192ba

  • SHA256

    5da2b86d941d0c24e21a5a49f1a6764dc73096a5f5e2128f05581147e7b548e7

  • SHA512

    e4ba79056502b0f8c0966bd12ef0dab8e56009623f888f034d24fc85323f091e571cdf3bbc8e46c401e2a33a231190e2b4a00ae50171a47afd00067028389167

  • SSDEEP

    1536:6FIKcG3XCvYtGq2gkXp1z7r5bjzjFnpVjyl+:6FIE3Cyh2th7NL1jq+

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Revengerat family
  • RevengeRat Executable 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_91104d8f4ecd179a4ed5432d892756db.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_91104d8f4ecd179a4ed5432d892756db.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1868
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5096
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4784
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\CasPol.exe.log

    Filesize

    42B

    MD5

    84cfdb4b995b1dbf543b26b86c863adc

    SHA1

    d2f47764908bf30036cf8248b9ff5541e2711fa2

    SHA256

    d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b

    SHA512

    485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce

  • C:\Users\Admin\AppData\Local\Temp\hwiejYAoBL.txt

    Filesize

    84B

    MD5

    80b8964f9daa5fb1ff283bb95aea723b

    SHA1

    9da3c3251d8a16073416f8d7383fda4368d0c2eb

    SHA256

    b29a91b2f873bea7971caf95fcb7a6f795e89d87408d915df62c51aff40c423c

    SHA512

    b735f87723a17e73cfdc1215090c6ce56a6c56c869bceb7f8b4e2951d5f87721c3b371d9fbd10fc1488742ffa47981293d184ba66a3ec68ac922dc627b3eb0ad

  • C:\Users\Admin\AppData\Roaming\Casspol

    Filesize

    60KB

    MD5

    91104d8f4ecd179a4ed5432d892756db

    SHA1

    39e745d84e1d6bcad456730a22ea6f8ce52192ba

    SHA256

    5da2b86d941d0c24e21a5a49f1a6764dc73096a5f5e2128f05581147e7b548e7

    SHA512

    e4ba79056502b0f8c0966bd12ef0dab8e56009623f888f034d24fc85323f091e571cdf3bbc8e46c401e2a33a231190e2b4a00ae50171a47afd00067028389167

  • memory/1868-7-0x0000000075010000-0x00000000755C1000-memory.dmp

    Filesize

    5.7MB

  • memory/1868-2-0x0000000075010000-0x00000000755C1000-memory.dmp

    Filesize

    5.7MB

  • memory/1868-0-0x0000000075012000-0x0000000075013000-memory.dmp

    Filesize

    4KB

  • memory/1868-1-0x0000000075010000-0x00000000755C1000-memory.dmp

    Filesize

    5.7MB

  • memory/4784-19-0x0000000072DD0000-0x0000000073580000-memory.dmp

    Filesize

    7.7MB

  • memory/4784-12-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/4784-15-0x0000000072DD0000-0x0000000073580000-memory.dmp

    Filesize

    7.7MB

  • memory/5096-17-0x0000000072DD0000-0x0000000073580000-memory.dmp

    Filesize

    7.7MB

  • memory/5096-4-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/5096-11-0x0000000005860000-0x00000000058C6000-memory.dmp

    Filesize

    408KB

  • memory/5096-16-0x0000000006590000-0x0000000006622000-memory.dmp

    Filesize

    584KB

  • memory/5096-10-0x0000000005DA0000-0x0000000006344000-memory.dmp

    Filesize

    5.6MB

  • memory/5096-18-0x0000000072DDE000-0x0000000072DDF000-memory.dmp

    Filesize

    4KB

  • memory/5096-6-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/5096-20-0x0000000072DD0000-0x0000000073580000-memory.dmp

    Filesize

    7.7MB

  • memory/5096-9-0x0000000005750000-0x00000000057EC000-memory.dmp

    Filesize

    624KB

  • memory/5096-8-0x0000000072DDE000-0x0000000072DDF000-memory.dmp

    Filesize

    4KB

  • memory/5096-28-0x0000000072DD0000-0x0000000073580000-memory.dmp

    Filesize

    7.7MB