Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2025, 23:04
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_804664585972bfa5b06339271eeeef2e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_804664585972bfa5b06339271eeeef2e.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_804664585972bfa5b06339271eeeef2e.exe
-
Size
1.1MB
-
MD5
804664585972bfa5b06339271eeeef2e
-
SHA1
58b0cc7fba313426572e1967e77a339fe017a02d
-
SHA256
ac2d76ddecd0ffbd59bd1f64f6e8086579a64061e141007399e47e9fe4b336da
-
SHA512
0ad37382d8a4e0162dddacce3cb35e94bf05f4336f85ecf3de82a4c16ebec613304e7091c359884ad4085cce09e3c748af92e140e5d83bfb696e0cf7d676caa4
-
SSDEEP
24576:Ky2HNG7O1oxjb3V0nob003s2sldyS9mLMuT1XZ2XqlZh:R6NdgPi0Hs2slb9mLnT1p26H
Malware Config
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Revengerat family
-
RevengeRat Executable 1 IoCs
resource yara_rule behavioral2/files/0x000900000002426b-19.dat revengerat -
Executes dropped EXE 2 IoCs
pid Process 2600 mmm.exe 4048 MARTYR~1.EXE -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Martyr MARTYR~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" JaffaCakes118_804664585972bfa5b06339271eeeef2e.exe Set value (str) \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Martyr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\MARTYR~1.EXE" MARTYR~1.EXE -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MARTYR~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_804664585972bfa5b06339271eeeef2e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mmm.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 3852 dw20.exe Token: SeBackupPrivilege 3852 dw20.exe Token: SeBackupPrivilege 3852 dw20.exe Token: SeBackupPrivilege 3852 dw20.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5748 wrote to memory of 2600 5748 JaffaCakes118_804664585972bfa5b06339271eeeef2e.exe 85 PID 5748 wrote to memory of 2600 5748 JaffaCakes118_804664585972bfa5b06339271eeeef2e.exe 85 PID 5748 wrote to memory of 2600 5748 JaffaCakes118_804664585972bfa5b06339271eeeef2e.exe 85 PID 2600 wrote to memory of 3852 2600 mmm.exe 88 PID 2600 wrote to memory of 3852 2600 mmm.exe 88 PID 2600 wrote to memory of 3852 2600 mmm.exe 88 PID 5748 wrote to memory of 4048 5748 JaffaCakes118_804664585972bfa5b06339271eeeef2e.exe 92 PID 5748 wrote to memory of 4048 5748 JaffaCakes118_804664585972bfa5b06339271eeeef2e.exe 92 PID 5748 wrote to memory of 4048 5748 JaffaCakes118_804664585972bfa5b06339271eeeef2e.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_804664585972bfa5b06339271eeeef2e.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_804664585972bfa5b06339271eeeef2e.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5748 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\mmm.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\mmm.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 9403⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:3852
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MARTYR~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MARTYR~1.EXE2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD56a9e06a828bca385615a51895b18f698
SHA1acab147a919de88ec90f970af701f372806773e2
SHA256e3a28e9d6e14cd1fdbc046bcf8e96e05508e1c881459e12f5cb0182292f9128f
SHA51266e9f9e367e544c1845ff6aac938e728980c39895f0f267fca4c2e25788a122bbd567d6231daaa60d5ebf963f2a6fe32bfdca8457d97c477eb2a536d15cd6955
-
Filesize
1.3MB
MD5cd4667b40a1fc74894fba5d63cfa3b0e
SHA12a794780ceed4526df3d26246968cf576c89b0bd
SHA256993c0949ded3fe56c5406c93adf775920d6fc3ee7179ee85cf197cbea0c69a35
SHA5124a4c54ac80d51e1c18d4a9bb175df7cd976c6814b5c79a85ec153d31ee971c29f4d9f1c3508357913ab3e84ccc29885433a92ea8884cddcba1c3c99a075d0842