Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
07-04-2021 05:15
Static task
static1
Behavioral task
behavioral1
Sample
JANUARY OVERDUE INVOICE.pdf.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
JANUARY OVERDUE INVOICE.pdf.exe
Resource
win10v20201028
General
-
Target
JANUARY OVERDUE INVOICE.pdf.exe
-
Size
1.5MB
-
MD5
f7d79ec6a3bf524f8f0c0e8d54949948
-
SHA1
ff9535613f977f6321a1eca20c50e97d23c83259
-
SHA256
b4fbe906439597a3d05b94f3a7001069687e598cabc9a82e47d6c43046be10a5
-
SHA512
27dd0344afe613f24147e08aa1208e0fbea2c6618a69a97e48b94a9f412b44273dfd268653dcaec7a83e7fdb10601b6c58ee90bc412601879308f69f7d5d2783
Malware Config
Signatures
-
RevcodeRat, WebMonitorRat
WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.
-
WebMonitor Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/576-12-0x0000000000400000-0x00000000004F3000-memory.dmp family_webmonitor behavioral1/memory/576-13-0x000000000049D8CA-mapping.dmp family_webmonitor behavioral1/memory/576-15-0x0000000000400000-0x00000000004F3000-memory.dmp family_webmonitor behavioral1/memory/576-16-0x0000000000400000-0x00000000004F3000-memory.dmp family_webmonitor -
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
Processes:
resource yara_rule behavioral1/memory/1668-6-0x00000000006B0000-0x00000000006B4000-memory.dmp CustAttr -
Suspicious use of SetThreadContext 1 IoCs
Processes:
JANUARY OVERDUE INVOICE.pdf.exedescription pid process target process PID 1668 set thread context of 576 1668 JANUARY OVERDUE INVOICE.pdf.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
JANUARY OVERDUE INVOICE.pdf.exepid process 1668 JANUARY OVERDUE INVOICE.pdf.exe 1668 JANUARY OVERDUE INVOICE.pdf.exe 1668 JANUARY OVERDUE INVOICE.pdf.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
JANUARY OVERDUE INVOICE.pdf.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 1668 JANUARY OVERDUE INVOICE.pdf.exe Token: SeShutdownPrivilege 576 RegSvcs.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
JANUARY OVERDUE INVOICE.pdf.exedescription pid process target process PID 1668 wrote to memory of 1500 1668 JANUARY OVERDUE INVOICE.pdf.exe schtasks.exe PID 1668 wrote to memory of 1500 1668 JANUARY OVERDUE INVOICE.pdf.exe schtasks.exe PID 1668 wrote to memory of 1500 1668 JANUARY OVERDUE INVOICE.pdf.exe schtasks.exe PID 1668 wrote to memory of 1500 1668 JANUARY OVERDUE INVOICE.pdf.exe schtasks.exe PID 1668 wrote to memory of 576 1668 JANUARY OVERDUE INVOICE.pdf.exe RegSvcs.exe PID 1668 wrote to memory of 576 1668 JANUARY OVERDUE INVOICE.pdf.exe RegSvcs.exe PID 1668 wrote to memory of 576 1668 JANUARY OVERDUE INVOICE.pdf.exe RegSvcs.exe PID 1668 wrote to memory of 576 1668 JANUARY OVERDUE INVOICE.pdf.exe RegSvcs.exe PID 1668 wrote to memory of 576 1668 JANUARY OVERDUE INVOICE.pdf.exe RegSvcs.exe PID 1668 wrote to memory of 576 1668 JANUARY OVERDUE INVOICE.pdf.exe RegSvcs.exe PID 1668 wrote to memory of 576 1668 JANUARY OVERDUE INVOICE.pdf.exe RegSvcs.exe PID 1668 wrote to memory of 576 1668 JANUARY OVERDUE INVOICE.pdf.exe RegSvcs.exe PID 1668 wrote to memory of 576 1668 JANUARY OVERDUE INVOICE.pdf.exe RegSvcs.exe PID 1668 wrote to memory of 576 1668 JANUARY OVERDUE INVOICE.pdf.exe RegSvcs.exe PID 1668 wrote to memory of 576 1668 JANUARY OVERDUE INVOICE.pdf.exe RegSvcs.exe PID 1668 wrote to memory of 576 1668 JANUARY OVERDUE INVOICE.pdf.exe RegSvcs.exe PID 1668 wrote to memory of 576 1668 JANUARY OVERDUE INVOICE.pdf.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JANUARY OVERDUE INVOICE.pdf.exe"C:\Users\Admin\AppData\Local\Temp\JANUARY OVERDUE INVOICE.pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LbDmDauhDnWnVS" /XML "C:\Users\Admin\AppData\Local\Temp\tmpEB0.tmp"2⤵
- Creates scheduled task(s)
PID:1500
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:576
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
40c2abe04e722370140730fe09f5c508
SHA1bf92cc17c74ede6ea36938dc0c3ac7417dd825f4
SHA256d5f09247abdaa637c3ca75ab68348a69376d042ca6fed2536c316244f623f689
SHA512db37f625212f5c5c0f349a2f5d977c7916463fd5146220db4ff552349b6c57871ccd84ee4ffd701918852d71e3ab8630c93e5a5aa8bb99bbfd7c2e9465dadcef