Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-01-2025 23:50

General

  • Target

    e4c62f73f20382ce74d55e493086acd0ef943264be4da406bfa78c0e336f5918.exe

  • Size

    600KB

  • MD5

    4842f78f73cfd57e2a14f89216f00843

  • SHA1

    b583efce87c87efdbb187c1263a08d44a3d6c0d3

  • SHA256

    e4c62f73f20382ce74d55e493086acd0ef943264be4da406bfa78c0e336f5918

  • SHA512

    2b231c33ade85b246c14897d46e551aa3c00342a673a7605163b38b421f4691eca47df7cf63b942e5afa802db64b1a580cc9a041071489b2cc660a3d06edcf08

  • SSDEEP

    12288:Z7lw1DxYpifX9IiyO9KWz3d7ysgfBnnl2uy:Z7m1D93yO9KWz3lysgpnncR

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Revengerat family
  • RevengeRat Executable 1 IoCs
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e4c62f73f20382ce74d55e493086acd0ef943264be4da406bfa78c0e336f5918.exe
    "C:\Users\Admin\AppData\Local\Temp\e4c62f73f20382ce74d55e493086acd0ef943264be4da406bfa78c0e336f5918.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4668
    • C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v7f.exe
      C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v7f.exe -install -54434419 -chipde -2e8a02f5790148ef9fff04f81de0523f - -ABdetected -caxtnirtzzctlhfj -393282
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\OCS\caxtnirtzzctlhfj.dat

    Filesize

    81B

    MD5

    471cc7f210ec5f22cca19cdd79242324

    SHA1

    e2598b3b6413373b53729856ab40d921b16948d3

    SHA256

    7faa9fb820185cd7a6f9dc8b1c01055eb049cf6304313e8cb7e699262efdaff8

    SHA512

    2919625a518cb88b8617ecb35ba9303185104029a8105ca6402afc31b999f04f0abe9251f68601f91bf88920977f31c3d758283621bacc251807b266e4193075

  • C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v7f.exe

    Filesize

    288KB

    MD5

    ea3ccd42dbdc3500e3888daf53d8ef5d

    SHA1

    848c686280eaa04b172fccffbd312132a0c46172

    SHA256

    cd166eede0e0e5303fc3f5fe5f0dd44999020f116bde2adea15319cc214751b5

    SHA512

    7126ec10c2301354f32f3f813958c61eaef63fe946b804ebd6f5934068b344ab75857886d867373f7a2ccf47f18a5a0f1dbe652e9649963a9fdea2b3de6dba50

  • memory/3968-11-0x000000001BB50000-0x000000001BBF6000-memory.dmp

    Filesize

    664KB

  • memory/3968-16-0x00007FFF98D90000-0x00007FFF99731000-memory.dmp

    Filesize

    9.6MB

  • memory/3968-9-0x00007FFF98D90000-0x00007FFF99731000-memory.dmp

    Filesize

    9.6MB

  • memory/3968-12-0x000000001BCC0000-0x000000001BD5C000-memory.dmp

    Filesize

    624KB

  • memory/3968-13-0x00007FFF98D90000-0x00007FFF99731000-memory.dmp

    Filesize

    9.6MB

  • memory/3968-14-0x000000001B160000-0x000000001B168000-memory.dmp

    Filesize

    32KB

  • memory/3968-8-0x00007FFF99045000-0x00007FFF99046000-memory.dmp

    Filesize

    4KB

  • memory/3968-10-0x000000001B680000-0x000000001BB4E000-memory.dmp

    Filesize

    4.8MB

  • memory/3968-17-0x00007FFF98D90000-0x00007FFF99731000-memory.dmp

    Filesize

    9.6MB

  • memory/3968-18-0x00007FFF98D90000-0x00007FFF99731000-memory.dmp

    Filesize

    9.6MB

  • memory/3968-19-0x00007FFF98D90000-0x00007FFF99731000-memory.dmp

    Filesize

    9.6MB

  • memory/3968-20-0x00007FFF98D90000-0x00007FFF99731000-memory.dmp

    Filesize

    9.6MB

  • memory/3968-21-0x00007FFF99045000-0x00007FFF99046000-memory.dmp

    Filesize

    4KB

  • memory/3968-23-0x00007FFF98D90000-0x00007FFF99731000-memory.dmp

    Filesize

    9.6MB

  • memory/3968-24-0x00007FFF98D90000-0x00007FFF99731000-memory.dmp

    Filesize

    9.6MB