Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-01-2025 07:10

General

  • Target

    1c98e21ee36a9a1ca79b362fff6e91470da8b792c9d51bb2e7ed5d958e513402.exe

  • Size

    598KB

  • MD5

    966c5536d24168b754c18cdefa202050

  • SHA1

    47341cde157335330cd0d8ee25a908ff69ab859c

  • SHA256

    1c98e21ee36a9a1ca79b362fff6e91470da8b792c9d51bb2e7ed5d958e513402

  • SHA512

    4f66eb015d7fa6648f197cebae1d768239a9c7f7decf198e60149a80207d99d50a9a68ba0be1ba627fad1384f6e5a7b41491de692f1c075ac785ad0481200d24

  • SSDEEP

    6144:zKWlw1DxDrASIAfCEv2YUMNJlaJuNlK17Y4c83fhysVufBn597NX2g:z7lw1Dxf5zfXeYU43fiysgfBnnl2g

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Revengerat family
  • RevengeRat Executable 1 IoCs
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c98e21ee36a9a1ca79b362fff6e91470da8b792c9d51bb2e7ed5d958e513402.exe
    "C:\Users\Admin\AppData\Local\Temp\1c98e21ee36a9a1ca79b362fff6e91470da8b792c9d51bb2e7ed5d958e513402.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3140
    • C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v71a.exe
      C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v71a.exe -install -54387927 -chipde -f99e971aa26940b0b6335596b18c6fa4 - -BLUB1 -mentdweaszcoofog -524368
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3196

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\OCS\mentdweaszcoofog.dat

    Filesize

    83B

    MD5

    8c9c3bc41818dab6cb7476331b0d6e72

    SHA1

    dbce564cb69d6dd28f76931a41ca8f3d2bacb1fe

    SHA256

    e50a7d0d59abd1f2d19e1e7e93500ab383d1bef68ba4c150aafb45d0bc1f9159

    SHA512

    366a0277024a1cf9b51139089accc3c994e37435c653d8128e3e19259e7770da704955b901ebbe0f01f646e51d4af557b8d00cc02683e6cc1f90ddaf48e43b9c

  • C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v71a.exe

    Filesize

    288KB

    MD5

    317ec5f92cfbf04a53e8125b66b3b4af

    SHA1

    16068b8977b4dc562ae782d91bc009472667e331

    SHA256

    7612ef3877c3e4e305a6c22941141601b489a73bc088622a40ebd93bee25bae5

    SHA512

    ed772da641a5c128677c4c285c648c1d8e539c34522b95c14f614797bb0d188571c7c257441d45598809aa3f8b4690bd53230282726e077c86c8d9fe71c1db65

  • memory/3196-11-0x000000001B730000-0x000000001B7D6000-memory.dmp

    Filesize

    664KB

  • memory/3196-18-0x00007FFF97070000-0x00007FFF97A11000-memory.dmp

    Filesize

    9.6MB

  • memory/3196-9-0x00007FFF97070000-0x00007FFF97A11000-memory.dmp

    Filesize

    9.6MB

  • memory/3196-12-0x00007FFF97070000-0x00007FFF97A11000-memory.dmp

    Filesize

    9.6MB

  • memory/3196-13-0x000000001C290000-0x000000001C32C000-memory.dmp

    Filesize

    624KB

  • memory/3196-14-0x000000001B7E0000-0x000000001B7E8000-memory.dmp

    Filesize

    32KB

  • memory/3196-8-0x00007FFF97325000-0x00007FFF97326000-memory.dmp

    Filesize

    4KB

  • memory/3196-16-0x00007FFF97070000-0x00007FFF97A11000-memory.dmp

    Filesize

    9.6MB

  • memory/3196-17-0x00007FFF97070000-0x00007FFF97A11000-memory.dmp

    Filesize

    9.6MB

  • memory/3196-10-0x000000001BCE0000-0x000000001C1AE000-memory.dmp

    Filesize

    4.8MB

  • memory/3196-19-0x00007FFF97070000-0x00007FFF97A11000-memory.dmp

    Filesize

    9.6MB

  • memory/3196-20-0x00007FFF97070000-0x00007FFF97A11000-memory.dmp

    Filesize

    9.6MB

  • memory/3196-21-0x00007FFF97070000-0x00007FFF97A11000-memory.dmp

    Filesize

    9.6MB

  • memory/3196-22-0x00007FFF97325000-0x00007FFF97326000-memory.dmp

    Filesize

    4KB

  • memory/3196-23-0x00007FFF97070000-0x00007FFF97A11000-memory.dmp

    Filesize

    9.6MB

  • memory/3196-24-0x00007FFF97070000-0x00007FFF97A11000-memory.dmp

    Filesize

    9.6MB

  • memory/3196-26-0x00007FFF97070000-0x00007FFF97A11000-memory.dmp

    Filesize

    9.6MB