Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/01/2025, 12:56 UTC

General

  • Target

    1d17afc9d3775f4ad333e7bb970589fbf050a04ec1cb91752040f0ef8ce2cc55N.exe

  • Size

    598KB

  • MD5

    0474c04a08e1737660cd461bffd01930

  • SHA1

    b084ff5196f621e2110d8c5e8000ef10503a2886

  • SHA256

    1d17afc9d3775f4ad333e7bb970589fbf050a04ec1cb91752040f0ef8ce2cc55

  • SHA512

    5ac7c81b8ea612b86a98784d9e3150f431ea52e3557824f77945718e9006668883e2249448bef2d44b1a7f1f6ecd88f9f74e4f5aa0f2dcf490ea92c2e873e721

  • SSDEEP

    6144:OKWlw1DxDBASIAfCEv2YUMNJlaJuNlK17Y4c83fhysVufBn597NX2mI:O7lw1Dxd5zfXeYU43fiysgfBnnl2mI

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Revengerat family
  • RevengeRat Executable 1 IoCs
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d17afc9d3775f4ad333e7bb970589fbf050a04ec1cb91752040f0ef8ce2cc55N.exe
    "C:\Users\Admin\AppData\Local\Temp\1d17afc9d3775f4ad333e7bb970589fbf050a04ec1cb91752040f0ef8ce2cc55N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4212
    • C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v71a.exe
      C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v71a.exe -install -54426854 -chipde -147916e016d64acdbbb8c69f020d9a65 - -BLUB1 -irwctuatzubptzhq -589910
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4600

Network

  • flag-us
    DNS
    8.8.8.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.8.8.8.in-addr.arpa
    IN PTR
    Response
    8.8.8.8.in-addr.arpa
    IN PTR
    dnsgoogle
  • flag-us
    DNS
    209.205.72.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    209.205.72.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    172.214.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.214.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    22.160.190.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    22.160.190.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    159.96.196.23.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    159.96.196.23.in-addr.arpa
    IN PTR
    Response
    159.96.196.23.in-addr.arpa
    IN PTR
    a23-196-96-159deploystaticakamaitechnologiescom
  • flag-us
    DNS
    228.249.119.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    228.249.119.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    thinklabs-ltd.de
    ocs_v71a.exe
    Remote address:
    8.8.8.8:53
    Request
    thinklabs-ltd.de
    IN A
    Response
    thinklabs-ltd.de
    IN A
    176.9.175.237
  • flag-de
    GET
    http://thinklabs-ltd.de/geoip.php
    ocs_v71a.exe
    Remote address:
    176.9.175.237:80
    Request
    GET /geoip.php HTTP/1.1
    User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0; DSde) Gecko/20100101 Firefox/23.0
    Host: thinklabs-ltd.de
    Connection: Keep-Alive
    Response
    HTTP/1.1 200 OK
    Date: Fri, 24 Jan 2025 12:57:07 GMT
    Server: Apache
    Vary: Accept-Encoding
    Content-Length: 2
    Keep-Alive: timeout=5, max=1500
    Connection: Keep-Alive
    Content-Type: text/html
  • flag-us
    DNS
    bin.download-sponsor.de
    ocs_v71a.exe
    Remote address:
    8.8.8.8:53
    Request
    bin.download-sponsor.de
    IN A
    Response
    bin.download-sponsor.de
    IN A
    176.9.175.234
  • flag-us
    DNS
    237.175.9.176.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    237.175.9.176.in-addr.arpa
    IN PTR
    Response
    237.175.9.176.in-addr.arpa
    IN PTR
    www1thinklabs-clusterde
  • flag-us
    DNS
    234.175.9.176.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    234.175.9.176.in-addr.arpa
    IN PTR
    Response
    234.175.9.176.in-addr.arpa
    IN PTR
    web1thinklabs-clusterde
  • flag-us
    DNS
    197.87.175.4.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    197.87.175.4.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    171.39.242.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    171.39.242.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    172.210.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.210.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    22.89.16.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    22.89.16.2.in-addr.arpa
    IN PTR
    Response
    22.89.16.2.in-addr.arpa
    IN PTR
    a2-16-89-22deploystaticakamaitechnologiescom
  • flag-us
    DNS
    13.227.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    13.227.111.52.in-addr.arpa
    IN PTR
    Response
  • 176.9.175.237:80
    http://thinklabs-ltd.de/geoip.php
    http
    ocs_v71a.exe
    397 B
    330 B
    5
    3

    HTTP Request

    GET http://thinklabs-ltd.de/geoip.php

    HTTP Response

    200
  • 176.9.175.234:443
    bin.download-sponsor.de
    https
    ocs_v71a.exe
    443 B
    172 B
    5
    4
  • 8.8.8.8:53
    8.8.8.8.in-addr.arpa
    dns
    66 B
    90 B
    1
    1

    DNS Request

    8.8.8.8.in-addr.arpa

  • 8.8.8.8:53
    209.205.72.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    209.205.72.20.in-addr.arpa

  • 8.8.8.8:53
    172.214.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.214.232.199.in-addr.arpa

  • 8.8.8.8:53
    22.160.190.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    22.160.190.20.in-addr.arpa

