Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-01-2025 04:06
Static task
static1
Behavioral task
behavioral1
Sample
1541b2f47de33e0e3eb10a82ff2e3d97eec0edbce8ca2fb46cb59ebd6e420440.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1541b2f47de33e0e3eb10a82ff2e3d97eec0edbce8ca2fb46cb59ebd6e420440.exe
Resource
win10v2004-20241007-en
General
-
Target
1541b2f47de33e0e3eb10a82ff2e3d97eec0edbce8ca2fb46cb59ebd6e420440.exe
-
Size
598KB
-
MD5
3a58ccd82ac789f96a4499506f720e10
-
SHA1
8102bae8a6df7d262f5ff5e5a9b6e4b73ecd5f3a
-
SHA256
1541b2f47de33e0e3eb10a82ff2e3d97eec0edbce8ca2fb46cb59ebd6e420440
-
SHA512
b22ac4c88f2902cca93647db962751a862a127e65c78bd4cd4148a85d86dad3e0a095d080453366dce8fe86dada4571936f9014186d631a2402ed686f8cf6596
-
SSDEEP
6144:3KWlw1DxDVASIAfCEv2YUMNJlaJuNlK17Y4c83fhysVufBn597NX2q:37lw1Dx55zfXeYU43fiysgfBnnl2q
Malware Config
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Revengerat family
-
RevengeRat Executable 1 IoCs
resource yara_rule behavioral1/files/0x0007000000016cf0-6.dat revengerat -
Executes dropped EXE 1 IoCs
pid Process 2128 ocs_v71a.exe -
Loads dropped DLL 2 IoCs
pid Process 1972 1541b2f47de33e0e3eb10a82ff2e3d97eec0edbce8ca2fb46cb59ebd6e420440.exe 1972 1541b2f47de33e0e3eb10a82ff2e3d97eec0edbce8ca2fb46cb59ebd6e420440.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1541b2f47de33e0e3eb10a82ff2e3d97eec0edbce8ca2fb46cb59ebd6e420440.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1972 1541b2f47de33e0e3eb10a82ff2e3d97eec0edbce8ca2fb46cb59ebd6e420440.exe 2128 ocs_v71a.exe 2128 ocs_v71a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2128 1972 1541b2f47de33e0e3eb10a82ff2e3d97eec0edbce8ca2fb46cb59ebd6e420440.exe 30 PID 1972 wrote to memory of 2128 1972 1541b2f47de33e0e3eb10a82ff2e3d97eec0edbce8ca2fb46cb59ebd6e420440.exe 30 PID 1972 wrote to memory of 2128 1972 1541b2f47de33e0e3eb10a82ff2e3d97eec0edbce8ca2fb46cb59ebd6e420440.exe 30 PID 1972 wrote to memory of 2128 1972 1541b2f47de33e0e3eb10a82ff2e3d97eec0edbce8ca2fb46cb59ebd6e420440.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1541b2f47de33e0e3eb10a82ff2e3d97eec0edbce8ca2fb46cb59ebd6e420440.exe"C:\Users\Admin\AppData\Local\Temp\1541b2f47de33e0e3eb10a82ff2e3d97eec0edbce8ca2fb46cb59ebd6e420440.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v71a.exeC:\Users\Admin\AppData\Local\Temp\OCS\ocs_v71a.exe -install -54396726 -chipde -9bf6443ba0b947b08a1364c5cb812ef7 - -BLUB1 -cnhcxweawewliugo -3935022⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81B
MD56f3f2ba201f54d5cefd7391ea6224736
SHA1227f4c3b3983f5446147dbd439c20e05373b477e
SHA256e2eb3f94ce02f5d4c5d17c39c8295df0b4424da504882c49ceaf63a36f548f32
SHA512bf15005910a2f7939ca66e4cabb6d470b83200d8fc5f36a26cb80833a78fdd1129aa6e9c2b5f5d85752818a6ea274660f98d27172dd152099b802ada9a6f5ab4
-
Filesize
288KB
MD5317ec5f92cfbf04a53e8125b66b3b4af
SHA116068b8977b4dc562ae782d91bc009472667e331
SHA2567612ef3877c3e4e305a6c22941141601b489a73bc088622a40ebd93bee25bae5
SHA512ed772da641a5c128677c4c285c648c1d8e539c34522b95c14f614797bb0d188571c7c257441d45598809aa3f8b4690bd53230282726e077c86c8d9fe71c1db65