Analysis

  • max time kernel
    150s
  • max time network
    187s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    21-07-2021 15:03

General

  • Target

    FILE_2932NH_9923.exe

  • Size

    1.9MB

  • MD5

    1372b32848411ad39f19abe9d74b052f

  • SHA1

    b47548451a323c3ae62b25ee6b65f1fe76837639

  • SHA256

    7696274f6270b793b2dffc5b283a104be475d79b440500478780e24f6436fd5a

  • SHA512

    ed15a4855f25b2ff6a00c2e19c4def71aac1d27945d249dbb26718107dbe48a4c3176be1e07cd1f5de29b7d3aeffb2530fb89c70c0f1e9ba77dc0c9bd3396942

Malware Config

Signatures

  • RevcodeRat, WebMonitorRat

    WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.

  • WebMonitor Payload 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FILE_2932NH_9923.exe
    "C:\Users\Admin\AppData\Local\Temp\FILE_2932NH_9923.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\FILE_2932NH_9923.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1476
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\DqkJYq.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1896
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DqkJYq" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8D7.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:852
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\DqkJYq.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:760
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1160

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/760-113-0x0000000006340000-0x0000000006341000-memory.dmp

    Filesize

    4KB

  • memory/760-137-0x00000000063C0000-0x00000000063C1000-memory.dmp

    Filesize

    4KB

  • memory/760-138-0x00000000063D0000-0x00000000063D1000-memory.dmp

    Filesize

    4KB

  • memory/760-94-0x00000000027D0000-0x00000000027D1000-memory.dmp

    Filesize

    4KB

  • memory/760-99-0x0000000005750000-0x0000000005751000-memory.dmp

    Filesize

    4KB

  • memory/760-104-0x000000007EF30000-0x000000007EF31000-memory.dmp

    Filesize

    4KB

  • memory/760-105-0x00000000057B0000-0x00000000057B1000-memory.dmp

    Filesize

    4KB

  • memory/760-106-0x00000000062A0000-0x00000000062A1000-memory.dmp

    Filesize

    4KB

  • memory/760-121-0x00000000056D0000-0x00000000056D1000-memory.dmp

    Filesize

    4KB

  • memory/760-85-0x0000000004960000-0x0000000004961000-memory.dmp

    Filesize

    4KB

  • memory/760-86-0x0000000004962000-0x0000000004963000-memory.dmp

    Filesize

    4KB

  • memory/1160-87-0x0000000000400000-0x00000000004F3000-memory.dmp

    Filesize

    972KB

  • memory/1160-93-0x0000000000400000-0x00000000004F3000-memory.dmp

    Filesize

    972KB

  • memory/1160-157-0x0000000002CF0000-0x0000000003CF0000-memory.dmp

    Filesize

    16.0MB

  • memory/1476-83-0x0000000004872000-0x0000000004873000-memory.dmp

    Filesize

    4KB

  • memory/1476-66-0x00000000754F1000-0x00000000754F3000-memory.dmp

    Filesize

    8KB

  • memory/1476-74-0x00000000048B0000-0x00000000048B1000-memory.dmp

    Filesize

    4KB

  • memory/1476-81-0x0000000004870000-0x0000000004871000-memory.dmp

    Filesize

    4KB

  • memory/1476-72-0x00000000009D0000-0x00000000009D1000-memory.dmp

    Filesize

    4KB

  • memory/1896-82-0x0000000004900000-0x0000000004901000-memory.dmp

    Filesize

    4KB

  • memory/1896-84-0x0000000004902000-0x0000000004903000-memory.dmp

    Filesize

    4KB

  • memory/1896-90-0x0000000001190000-0x0000000001191000-memory.dmp

    Filesize

    4KB

  • memory/2020-59-0x0000000000C00000-0x0000000000C01000-memory.dmp

    Filesize

    4KB

  • memory/2020-64-0x00000000084C0000-0x00000000085B5000-memory.dmp

    Filesize

    980KB

  • memory/2020-63-0x00000000081E0000-0x0000000008317000-memory.dmp

    Filesize

    1.2MB

  • memory/2020-62-0x00000000008D0000-0x00000000008EB000-memory.dmp

    Filesize

    108KB

  • memory/2020-61-0x00000000048E0000-0x00000000048E1000-memory.dmp

    Filesize

    4KB