Analysis
-
max time kernel
112s -
max time network
118s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
21-07-2021 15:03
Static task
static1
Behavioral task
behavioral1
Sample
FILE_2932NH_9923.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
FILE_2932NH_9923.exe
Resource
win10v20210408
General
-
Target
FILE_2932NH_9923.exe
-
Size
1.9MB
-
MD5
1372b32848411ad39f19abe9d74b052f
-
SHA1
b47548451a323c3ae62b25ee6b65f1fe76837639
-
SHA256
7696274f6270b793b2dffc5b283a104be475d79b440500478780e24f6436fd5a
-
SHA512
ed15a4855f25b2ff6a00c2e19c4def71aac1d27945d249dbb26718107dbe48a4c3176be1e07cd1f5de29b7d3aeffb2530fb89c70c0f1e9ba77dc0c9bd3396942
Malware Config
Signatures
-
RevcodeRat, WebMonitorRat
WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.
-
WebMonitor Payload 3 IoCs
resource yara_rule behavioral2/memory/2056-139-0x0000000000400000-0x00000000004F3000-memory.dmp family_webmonitor behavioral2/memory/2056-140-0x000000000049D8CA-mapping.dmp family_webmonitor behavioral2/memory/2056-159-0x0000000000400000-0x00000000004F3000-memory.dmp family_webmonitor -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 996 set thread context of 2056 996 FILE_2932NH_9923.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3908 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 996 FILE_2932NH_9923.exe 3116 powershell.exe 1840 powershell.exe 1648 powershell.exe 3116 powershell.exe 1648 powershell.exe 1840 powershell.exe 3116 powershell.exe 1648 powershell.exe 1840 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1648 powershell.exe Token: SeDebugPrivilege 3116 powershell.exe Token: SeDebugPrivilege 996 FILE_2932NH_9923.exe Token: SeDebugPrivilege 1840 powershell.exe Token: SeShutdownPrivilege 2056 RegSvcs.exe Token: SeCreatePagefilePrivilege 2056 RegSvcs.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 996 wrote to memory of 3116 996 FILE_2932NH_9923.exe 78 PID 996 wrote to memory of 3116 996 FILE_2932NH_9923.exe 78 PID 996 wrote to memory of 3116 996 FILE_2932NH_9923.exe 78 PID 996 wrote to memory of 1648 996 FILE_2932NH_9923.exe 80 PID 996 wrote to memory of 1648 996 FILE_2932NH_9923.exe 80 PID 996 wrote to memory of 1648 996 FILE_2932NH_9923.exe 80 PID 996 wrote to memory of 3908 996 FILE_2932NH_9923.exe 82 PID 996 wrote to memory of 3908 996 FILE_2932NH_9923.exe 82 PID 996 wrote to memory of 3908 996 FILE_2932NH_9923.exe 82 PID 996 wrote to memory of 1840 996 FILE_2932NH_9923.exe 84 PID 996 wrote to memory of 1840 996 FILE_2932NH_9923.exe 84 PID 996 wrote to memory of 1840 996 FILE_2932NH_9923.exe 84 PID 996 wrote to memory of 2056 996 FILE_2932NH_9923.exe 86 PID 996 wrote to memory of 2056 996 FILE_2932NH_9923.exe 86 PID 996 wrote to memory of 2056 996 FILE_2932NH_9923.exe 86 PID 996 wrote to memory of 2056 996 FILE_2932NH_9923.exe 86 PID 996 wrote to memory of 2056 996 FILE_2932NH_9923.exe 86 PID 996 wrote to memory of 2056 996 FILE_2932NH_9923.exe 86 PID 996 wrote to memory of 2056 996 FILE_2932NH_9923.exe 86 PID 996 wrote to memory of 2056 996 FILE_2932NH_9923.exe 86 PID 996 wrote to memory of 2056 996 FILE_2932NH_9923.exe 86 PID 2056 wrote to memory of 2608 2056 RegSvcs.exe 88 PID 2056 wrote to memory of 2608 2056 RegSvcs.exe 88 PID 2056 wrote to memory of 2608 2056 RegSvcs.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\FILE_2932NH_9923.exe"C:\Users\Admin\AppData\Local\Temp\FILE_2932NH_9923.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\FILE_2932NH_9923.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3116
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\DqkJYq.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1648
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DqkJYq" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6A63.tmp"2⤵
- Creates scheduled task(s)
PID:3908
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\DqkJYq.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1840
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dwX5c3Yf8iQTU7td.bat" "3⤵PID:2608
-
-