Analysis

  • max time kernel
    135s
  • max time network
    136s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    25-05-2021 06:20

General

  • Target

    BjHM6PDDCwG9GvC.exe

  • Size

    1.3MB

  • MD5

    58753a65f6bcaf7b06217d456bd3fa1a

  • SHA1

    5031df39b31c8ceb0ad15e80156a2349c2fd5ade

  • SHA256

    d4511fa399217b186b74d425d5a0857ae7fe394c9993d76f79beccf2ecea92e2

  • SHA512

    47ba296df03054cf97a865d24de2ec87e20c9865963cdafa4eee86736e1af1003463d2b0623467d70756d286f9917d31a4a2deb9d0d8c28e7ed345f0b015fd35

Malware Config

Signatures

  • RevcodeRat, WebMonitorRat

    WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.

  • WebMonitor Payload 3 IoCs
  • CustAttr .NET packer 1 IoCs

    Detects CustAttr .NET packer in memory.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BjHM6PDDCwG9GvC.exe
    "C:\Users\Admin\AppData\Local\Temp\BjHM6PDDCwG9GvC.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:644
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\BjHM6PDDCwG9GvC.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1864
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\FcngqEfa.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4092
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FcngqEfa" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6117.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:1136
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\FcngqEfa.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3872
    • C:\Users\Admin\AppData\Local\Temp\BjHM6PDDCwG9GvC.exe
      "C:\Users\Admin\AppData\Local\Temp\BjHM6PDDCwG9GvC.exe"
      2⤵
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2064
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fMeWd68UncgSctQp.bat" "
        3⤵
          PID:1268

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/644-121-0x00000000057E0000-0x00000000057E1000-memory.dmp

      Filesize

      4KB

    • memory/644-122-0x00000000051A0000-0x00000000051A5000-memory.dmp

      Filesize

      20KB

    • memory/644-123-0x0000000004DE0000-0x00000000052DE000-memory.dmp

      Filesize

      5.0MB

    • memory/644-124-0x00000000074C0000-0x00000000075CD000-memory.dmp

      Filesize

      1.1MB

    • memory/644-125-0x0000000009C10000-0x0000000009D3F000-memory.dmp

      Filesize

      1.2MB

    • memory/644-116-0x0000000004D40000-0x0000000004D41000-memory.dmp

      Filesize

      4KB

    • memory/644-120-0x0000000004F40000-0x0000000004F41000-memory.dmp

      Filesize

      4KB

    • memory/644-114-0x0000000000300000-0x0000000000301000-memory.dmp

      Filesize

      4KB

    • memory/644-117-0x00000000052E0000-0x00000000052E1000-memory.dmp

      Filesize

      4KB

    • memory/644-118-0x0000000004DE0000-0x0000000004DE1000-memory.dmp

      Filesize

      4KB

    • memory/644-119-0x0000000002910000-0x0000000002911000-memory.dmp

      Filesize

      4KB

    • memory/1864-137-0x0000000004F62000-0x0000000004F63000-memory.dmp

      Filesize

      4KB

    • memory/1864-136-0x0000000004F60000-0x0000000004F61000-memory.dmp

      Filesize

      4KB

    • memory/1864-132-0x0000000007950000-0x0000000007951000-memory.dmp

      Filesize

      4KB

    • memory/1864-129-0x0000000004F70000-0x0000000004F71000-memory.dmp

      Filesize

      4KB

    • memory/1864-164-0x00000000082A0000-0x00000000082A1000-memory.dmp

      Filesize

      4KB

    • memory/1864-197-0x0000000004F63000-0x0000000004F64000-memory.dmp

      Filesize

      4KB

    • memory/1864-193-0x000000007F440000-0x000000007F441000-memory.dmp

      Filesize

      4KB

    • memory/1864-167-0x0000000008750000-0x0000000008751000-memory.dmp

      Filesize

      4KB

    • memory/2064-143-0x0000000000400000-0x00000000004F3000-memory.dmp

      Filesize

      972KB

    • memory/2064-151-0x0000000000400000-0x00000000004F3000-memory.dmp

      Filesize

      972KB

    • memory/3872-155-0x0000000007B10000-0x0000000007B11000-memory.dmp

      Filesize

      4KB

    • memory/3872-152-0x0000000007A10000-0x0000000007A11000-memory.dmp

      Filesize

      4KB

    • memory/3872-158-0x0000000007B80000-0x0000000007B81000-memory.dmp

      Filesize

      4KB

    • memory/3872-150-0x0000000006B72000-0x0000000006B73000-memory.dmp

      Filesize

      4KB

    • memory/3872-194-0x000000007E920000-0x000000007E921000-memory.dmp

      Filesize

      4KB

    • memory/3872-196-0x0000000006B73000-0x0000000006B74000-memory.dmp

      Filesize

      4KB

    • memory/3872-149-0x0000000006B70000-0x0000000006B71000-memory.dmp

      Filesize

      4KB

    • memory/4092-195-0x0000000000F93000-0x0000000000F94000-memory.dmp

      Filesize

      4KB

    • memory/4092-192-0x000000007F090000-0x000000007F091000-memory.dmp

      Filesize

      4KB

    • memory/4092-170-0x0000000007CB0000-0x0000000007CB1000-memory.dmp

      Filesize

      4KB

    • memory/4092-138-0x0000000000F90000-0x0000000000F91000-memory.dmp

      Filesize

      4KB

    • memory/4092-139-0x0000000000F92000-0x0000000000F93000-memory.dmp

      Filesize

      4KB