Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24-01-2025 18:12

General

  • Target

    22c23f1efc470e46667244ff620473b91d8399287ed05fd202ec4f88d49df9b0N.exe

  • Size

    600KB

  • MD5

    fe78f10619422196b3ed8428b3a86cb0

  • SHA1

    73748078bdb2b134563529a89a87c958b62c54f8

  • SHA256

    22c23f1efc470e46667244ff620473b91d8399287ed05fd202ec4f88d49df9b0

  • SHA512

    b5d0039db2c758b39e2fbd708e94e22053787f8a580191d0a0e7f023ef6e28c0eb5b8e25f70e206fe2cae77fc31e4ea30afd9fa111b8fe50c14f3c159adb2da6

  • SSDEEP

    12288:e7lw1DxQpifX9IiyO9KWz3d7ysgfBnnl2aZ:e7m1DN3yO9KWz3lysgpnnci

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Revengerat family
  • RevengeRat Executable 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\22c23f1efc470e46667244ff620473b91d8399287ed05fd202ec4f88d49df9b0N.exe
    "C:\Users\Admin\AppData\Local\Temp\22c23f1efc470e46667244ff620473b91d8399287ed05fd202ec4f88d49df9b0N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1924
    • C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v7f.exe
      C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v7f.exe -install -54383364 -chipde -43cdf13cb85240c1942bb5252e350106 - -ABdetected -lcrupphtqaxodthz -459164
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2552

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\OCS\lcrupphtqaxodthz.dat

    Filesize

    81B

    MD5

    69063b83f6c6b46467594acae9b4ff81

    SHA1

    944aea6dcb136dac99d802eca7de70c567031851

    SHA256

    fbabe71798d4ef66b452f5d0e82a95333856eed2418bb3aff9baa2f8705acbb1

    SHA512

    982fc8e7a750ad568ac75d8f5c351b09ced171d72b31f295283b908fa1923241c691ef93b53aedfb29d20d4661ad85374ea1cb727110d2c927cc9b8bc3d356b4

  • \Users\Admin\AppData\Local\Temp\OCS\ocs_v7f.exe

    Filesize

    288KB

    MD5

    ea3ccd42dbdc3500e3888daf53d8ef5d

    SHA1

    848c686280eaa04b172fccffbd312132a0c46172

    SHA256

    cd166eede0e0e5303fc3f5fe5f0dd44999020f116bde2adea15319cc214751b5

    SHA512

    7126ec10c2301354f32f3f813958c61eaef63fe946b804ebd6f5934068b344ab75857886d867373f7a2ccf47f18a5a0f1dbe652e9649963a9fdea2b3de6dba50

  • memory/2552-17-0x000007FEF5750000-0x000007FEF60ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2552-13-0x000007FEF5750000-0x000007FEF60ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2552-15-0x000007FEF5750000-0x000007FEF60ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2552-16-0x000007FEF5750000-0x000007FEF60ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2552-12-0x000007FEF5A0E000-0x000007FEF5A0F000-memory.dmp

    Filesize

    4KB

  • memory/2552-18-0x000007FEF5750000-0x000007FEF60ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2552-19-0x000007FEF5750000-0x000007FEF60ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2552-20-0x000007FEF5750000-0x000007FEF60ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2552-21-0x000007FEF5A0E000-0x000007FEF5A0F000-memory.dmp

    Filesize

    4KB

  • memory/2552-22-0x000007FEF5750000-0x000007FEF60ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2552-23-0x000007FEF5750000-0x000007FEF60ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2552-24-0x000007FEF5750000-0x000007FEF60ED000-memory.dmp

    Filesize

    9.6MB