  • 8.8.8.8:53
    159.96.196.23.in-addr.arpa
    dns
    72 B
    137 B
    1
    1

    DNS Request

    159.96.196.23.in-addr.arpa

  • 8.8.8.8:53
    228.249.119.40.in-addr.arpa
    dns
    73 B
    159 B
    1
    1

    DNS Request

    228.249.119.40.in-addr.arpa

  • 8.8.8.8:53
    thinklabs-ltd.de
    dns
    ocs_v71a.exe
    62 B
    78 B
    1
    1

    DNS Request

    thinklabs-ltd.de

    DNS Response

    176.9.175.237

  • 8.8.8.8:53
    bin.download-sponsor.de
    dns
    ocs_v71a.exe
    69 B
    85 B
    1
    1

    DNS Request

    bin.download-sponsor.de

    DNS Response

    176.9.175.234

  • 8.8.8.8:53
    237.175.9.176.in-addr.arpa
    dns
    72 B
    111 B
    1
    1

    DNS Request

    237.175.9.176.in-addr.arpa

  • 8.8.8.8:53
    234.175.9.176.in-addr.arpa
    dns
    72 B
    111 B
    1
    1

    DNS Request

    234.175.9.176.in-addr.arpa

  • 8.8.8.8:53
    197.87.175.4.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    197.87.175.4.in-addr.arpa

  • 8.8.8.8:53
    171.39.242.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    171.39.242.20.in-addr.arpa

  • 8.8.8.8:53
    172.210.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.210.232.199.in-addr.arpa

  • 8.8.8.8:53
    22.89.16.2.in-addr.arpa
    dns
    69 B
    131 B
    1
    1

    DNS Request

    22.89.16.2.in-addr.arpa

  • 8.8.8.8:53
    13.227.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    13.227.111.52.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\OCS\irwctuatzubptzhq.dat

    Filesize

    83B

    MD5

    ee9de0677d2312b2558b63e61a7b7119

    SHA1

    50d52b0e5bd7b38dd7ed68a5d9ea01b44ea40de3

    SHA256

    e59afa00be709348758201df9877e9a3d0aea3c3c23bf1fc8986fe1c8dbaca1d

    SHA512

    5b63e778ffbf02669de0859cc2fff4cb0885c26883c5e45ef17573782c681cdff37611541c340ec731b0411bc4fa3ff9dacfde918a855f31d7bd7e7ab04ffcc1

  • C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v71a.exe

    Filesize

    288KB

    MD5

    317ec5f92cfbf04a53e8125b66b3b4af

    SHA1

    16068b8977b4dc562ae782d91bc009472667e331

    SHA256

    7612ef3877c3e4e305a6c22941141601b489a73bc088622a40ebd93bee25bae5

    SHA512

    ed772da641a5c128677c4c285c648c1d8e539c34522b95c14f614797bb0d188571c7c257441d45598809aa3f8b4690bd53230282726e077c86c8d9fe71c1db65

  • memory/4600-11-0x000000001C220000-0x000000001C2C6000-memory.dmp

    Filesize

    664KB

  • memory/4600-18-0x00007FFD0BE70000-0x00007FFD0C811000-memory.dmp

    Filesize

    9.6MB

  • memory/4600-9-0x00007FFD0BE70000-0x00007FFD0C811000-memory.dmp

    Filesize

    9.6MB

  • memory/4600-12-0x000000001C3A0000-0x000000001C43C000-memory.dmp

    Filesize

    624KB

  • memory/4600-13-0x00007FFD0BE70000-0x00007FFD0C811000-memory.dmp

    Filesize

    9.6MB

  • memory/4600-14-0x000000001B840000-0x000000001B848000-memory.dmp

    Filesize

    32KB

  • memory/4600-8-0x00007FFD0C125000-0x00007FFD0C126000-memory.dmp

    Filesize

    4KB

  • memory/4600-16-0x00007FFD0BE70000-0x00007FFD0C811000-memory.dmp

    Filesize

    9.6MB

  • memory/4600-17-0x00007FFD0BE70000-0x00007FFD0C811000-memory.dmp

    Filesize

    9.6MB

  • memory/4600-10-0x000000001BD50000-0x000000001C21E000-memory.dmp

    Filesize

    4.8MB

  • memory/4600-19-0x00007FFD0BE70000-0x00007FFD0C811000-memory.dmp

    Filesize

    9.6MB

  • memory/4600-20-0x00007FFD0BE70000-0x00007FFD0C811000-memory.dmp

    Filesize

    9.6MB

  • memory/4600-21-0x00007FFD0BE70000-0x00007FFD0C811000-memory.dmp

    Filesize

    9.6MB

  • memory/4600-22-0x00007FFD0C125000-0x00007FFD0C126000-memory.dmp

    Filesize

    4KB

  • memory/4600-23-0x00007FFD0BE70000-0x00007FFD0C811000-memory.dmp

    Filesize

    9.6MB

  • memory/4600-25-0x00007FFD0BE70000-0x00007FFD0C811000-memory.dmp

    Filesize

    9.6MB

  • memory/4600-26-0x00007FFD0BE70000-0x00007FFD0C811000-memory.dmp

    Filesize

    9.6MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.