Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-01-2025 18:12

General

  • Target

    22c23f1efc470e46667244ff620473b91d8399287ed05fd202ec4f88d49df9b0N.exe

  • Size

    600KB

  • MD5

    fe78f10619422196b3ed8428b3a86cb0

  • SHA1

    73748078bdb2b134563529a89a87c958b62c54f8

  • SHA256

    22c23f1efc470e46667244ff620473b91d8399287ed05fd202ec4f88d49df9b0

  • SHA512

    b5d0039db2c758b39e2fbd708e94e22053787f8a580191d0a0e7f023ef6e28c0eb5b8e25f70e206fe2cae77fc31e4ea30afd9fa111b8fe50c14f3c159adb2da6

  • SSDEEP

    12288:e7lw1DxQpifX9IiyO9KWz3d7ysgfBnnl2aZ:e7m1DN3yO9KWz3lysgpnnci

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Revengerat family
  • RevengeRat Executable 1 IoCs
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\22c23f1efc470e46667244ff620473b91d8399287ed05fd202ec4f88d49df9b0N.exe
    "C:\Users\Admin\AppData\Local\Temp\22c23f1efc470e46667244ff620473b91d8399287ed05fd202ec4f88d49df9b0N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4616
    • C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v7f.exe
      C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v7f.exe -install -54383364 -chipde -43cdf13cb85240c1942bb5252e350106 - -ABdetected -ofrnbggbwvwlfnwn -459100
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4288

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v7f.exe

    Filesize

    288KB

    MD5

    ea3ccd42dbdc3500e3888daf53d8ef5d

    SHA1

    848c686280eaa04b172fccffbd312132a0c46172

    SHA256

    cd166eede0e0e5303fc3f5fe5f0dd44999020f116bde2adea15319cc214751b5

    SHA512

    7126ec10c2301354f32f3f813958c61eaef63fe946b804ebd6f5934068b344ab75857886d867373f7a2ccf47f18a5a0f1dbe652e9649963a9fdea2b3de6dba50

  • C:\Users\Admin\AppData\Local\Temp\OCS\ofrnbggbwvwlfnwn.dat

    Filesize

    81B

    MD5

    69063b83f6c6b46467594acae9b4ff81

    SHA1

    944aea6dcb136dac99d802eca7de70c567031851

    SHA256

    fbabe71798d4ef66b452f5d0e82a95333856eed2418bb3aff9baa2f8705acbb1

    SHA512

    982fc8e7a750ad568ac75d8f5c351b09ced171d72b31f295283b908fa1923241c691ef93b53aedfb29d20d4661ad85374ea1cb727110d2c927cc9b8bc3d356b4

  • memory/4288-11-0x000000001C5A0000-0x000000001C646000-memory.dmp

    Filesize

    664KB

  • memory/4288-16-0x00007FFD9A670000-0x00007FFD9B011000-memory.dmp

    Filesize

    9.6MB

  • memory/4288-10-0x000000001C0D0000-0x000000001C59E000-memory.dmp

    Filesize

    4.8MB

  • memory/4288-12-0x000000001C6F0000-0x000000001C78C000-memory.dmp

    Filesize

    624KB

  • memory/4288-13-0x00007FFD9A670000-0x00007FFD9B011000-memory.dmp

    Filesize

    9.6MB

  • memory/4288-14-0x0000000001580000-0x0000000001588000-memory.dmp

    Filesize

    32KB

  • memory/4288-8-0x00007FFD9A925000-0x00007FFD9A926000-memory.dmp

    Filesize

    4KB

  • memory/4288-9-0x00007FFD9A670000-0x00007FFD9B011000-memory.dmp

    Filesize

    9.6MB

  • memory/4288-17-0x00007FFD9A670000-0x00007FFD9B011000-memory.dmp

    Filesize

    9.6MB

  • memory/4288-18-0x00007FFD9A670000-0x00007FFD9B011000-memory.dmp

    Filesize

    9.6MB

  • memory/4288-19-0x00007FFD9A670000-0x00007FFD9B011000-memory.dmp

    Filesize

    9.6MB

  • memory/4288-20-0x00007FFD9A670000-0x00007FFD9B011000-memory.dmp

    Filesize

    9.6MB

  • memory/4288-21-0x00007FFD9A925000-0x00007FFD9A926000-memory.dmp

    Filesize

    4KB

  • memory/4288-22-0x00007FFD9A670000-0x00007FFD9B011000-memory.dmp

    Filesize

    9.6MB

  • memory/4288-24-0x00007FFD9A670000-0x00007FFD9B011000-memory.dmp

    Filesize

    9.6MB