Analysis

  • max time kernel
    105s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24-01-2025 06:16

General

  • Target

    0bf1bde891b701af42801b361e67b94f516a5bb299f1b5a696776fe4c4f8afa9.exe

  • Size

    598KB

  • MD5

    1641d9bbedea37c99c072e968dd57cb0

  • SHA1

    820eaaeea03bf13f461268c7e001d993b8ced7e4

  • SHA256

    0bf1bde891b701af42801b361e67b94f516a5bb299f1b5a696776fe4c4f8afa9

  • SHA512

    90b5656fd8ad669306824a3d383b1750db515bfb23314a5633f0b82630b71c560303f4544a377ad4370cd9f53776debc8bd417ef758ae79f58a0c38713f809f6

  • SSDEEP

    6144:zKWlw1DxDTASIAfCEv2YUMNJlaJuNlK17Y4c83fhysVufBn597NX2D:z7lw1DxX5zfXeYU43fiysgfBnnl2D

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Revengerat family
  • RevengeRat Executable 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0bf1bde891b701af42801b361e67b94f516a5bb299f1b5a696776fe4c4f8afa9.exe
    "C:\Users\Admin\AppData\Local\Temp\0bf1bde891b701af42801b361e67b94f516a5bb299f1b5a696776fe4c4f8afa9.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:876
    • C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v71a.exe
      C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v71a.exe -install -54423242 -chipde -3cdd6f94d0cc4b889258ccb2e379604b - -BLUB2 -xvcowasprzprnsay -393564
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2104

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\OCS\xvcowasprzprnsay.dat

    Filesize

    83B

    MD5

    66f550ac26a6430d0fd814da162af9ac

    SHA1

    aad4f0b1a8ed648d38d24a19a546da8b05c012a5

    SHA256

    d6642ce75bb69fd81a9b203322223a293be4dd4ecda17b60f09c80eafe4ded5b

    SHA512

    074f50fc7f302f1cfc44907fd3dcfa79fabcf0c0f4b63f75881de8e4573cc4396ebc96411cff548a7e1e7c2aafd06ed1a2a2f6fbed61021949229ae00653165c

  • \Users\Admin\AppData\Local\Temp\OCS\ocs_v71a.exe

    Filesize

    288KB

    MD5

    317ec5f92cfbf04a53e8125b66b3b4af

    SHA1

    16068b8977b4dc562ae782d91bc009472667e331

    SHA256

    7612ef3877c3e4e305a6c22941141601b489a73bc088622a40ebd93bee25bae5

    SHA512

    ed772da641a5c128677c4c285c648c1d8e539c34522b95c14f614797bb0d188571c7c257441d45598809aa3f8b4690bd53230282726e077c86c8d9fe71c1db65

  • memory/2104-12-0x000007FEF615E000-0x000007FEF615F000-memory.dmp

    Filesize

    4KB

  • memory/2104-14-0x000007FEF5EA0000-0x000007FEF683D000-memory.dmp

    Filesize

    9.6MB

  • memory/2104-15-0x000007FEF5EA0000-0x000007FEF683D000-memory.dmp

    Filesize

    9.6MB

  • memory/2104-16-0x000007FEF5EA0000-0x000007FEF683D000-memory.dmp

    Filesize

    9.6MB

  • memory/2104-17-0x000007FEF5EA0000-0x000007FEF683D000-memory.dmp

    Filesize

    9.6MB

  • memory/2104-18-0x000007FEF5EA0000-0x000007FEF683D000-memory.dmp

    Filesize

    9.6MB

  • memory/2104-19-0x000007FEF5EA0000-0x000007FEF683D000-memory.dmp

    Filesize

    9.6MB

  • memory/2104-20-0x000007FEF5EA0000-0x000007FEF683D000-memory.dmp

    Filesize

    9.6MB

  • memory/2104-21-0x000007FEF615E000-0x000007FEF615F000-memory.dmp

    Filesize

    4KB

  • memory/2104-22-0x000007FEF5EA0000-0x000007FEF683D000-memory.dmp

    Filesize

    9.6MB