Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-01-2025 18:12
Static task
static1
Behavioral task
behavioral1
Sample
22c23f1efc470e46667244ff620473b91d8399287ed05fd202ec4f88d49df9b0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
22c23f1efc470e46667244ff620473b91d8399287ed05fd202ec4f88d49df9b0N.exe
Resource
win10v2004-20241007-en
General
-
Target
22c23f1efc470e46667244ff620473b91d8399287ed05fd202ec4f88d49df9b0N.exe
-
Size
600KB
-
MD5
fe78f10619422196b3ed8428b3a86cb0
-
SHA1
73748078bdb2b134563529a89a87c958b62c54f8
-
SHA256
22c23f1efc470e46667244ff620473b91d8399287ed05fd202ec4f88d49df9b0
-
SHA512
b5d0039db2c758b39e2fbd708e94e22053787f8a580191d0a0e7f023ef6e28c0eb5b8e25f70e206fe2cae77fc31e4ea30afd9fa111b8fe50c14f3c159adb2da6
-
SSDEEP
12288:e7lw1DxQpifX9IiyO9KWz3d7ysgfBnnl2aZ:e7m1DN3yO9KWz3lysgpnnci
Malware Config
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Revengerat family
-
RevengeRat Executable 1 IoCs
resource yara_rule behavioral1/files/0x0008000000016ee0-5.dat revengerat -
Executes dropped EXE 1 IoCs
pid Process 2552 ocs_v7f.exe -
Loads dropped DLL 2 IoCs
pid Process 1924 22c23f1efc470e46667244ff620473b91d8399287ed05fd202ec4f88d49df9b0N.exe 1924 22c23f1efc470e46667244ff620473b91d8399287ed05fd202ec4f88d49df9b0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22c23f1efc470e46667244ff620473b91d8399287ed05fd202ec4f88d49df9b0N.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1924 22c23f1efc470e46667244ff620473b91d8399287ed05fd202ec4f88d49df9b0N.exe 2552 ocs_v7f.exe 2552 ocs_v7f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2552 1924 22c23f1efc470e46667244ff620473b91d8399287ed05fd202ec4f88d49df9b0N.exe 30 PID 1924 wrote to memory of 2552 1924 22c23f1efc470e46667244ff620473b91d8399287ed05fd202ec4f88d49df9b0N.exe 30 PID 1924 wrote to memory of 2552 1924 22c23f1efc470e46667244ff620473b91d8399287ed05fd202ec4f88d49df9b0N.exe 30 PID 1924 wrote to memory of 2552 1924 22c23f1efc470e46667244ff620473b91d8399287ed05fd202ec4f88d49df9b0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\22c23f1efc470e46667244ff620473b91d8399287ed05fd202ec4f88d49df9b0N.exe"C:\Users\Admin\AppData\Local\Temp\22c23f1efc470e46667244ff620473b91d8399287ed05fd202ec4f88d49df9b0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v7f.exeC:\Users\Admin\AppData\Local\Temp\OCS\ocs_v7f.exe -install -54383364 -chipde -43cdf13cb85240c1942bb5252e350106 - -ABdetected -lcrupphtqaxodthz -4591642⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81B
MD569063b83f6c6b46467594acae9b4ff81
SHA1944aea6dcb136dac99d802eca7de70c567031851
SHA256fbabe71798d4ef66b452f5d0e82a95333856eed2418bb3aff9baa2f8705acbb1
SHA512982fc8e7a750ad568ac75d8f5c351b09ced171d72b31f295283b908fa1923241c691ef93b53aedfb29d20d4661ad85374ea1cb727110d2c927cc9b8bc3d356b4
-
Filesize
288KB
MD5ea3ccd42dbdc3500e3888daf53d8ef5d
SHA1848c686280eaa04b172fccffbd312132a0c46172
SHA256cd166eede0e0e5303fc3f5fe5f0dd44999020f116bde2adea15319cc214751b5
SHA5127126ec10c2301354f32f3f813958c61eaef63fe946b804ebd6f5934068b344ab75857886d867373f7a2ccf47f18a5a0f1dbe652e9649963a9fdea2b3de6dba50