Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-01-2025 11:21

General

  • Target

    1dc08569d3a1f7df0c9924010b116d67cf2bf1fcbec1891495eb5698ef6319ffN.exe

  • Size

    598KB

  • MD5

    7a03ef6e44b61c2e00c53dfa1c69ceb0

  • SHA1

    98b6a9cfbbddbce18e936c62a887cf78f80c46ae

  • SHA256

    1dc08569d3a1f7df0c9924010b116d67cf2bf1fcbec1891495eb5698ef6319ff

  • SHA512

    008633cf1a3b7119d94551e6ffc0ab283a3f28b53427298f26971860cd425cc851a35e1d21ca8bcafdb3bfde468b88626f2edf5d232ecd2b5fd33605f4d95859

  • SSDEEP

    6144:TKWlw1DxD+ASIAfCEv2YUMNJlaJuNlK17Y4c83fhysVufBn597NX2X:T7lw1Dxq5zfXeYU43fiysgfBnnl2X

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Revengerat family
  • RevengeRat Executable 1 IoCs
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1dc08569d3a1f7df0c9924010b116d67cf2bf1fcbec1891495eb5698ef6319ffN.exe
    "C:\Users\Admin\AppData\Local\Temp\1dc08569d3a1f7df0c9924010b116d67cf2bf1fcbec1891495eb5698ef6319ffN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4256
    • C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v71a.exe
      C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v71a.exe -install -54423242 -chipde -4d7b1e0d39df4fa99204ca0c313fd41f - -BLUB1 -xxqrkrrqsmiqabke -327824
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1468

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v71a.exe

    Filesize

    288KB

    MD5

    317ec5f92cfbf04a53e8125b66b3b4af

    SHA1

    16068b8977b4dc562ae782d91bc009472667e331

    SHA256

    7612ef3877c3e4e305a6c22941141601b489a73bc088622a40ebd93bee25bae5

    SHA512

    ed772da641a5c128677c4c285c648c1d8e539c34522b95c14f614797bb0d188571c7c257441d45598809aa3f8b4690bd53230282726e077c86c8d9fe71c1db65

  • C:\Users\Admin\AppData\Local\Temp\OCS\xxqrkrrqsmiqabke.dat

    Filesize

    81B

    MD5

    8e880c367c5a2eb9cdf6c8db1007a15f

    SHA1

    72c7253ae133aaa0b9e4946a68664da10422fbe2

    SHA256

    60fddb9d2f345bc99bddf7883b1036cbde19a115c6593f2d16dfb6c1a686cc5e

    SHA512

    5dafbf0cc0ec6e683d73ebe91470d22eed6b5d441ae96f1d23d2ec80c567f580bf7aaa958e78f755daca7a24997d41e9fdabab8711ced6ef1383ff28c6062a68

  • memory/1468-11-0x000000001BE90000-0x000000001BF36000-memory.dmp

    Filesize

    664KB

  • memory/1468-18-0x00007FFFD2700000-0x00007FFFD30A1000-memory.dmp

    Filesize

    9.6MB

  • memory/1468-10-0x000000001C4B0000-0x000000001C97E000-memory.dmp

    Filesize

    4.8MB

  • memory/1468-12-0x000000001CA20000-0x000000001CABC000-memory.dmp

    Filesize

    624KB

  • memory/1468-13-0x00007FFFD2700000-0x00007FFFD30A1000-memory.dmp

    Filesize

    9.6MB

  • memory/1468-14-0x0000000001A90000-0x0000000001A98000-memory.dmp

    Filesize

    32KB

  • memory/1468-8-0x00007FFFD29B5000-0x00007FFFD29B6000-memory.dmp

    Filesize

    4KB

  • memory/1468-16-0x00007FFFD2700000-0x00007FFFD30A1000-memory.dmp

    Filesize

    9.6MB

  • memory/1468-17-0x00007FFFD2700000-0x00007FFFD30A1000-memory.dmp

    Filesize

    9.6MB

  • memory/1468-9-0x00007FFFD2700000-0x00007FFFD30A1000-memory.dmp

    Filesize

    9.6MB

  • memory/1468-19-0x00007FFFD2700000-0x00007FFFD30A1000-memory.dmp

    Filesize

    9.6MB

  • memory/1468-20-0x00007FFFD2700000-0x00007FFFD30A1000-memory.dmp

    Filesize

    9.6MB

  • memory/1468-21-0x00007FFFD2700000-0x00007FFFD30A1000-memory.dmp

    Filesize

    9.6MB

  • memory/1468-22-0x00007FFFD29B5000-0x00007FFFD29B6000-memory.dmp

    Filesize

    4KB

  • memory/1468-23-0x00007FFFD2700000-0x00007FFFD30A1000-memory.dmp

    Filesize

    9.6MB

  • memory/1468-24-0x00007FFFD2700000-0x00007FFFD30A1000-memory.dmp

    Filesize

    9.6MB

  • memory/1468-26-0x00007FFFD2700000-0x00007FFFD30A1000-memory.dmp

    Filesize

    9.6MB