Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    25-06-2024 08:49

General

  • Target

    0d6f7531d6679dbd7ef072c5a316f51b_JaffaCakes118.exe

  • Size

    139KB

  • MD5

    0d6f7531d6679dbd7ef072c5a316f51b

  • SHA1

    df683921f4642623ca00234029ed8001de341794

  • SHA256

    2ca8383d9a53e8f7934dea35d84b08228075202cf12b598288cd635d70e5830e

  • SHA512

    1014b8461b940e5c1a08d5a91355cc815ea6a9bfd1e8fe61154c73dfa45f974039cd24189e2108aa93aa0dc65b2bd58e9b258fbcc2cbafc71964e6e32535cd78

  • SSDEEP

    3072:zUI/3mwHdP7nDAlS14MPce8bV/ihIe/e77:zUi3m2dvAlSOMN8bFihIe/s

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • RevengeRat Executable 1 IoCs
  • Drops startup file 7 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d6f7531d6679dbd7ef072c5a316f51b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0d6f7531d6679dbd7ef072c5a316f51b_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2580
    • C:\Users\Admin\AppData\Roaming\Client.exe
      "C:\Users\Admin\AppData\Roaming\Client.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2628
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\j3xtozac.cmdline"
        3⤵
        • Drops startup file
        • Suspicious use of WriteProcessMemory
        PID:2584
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2CCC.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc2CCB.tmp"
          4⤵
            PID:1928

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Execution

    Scripting

    1
    T1064

    Persistence

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Privilege Escalation

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Defense Evasion

    Scripting

    1
    T1064

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RES2CCC.tmp
      Filesize

      1KB

      MD5

      99292cc12d956db4fc481b24404e0a77

      SHA1

      386de8b790eb8173c7b88f859d951ae9aebfea9c

      SHA256

      856a9f3d12ba58224b3e8c28a5854d07f3dd93a385f39f924329561dfc04d441

      SHA512

      eb4deed0c22ad3e3c36a965d5ec7613d26c6d679d79c77bfde38e838c2081ba1246260d4dc3fe062fd2b075ebbb519c387d47bd0f697852066d1d2f2626fd555

    • C:\Users\Admin\AppData\Local\Temp\j3xtozac.0.vb
      Filesize

      150B

      MD5

      f1fe231bbc8b03cf91057945de200378

      SHA1

      ea8031a13ca216b3f9606d517ab7e6f2889f46d5

      SHA256

      b975710d2986f5a06302c0509b47f5297770c9d137114a9f25c0e53fbaf66039

      SHA512

      0f0a14d1d92d7264ef5ecb2c4f05438014700d48fb9c1acc3065bda04ff468c4ebc3e21963638b2029f4e3a97e9c986ca6dedfc6f40fd358240a735726c5689f

    • C:\Users\Admin\AppData\Local\Temp\j3xtozac.cmdline
      Filesize

      194B

      MD5

      bc32a97075714047529b8bc8086557c0

      SHA1

      24db991fda99f50431402ae39d1131f5f837f517

      SHA256

      3bfd61e019e5991fce2f36757029edda7912692e8973b495bf25d5402c3a2e81

      SHA512

      faddd4ec007d875d12f5b5066d36da70cbc8cae04e91ff8a4cec1b383fceee9d010d5aae0b9aa60b73be3d6e5c27847a2cabcd4c1a6a6a3e5646af86aa46ecbc

    • C:\Users\Admin\AppData\Local\Temp\vbc2CCB.tmp
      Filesize

      644B

      MD5

      23c5f6c5bb4e5de59ec5aa884ea098d3

      SHA1

      7240ba716de1d9ddaa3f9e3a0adcd7e00c4e6a83

      SHA256

      7e090465b6d810c988f61a89f11debded56b4bff54c07369c26ab8afd9e8ba27

      SHA512

      bef35b5af9bb58041f3783a43e85f204a088f44e19168815eea881c2864f9c9038f0e8ba2ab136b6514028e6c22652496cee61fe6dab467b56f0a31809ca1f51

    • \Users\Admin\AppData\Roaming\Client.exe
      Filesize

      139KB

      MD5

      0d6f7531d6679dbd7ef072c5a316f51b

      SHA1

      df683921f4642623ca00234029ed8001de341794

      SHA256

      2ca8383d9a53e8f7934dea35d84b08228075202cf12b598288cd635d70e5830e

      SHA512

      1014b8461b940e5c1a08d5a91355cc815ea6a9bfd1e8fe61154c73dfa45f974039cd24189e2108aa93aa0dc65b2bd58e9b258fbcc2cbafc71964e6e32535cd78

    • memory/2580-1-0x0000000074080000-0x000000007462B000-memory.dmp
      Filesize

      5.7MB

    • memory/2580-2-0x0000000074080000-0x000000007462B000-memory.dmp
      Filesize

      5.7MB

    • memory/2580-3-0x0000000074080000-0x000000007462B000-memory.dmp
      Filesize

      5.7MB

    • memory/2580-4-0x0000000074080000-0x000000007462B000-memory.dmp
      Filesize

      5.7MB

    • memory/2580-0-0x0000000074081000-0x0000000074082000-memory.dmp
      Filesize

      4KB

    • memory/2580-16-0x0000000074080000-0x000000007462B000-memory.dmp
      Filesize

      5.7MB

    • memory/2628-17-0x0000000074080000-0x000000007462B000-memory.dmp
      Filesize

      5.7MB

    • memory/2628-18-0x0000000074080000-0x000000007462B000-memory.dmp
      Filesize

      5.7MB

    • memory/2628-15-0x0000000074080000-0x000000007462B000-memory.dmp
      Filesize

      5.7MB