Analysis
-
max time kernel
145s -
max time network
189s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
15-05-2021 12:39
Static task
static1
Behavioral task
behavioral1
Sample
0b41b1f1d338b4b082a88a385334d4cc85b6b7ef582bf15c5bd104839f195348.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
0b41b1f1d338b4b082a88a385334d4cc85b6b7ef582bf15c5bd104839f195348.exe
Resource
win10v20210410
General
-
Target
0b41b1f1d338b4b082a88a385334d4cc85b6b7ef582bf15c5bd104839f195348.exe
-
Size
1.6MB
-
MD5
727c2d4c6016849316ae589295508acc
-
SHA1
9782d9c356d7c7f83a92daf941cd0e34b2301e32
-
SHA256
0b41b1f1d338b4b082a88a385334d4cc85b6b7ef582bf15c5bd104839f195348
-
SHA512
cf083b91c210cc43006410648d096519cc45f6d2db40f2980f4b2816784ddfa8cf2b40b5eec277e0986cd192d3285806293d17ffd944d3376e9fa6798324bab8
Malware Config
Signatures
-
RevcodeRat, WebMonitorRat
WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.
-
Executes dropped EXE 2 IoCs
pid Process 1988 regsa.exe 2020 crd_kg.exe -
resource yara_rule behavioral1/memory/1988-75-0x0000000000AE0000-0x0000000000B2B000-memory.dmp upx behavioral1/memory/832-76-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral1/memory/832-79-0x0000000000400000-0x00000000004C1000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\regas.exe = "C:\\Users\\Admin\\AppData\\Roaming\\regas.exe" regsa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\WebMonitor-3033 = "C:\\Users\\Admin\\AppData\\Roaming\\WebMonitor-3033.exe" RegAsm.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1988 set thread context of 832 1988 regsa.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1988 regsa.exe 1988 regsa.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1988 regsa.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1804 wrote to memory of 1988 1804 0b41b1f1d338b4b082a88a385334d4cc85b6b7ef582bf15c5bd104839f195348.exe 25 PID 1804 wrote to memory of 1988 1804 0b41b1f1d338b4b082a88a385334d4cc85b6b7ef582bf15c5bd104839f195348.exe 25 PID 1804 wrote to memory of 1988 1804 0b41b1f1d338b4b082a88a385334d4cc85b6b7ef582bf15c5bd104839f195348.exe 25 PID 1804 wrote to memory of 1988 1804 0b41b1f1d338b4b082a88a385334d4cc85b6b7ef582bf15c5bd104839f195348.exe 25 PID 1804 wrote to memory of 2020 1804 0b41b1f1d338b4b082a88a385334d4cc85b6b7ef582bf15c5bd104839f195348.exe 27 PID 1804 wrote to memory of 2020 1804 0b41b1f1d338b4b082a88a385334d4cc85b6b7ef582bf15c5bd104839f195348.exe 27 PID 1804 wrote to memory of 2020 1804 0b41b1f1d338b4b082a88a385334d4cc85b6b7ef582bf15c5bd104839f195348.exe 27 PID 1804 wrote to memory of 2020 1804 0b41b1f1d338b4b082a88a385334d4cc85b6b7ef582bf15c5bd104839f195348.exe 27 PID 1988 wrote to memory of 832 1988 regsa.exe 28 PID 1988 wrote to memory of 832 1988 regsa.exe 28 PID 1988 wrote to memory of 832 1988 regsa.exe 28 PID 1988 wrote to memory of 832 1988 regsa.exe 28 PID 1988 wrote to memory of 832 1988 regsa.exe 28 PID 1988 wrote to memory of 832 1988 regsa.exe 28 PID 1988 wrote to memory of 832 1988 regsa.exe 28 PID 1988 wrote to memory of 832 1988 regsa.exe 28 PID 1988 wrote to memory of 832 1988 regsa.exe 28 PID 1988 wrote to memory of 832 1988 regsa.exe 28 PID 1988 wrote to memory of 832 1988 regsa.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b41b1f1d338b4b082a88a385334d4cc85b6b7ef582bf15c5bd104839f195348.exe"C:\Users\Admin\AppData\Local\Temp\0b41b1f1d338b4b082a88a385334d4cc85b6b7ef582bf15c5bd104839f195348.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\regsa.exeC:\Users\Admin\AppData\Local\Temp/regsa.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"3⤵
- Adds Run key to start application
PID:832
-
-
-
C:\Users\Admin\AppData\Local\Temp\crd_kg.exeC:\Users\Admin\AppData\Local\Temp/crd_kg.exe2⤵
- Executes dropped EXE
PID:2020
-