Analysis

  • max time kernel
    119s
  • max time network
    112s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-01-2025 23:04

General

  • Target

    6d7530ba544676bf175f9a7243bda36275e9776a36ac3dc1dc4d4a14d3cbaa6d.exe

  • Size

    938KB

  • MD5

    bd36e0879a03b4d983695884f15e282d

  • SHA1

    f1fb0b67b1c13772e10d18d168228a333df0ff30

  • SHA256

    6d7530ba544676bf175f9a7243bda36275e9776a36ac3dc1dc4d4a14d3cbaa6d

  • SHA512

    590e88131725959bb2611f4be590712dbd3bdaa6e2cf26389681c0697d8307d7157554224bb51c21956c468aca45d15b03806496900a9b4ddf56333e1a82ab9f

  • SSDEEP

    12288:X7lw1DxCCe6QhDiT5DQKI4k9n3eaeQkLKaL44nhPysgfBnnl20:X7m1DLej4k9n3eaeB44nhPysgpnnc0

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Revengerat family
  • RevengeRat Executable 1 IoCs
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d7530ba544676bf175f9a7243bda36275e9776a36ac3dc1dc4d4a14d3cbaa6d.exe
    "C:\Users\Admin\AppData\Local\Temp\6d7530ba544676bf175f9a7243bda36275e9776a36ac3dc1dc4d4a14d3cbaa6d.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4312
    • C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v71b.exe
      C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v71b.exe -install -54394990 -chipde -28be22f9445e4882954d68246c6e3de8 - -nojs -wuvojaaobedrmwjh -589916
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v71b.exe

    Filesize

    312KB

    MD5

    06e5f4da9fc01e28708ccd62815e56c0

    SHA1

    99f97ad369e8621ab4d17df53e80e60fee99c727

    SHA256

    bdcb135d79ad72c7e7f0e3e6970ffbfb72af697794c953741517f857f6751e80

    SHA512

    6c98a23e2d65db2feef46a96fd811384255838e0bd9ab7122d3206bafe8229c5da3c45de4b578c411da6a03851956133e44a4e8db147b59422d5f017159054eb

  • C:\Users\Admin\AppData\Local\Temp\OCS\wuvojaaobedrmwjh.dat

    Filesize

    29B

    MD5

    d14d9c817bc57ed9845e7a8337a11e0c

    SHA1

    284e222f00c12f4dcc6469485fee58e2b8f2b5ba

    SHA256

    c9443f12e122d299d25216226e238971101fea002932918e7f52c60d822db5d3

    SHA512

    bf5b8006d81ad28a4c34608caa59d38ea1da302b4fc20c6c4aa669c796f567aa2636e8b09a00628444438f0040623891034215c10a7dd473ce773997acce10f7

  • memory/4032-15-0x00007FFA2AAA0000-0x00007FFA2B561000-memory.dmp

    Filesize

    10.8MB

  • memory/4032-16-0x00007FFA2AAA3000-0x00007FFA2AAA5000-memory.dmp

    Filesize

    8KB

  • memory/4032-11-0x00007FFA2AAA0000-0x00007FFA2B561000-memory.dmp

    Filesize

    10.8MB

  • memory/4032-12-0x00007FFA2AAA0000-0x00007FFA2B561000-memory.dmp

    Filesize

    10.8MB

  • memory/4032-13-0x00007FFA2AAA0000-0x00007FFA2B561000-memory.dmp

    Filesize

    10.8MB

  • memory/4032-14-0x00007FFA2AAA0000-0x00007FFA2B561000-memory.dmp

    Filesize

    10.8MB

  • memory/4032-8-0x00007FFA2AAA3000-0x00007FFA2AAA5000-memory.dmp

    Filesize

    8KB

  • memory/4032-9-0x0000000000610000-0x0000000000666000-memory.dmp

    Filesize

    344KB

  • memory/4032-17-0x00007FFA2AAA0000-0x00007FFA2B561000-memory.dmp

    Filesize

    10.8MB

  • memory/4032-18-0x00007FFA2AAA0000-0x00007FFA2B561000-memory.dmp

    Filesize

    10.8MB

  • memory/4032-19-0x000000001D9D0000-0x000000001E127000-memory.dmp

    Filesize

    7.3MB

  • memory/4032-20-0x00007FFA2AAA0000-0x00007FFA2B561000-memory.dmp

    Filesize

    10.8MB

  • memory/4032-21-0x00007FFA2AAA0000-0x00007FFA2B561000-memory.dmp

    Filesize

    10.8MB

  • memory/4032-25-0x00007FFA2AAA0000-0x00007FFA2B561000-memory.dmp

    Filesize

    10.8MB

  • memory/4032-27-0x00007FFA2AAA0000-0x00007FFA2B561000-memory.dmp

    Filesize

    10.8MB