Analysis
-
max time kernel
134s -
max time network
132s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
11-05-2021 06:41
Static task
static1
Behavioral task
behavioral1
Sample
INVOICE20210511.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
INVOICE20210511.exe
Resource
win10v20210410
General
-
Target
INVOICE20210511.exe
-
Size
1.3MB
-
MD5
63f0d02851b4513b062581c91b62132b
-
SHA1
18a60c599d7e5daba6d6982ae33ca14d4e4067df
-
SHA256
fae42a1d8dbd274ade612e53f14f4f48213f7397e413b32fb499ecf4179409b0
-
SHA512
6407a553565fecf34f2f6fb4afb755ee262be43f19469e67e529fb1fc2c6559eba7a6867f9d059d35f39d7c86ae0fa84e8b10c3ce4e07050ea2a2dafd11e862e
Malware Config
Signatures
-
RevcodeRat, WebMonitorRat
WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.
-
WebMonitor Payload 3 IoCs
resource yara_rule behavioral2/memory/184-140-0x0000000000400000-0x00000000004F3000-memory.dmp family_webmonitor behavioral2/memory/184-142-0x000000000049D8CA-mapping.dmp family_webmonitor behavioral2/memory/184-162-0x0000000000400000-0x00000000004F3000-memory.dmp family_webmonitor -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3152 set thread context of 184 3152 INVOICE20210511.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3960 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3152 INVOICE20210511.exe 2128 powershell.exe 1280 powershell.exe 356 powershell.exe 1280 powershell.exe 2128 powershell.exe 356 powershell.exe 1280 powershell.exe 2128 powershell.exe 356 powershell.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 184 INVOICE20210511.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3152 INVOICE20210511.exe Token: SeDebugPrivilege 356 powershell.exe Token: SeDebugPrivilege 2128 powershell.exe Token: SeDebugPrivilege 1280 powershell.exe Token: SeShutdownPrivilege 184 INVOICE20210511.exe Token: SeCreatePagefilePrivilege 184 INVOICE20210511.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3152 wrote to memory of 356 3152 INVOICE20210511.exe 79 PID 3152 wrote to memory of 356 3152 INVOICE20210511.exe 79 PID 3152 wrote to memory of 356 3152 INVOICE20210511.exe 79 PID 3152 wrote to memory of 2128 3152 INVOICE20210511.exe 81 PID 3152 wrote to memory of 2128 3152 INVOICE20210511.exe 81 PID 3152 wrote to memory of 2128 3152 INVOICE20210511.exe 81 PID 3152 wrote to memory of 3960 3152 INVOICE20210511.exe 83 PID 3152 wrote to memory of 3960 3152 INVOICE20210511.exe 83 PID 3152 wrote to memory of 3960 3152 INVOICE20210511.exe 83 PID 3152 wrote to memory of 1280 3152 INVOICE20210511.exe 85 PID 3152 wrote to memory of 1280 3152 INVOICE20210511.exe 85 PID 3152 wrote to memory of 1280 3152 INVOICE20210511.exe 85 PID 3152 wrote to memory of 184 3152 INVOICE20210511.exe 87 PID 3152 wrote to memory of 184 3152 INVOICE20210511.exe 87 PID 3152 wrote to memory of 184 3152 INVOICE20210511.exe 87 PID 3152 wrote to memory of 184 3152 INVOICE20210511.exe 87 PID 3152 wrote to memory of 184 3152 INVOICE20210511.exe 87 PID 3152 wrote to memory of 184 3152 INVOICE20210511.exe 87 PID 3152 wrote to memory of 184 3152 INVOICE20210511.exe 87 PID 3152 wrote to memory of 184 3152 INVOICE20210511.exe 87 PID 3152 wrote to memory of 184 3152 INVOICE20210511.exe 87 PID 184 wrote to memory of 3700 184 INVOICE20210511.exe 89 PID 184 wrote to memory of 3700 184 INVOICE20210511.exe 89 PID 184 wrote to memory of 3700 184 INVOICE20210511.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\INVOICE20210511.exe"C:\Users\Admin\AppData\Local\Temp\INVOICE20210511.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\INVOICE20210511.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:356
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\nbBnuvGQkNaCaX.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2128
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\nbBnuvGQkNaCaX" /XML "C:\Users\Admin\AppData\Local\Temp\tmpEB0D.tmp"2⤵
- Creates scheduled task(s)
PID:3960
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\nbBnuvGQkNaCaX.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1280
-
-
C:\Users\Admin\AppData\Local\Temp\INVOICE20210511.exe"C:\Users\Admin\AppData\Local\Temp\INVOICE20210511.exe"2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:184 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1z3qqTh3PVxdIZpT.bat" "3⤵PID:3700
-
-