Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2025, 02:05
Behavioral task
behavioral1
Sample
JaffaCakes118_f41dd24943f187032c28c2065c2e1150.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_f41dd24943f187032c28c2065c2e1150.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_f41dd24943f187032c28c2065c2e1150.exe
-
Size
56KB
-
MD5
f41dd24943f187032c28c2065c2e1150
-
SHA1
a6b0d8ba4e0f78fb5ed746b3046fad5a41caa01b
-
SHA256
877c20737b066f465e7fc9bdfebf63fe7290569cb8bc6487fbc7309cde2a71eb
-
SHA512
a366418c29077612f7b06bea12c9fee5f9a65570caa40a522720c69285e47c0ea69d755a519702d5a00d4fe88a1dacb3f5247f1d12a2430469d411be008e305a
-
SSDEEP
768:wOs84zLDN05Wx4Wa4F3Gxo/ppQMlzEjKK19dGA2To:D4PRlCWz3CoRpQMlqb1+M
Malware Config
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Revengerat family
-
RevengeRat Executable 1 IoCs
resource yara_rule behavioral2/files/0x0008000000023ca9-10.dat revengerat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation JaffaCakes118_f41dd24943f187032c28c2065c2e1150.exe -
Drops startup file 8 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\system32helper svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\system32helper svchost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\system32helper.vbs svchost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\system32helper.js svchost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\system32helper.lnk svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\system32helper.URL svchost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\system32helper vbc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\system32helper.exe vbc.exe -
Executes dropped EXE 2 IoCs
pid Process 3856 svchost.exe 2200 svchost.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Windows\\History\\svchost.exe" svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_f41dd24943f187032c28c2065c2e1150.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5004 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3148 JaffaCakes118_f41dd24943f187032c28c2065c2e1150.exe Token: SeDebugPrivilege 3856 svchost.exe Token: SeDebugPrivilege 2200 svchost.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3148 wrote to memory of 3856 3148 JaffaCakes118_f41dd24943f187032c28c2065c2e1150.exe 99 PID 3148 wrote to memory of 3856 3148 JaffaCakes118_f41dd24943f187032c28c2065c2e1150.exe 99 PID 3148 wrote to memory of 3856 3148 JaffaCakes118_f41dd24943f187032c28c2065c2e1150.exe 99 PID 3856 wrote to memory of 4452 3856 svchost.exe 101 PID 3856 wrote to memory of 4452 3856 svchost.exe 101 PID 3856 wrote to memory of 4452 3856 svchost.exe 101 PID 4452 wrote to memory of 916 4452 vbc.exe 103 PID 4452 wrote to memory of 916 4452 vbc.exe 103 PID 4452 wrote to memory of 916 4452 vbc.exe 103 PID 3856 wrote to memory of 5004 3856 svchost.exe 104 PID 3856 wrote to memory of 5004 3856 svchost.exe 104 PID 3856 wrote to memory of 5004 3856 svchost.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f41dd24943f187032c28c2065c2e1150.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f41dd24943f187032c28c2065c2e1150.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Users\Admin\AppData\Local\Microsoft\Windows\History\svchost.exe"C:\Users\Admin\AppData\Local\Microsoft\Windows\History\svchost.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\lejap92z.cmdline"3⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES95D2.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcB180F71FAB54CA0BEC7DC971A8DF0BE.TMP"4⤵
- System Location Discovery: System Language Discovery
PID:916
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\History\svchost.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5004
-
-
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\History\svchost.exeC:\Users\Admin\AppData\Local\Microsoft\Windows\History\svchost.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2200
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5f41dd24943f187032c28c2065c2e1150
SHA1a6b0d8ba4e0f78fb5ed746b3046fad5a41caa01b
SHA256877c20737b066f465e7fc9bdfebf63fe7290569cb8bc6487fbc7309cde2a71eb
SHA512a366418c29077612f7b06bea12c9fee5f9a65570caa40a522720c69285e47c0ea69d755a519702d5a00d4fe88a1dacb3f5247f1d12a2430469d411be008e305a
-
Filesize
1KB
MD59cfa39a696eb06cc2fb0d967fc55078b
SHA1f4e5d863971fa9ee080396aadfe79e895a539e3e
SHA25677090d5b66d343c41c3cd147eef929383cb72f5ff183c0a6e4a905acb30643a8
SHA512e9b61e13b28298a3aff2221351eb83a7f9215f2b396cb70f15a617c3bb9d889034add1a67df98acf908fac9061df3fc00a43e8372e239e160f56b3724543be10
-
Filesize
175B
MD5926bad7c6f2ddbd75807351fd5c20585
SHA11fc89b5d7d40ff92832a29da8c3fc2dcea6baeab
SHA25687e2f6e2b61abdb0b4b63243f060c8376503ef544d24726f0098f6d38ef85f91
SHA5126684eb60afac6258299d6c8406ea3a6ccda603a60d3a780d6d397c0ae27b62191ed0abd3cefb107aad55cf17d3c4fee0cbac8a96027d2086828c3ca6221a81ed
-
Filesize
198B
MD590264f58382e587bab6c7d20d6bc8044
SHA12fc9b78f823712c13e0667bfa7325e0d6fe2922a
SHA2567e6b4ac16880b594f9f9f27f28a47d8089a711a763b3a20ec12f99faab649136
SHA512ca5e0187fe728c673cd5e502e06b1ef1594e31d2cb35105d08eb099180076471ed086e2273d06055d9d53af9d8ce595185551c9701de119ad654b5d97a442c39
-
Filesize
676B
MD56c51e75b6e74d5d4c93ad5da8b15790e
SHA10f2f268d354c03fb11ac6b5548650de793583535
SHA256a646a41cad107940e782bd4ccc785772521bd03851e65684defcc70bcab85995
SHA512b9451ce5d60f4ce3b898cc9f5696d4a2146de5805f4fa36f055eb6a3d2176ec7818c8736712e51f64a4b02af0584ceac5c3f3bcb84918b01e4df0244ff42cbda