Analysis
-
max time kernel
119s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2025 23:04
Static task
static1
Behavioral task
behavioral1
Sample
6d7530ba544676bf175f9a7243bda36275e9776a36ac3dc1dc4d4a14d3cbaa6d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6d7530ba544676bf175f9a7243bda36275e9776a36ac3dc1dc4d4a14d3cbaa6d.exe
Resource
win10v2004-20241007-en
General
-
Target
6d7530ba544676bf175f9a7243bda36275e9776a36ac3dc1dc4d4a14d3cbaa6d.exe
-
Size
938KB
-
MD5
bd36e0879a03b4d983695884f15e282d
-
SHA1
f1fb0b67b1c13772e10d18d168228a333df0ff30
-
SHA256
6d7530ba544676bf175f9a7243bda36275e9776a36ac3dc1dc4d4a14d3cbaa6d
-
SHA512
590e88131725959bb2611f4be590712dbd3bdaa6e2cf26389681c0697d8307d7157554224bb51c21956c468aca45d15b03806496900a9b4ddf56333e1a82ab9f
-
SSDEEP
12288:X7lw1DxCCe6QhDiT5DQKI4k9n3eaeQkLKaL44nhPysgfBnnl20:X7m1DLej4k9n3eaeB44nhPysgpnnc0
Malware Config
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Revengerat family
-
RevengeRat Executable 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023b68-6.dat revengerat -
Executes dropped EXE 1 IoCs
pid Process 4032 ocs_v71b.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6d7530ba544676bf175f9a7243bda36275e9776a36ac3dc1dc4d4a14d3cbaa6d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4032 ocs_v71b.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4312 6d7530ba544676bf175f9a7243bda36275e9776a36ac3dc1dc4d4a14d3cbaa6d.exe 4032 ocs_v71b.exe 4032 ocs_v71b.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4312 wrote to memory of 4032 4312 6d7530ba544676bf175f9a7243bda36275e9776a36ac3dc1dc4d4a14d3cbaa6d.exe 82 PID 4312 wrote to memory of 4032 4312 6d7530ba544676bf175f9a7243bda36275e9776a36ac3dc1dc4d4a14d3cbaa6d.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d7530ba544676bf175f9a7243bda36275e9776a36ac3dc1dc4d4a14d3cbaa6d.exe"C:\Users\Admin\AppData\Local\Temp\6d7530ba544676bf175f9a7243bda36275e9776a36ac3dc1dc4d4a14d3cbaa6d.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v71b.exeC:\Users\Admin\AppData\Local\Temp\OCS\ocs_v71b.exe -install -54394990 -chipde -28be22f9445e4882954d68246c6e3de8 - -nojs -wuvojaaobedrmwjh -5899162⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312KB
MD506e5f4da9fc01e28708ccd62815e56c0
SHA199f97ad369e8621ab4d17df53e80e60fee99c727
SHA256bdcb135d79ad72c7e7f0e3e6970ffbfb72af697794c953741517f857f6751e80
SHA5126c98a23e2d65db2feef46a96fd811384255838e0bd9ab7122d3206bafe8229c5da3c45de4b578c411da6a03851956133e44a4e8db147b59422d5f017159054eb
-
Filesize
29B
MD5d14d9c817bc57ed9845e7a8337a11e0c
SHA1284e222f00c12f4dcc6469485fee58e2b8f2b5ba
SHA256c9443f12e122d299d25216226e238971101fea002932918e7f52c60d822db5d3
SHA512bf5b8006d81ad28a4c34608caa59d38ea1da302b4fc20c6c4aa669c796f567aa2636e8b09a00628444438f0040623891034215c10a7dd473ce773997acce10f7