Analysis
-
max time kernel
112s -
max time network
118s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
21-07-2021 15:03
Static task
static1
Behavioral task
behavioral1
Sample
FILE_2932NH_9923.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
FILE_2932NH_9923.exe
Resource
win10v20210408
General
-
Target
FILE_2932NH_9923.exe
-
Size
1.9MB
-
MD5
1372b32848411ad39f19abe9d74b052f
-
SHA1
b47548451a323c3ae62b25ee6b65f1fe76837639
-
SHA256
7696274f6270b793b2dffc5b283a104be475d79b440500478780e24f6436fd5a
-
SHA512
ed15a4855f25b2ff6a00c2e19c4def71aac1d27945d249dbb26718107dbe48a4c3176be1e07cd1f5de29b7d3aeffb2530fb89c70c0f1e9ba77dc0c9bd3396942
Malware Config
Signatures
-
RevcodeRat, WebMonitorRat
WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.
-
WebMonitor Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2056-139-0x0000000000400000-0x00000000004F3000-memory.dmp family_webmonitor behavioral2/memory/2056-140-0x000000000049D8CA-mapping.dmp family_webmonitor behavioral2/memory/2056-159-0x0000000000400000-0x00000000004F3000-memory.dmp family_webmonitor -
Suspicious use of SetThreadContext 1 IoCs
Processes:
FILE_2932NH_9923.exedescription pid Process procid_target PID 996 set thread context of 2056 996 FILE_2932NH_9923.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
FILE_2932NH_9923.exepowershell.exepowershell.exepowershell.exepid Process 996 FILE_2932NH_9923.exe 3116 powershell.exe 1840 powershell.exe 1648 powershell.exe 3116 powershell.exe 1648 powershell.exe 1840 powershell.exe 3116 powershell.exe 1648 powershell.exe 1840 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
powershell.exepowershell.exeFILE_2932NH_9923.exepowershell.exeRegSvcs.exedescription pid Process Token: SeDebugPrivilege 1648 powershell.exe Token: SeDebugPrivilege 3116 powershell.exe Token: SeDebugPrivilege 996 FILE_2932NH_9923.exe Token: SeDebugPrivilege 1840 powershell.exe Token: SeShutdownPrivilege 2056 RegSvcs.exe Token: SeCreatePagefilePrivilege 2056 RegSvcs.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
FILE_2932NH_9923.exeRegSvcs.exedescription pid Process procid_target PID 996 wrote to memory of 3116 996 FILE_2932NH_9923.exe 78 PID 996 wrote to memory of 3116 996 FILE_2932NH_9923.exe 78 PID 996 wrote to memory of 3116 996 FILE_2932NH_9923.exe 78 PID 996 wrote to memory of 1648 996 FILE_2932NH_9923.exe 80 PID 996 wrote to memory of 1648 996 FILE_2932NH_9923.exe 80 PID 996 wrote to memory of 1648 996 FILE_2932NH_9923.exe 80 PID 996 wrote to memory of 3908 996 FILE_2932NH_9923.exe 82 PID 996 wrote to memory of 3908 996 FILE_2932NH_9923.exe 82 PID 996 wrote to memory of 3908 996 FILE_2932NH_9923.exe 82 PID 996 wrote to memory of 1840 996 FILE_2932NH_9923.exe 84 PID 996 wrote to memory of 1840 996 FILE_2932NH_9923.exe 84 PID 996 wrote to memory of 1840 996 FILE_2932NH_9923.exe 84 PID 996 wrote to memory of 2056 996 FILE_2932NH_9923.exe 86 PID 996 wrote to memory of 2056 996 FILE_2932NH_9923.exe 86 PID 996 wrote to memory of 2056 996 FILE_2932NH_9923.exe 86 PID 996 wrote to memory of 2056 996 FILE_2932NH_9923.exe 86 PID 996 wrote to memory of 2056 996 FILE_2932NH_9923.exe 86 PID 996 wrote to memory of 2056 996 FILE_2932NH_9923.exe 86 PID 996 wrote to memory of 2056 996 FILE_2932NH_9923.exe 86 PID 996 wrote to memory of 2056 996 FILE_2932NH_9923.exe 86 PID 996 wrote to memory of 2056 996 FILE_2932NH_9923.exe 86 PID 2056 wrote to memory of 2608 2056 RegSvcs.exe 88 PID 2056 wrote to memory of 2608 2056 RegSvcs.exe 88 PID 2056 wrote to memory of 2608 2056 RegSvcs.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\FILE_2932NH_9923.exe"C:\Users\Admin\AppData\Local\Temp\FILE_2932NH_9923.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\FILE_2932NH_9923.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3116
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\DqkJYq.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1648
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DqkJYq" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6A63.tmp"2⤵
- Creates scheduled task(s)
PID:3908
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\DqkJYq.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1840
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dwX5c3Yf8iQTU7td.bat" "3⤵PID:2608
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
1c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
MD5
7247129cd0644457905b7d6bf17fd078
SHA1dbf9139b5a1b72141f170d2eae911bbbe7e128c8
SHA256dfa6e0d79449f29310b2a0400dc7fa5a3a6b08182233147a81902d1f80a0f8e4
SHA5129b1ebd7fe485811f10ec02778d90a7f7eccafa0231027b640b94eaed8408107051da7fcc4f17a9aa0eef900fa2595f44be7fd115331fb6da9b10076f5fcf87e0
-
MD5
7247129cd0644457905b7d6bf17fd078
SHA1dbf9139b5a1b72141f170d2eae911bbbe7e128c8
SHA256dfa6e0d79449f29310b2a0400dc7fa5a3a6b08182233147a81902d1f80a0f8e4
SHA5129b1ebd7fe485811f10ec02778d90a7f7eccafa0231027b640b94eaed8408107051da7fcc4f17a9aa0eef900fa2595f44be7fd115331fb6da9b10076f5fcf87e0
-
MD5
0b5d94d20be9eecbaed3dddd04143f07
SHA1c677d0355f4cc7301075a554adc889bce502e15a
SHA2563c6f74219d419accdd3de0d14fa46ff290fd430eddcc5352deddd7de59b4928c
SHA512395e5d0f28819f773b8d53363b7df73cc976124d1accce104390fdb3f5ebf57d8bb357e616910c03e1a9d67985704592640e442bd637009e32086bb1b2088916
-
MD5
a24f01a372aa4814c538b856e9329502
SHA1be85a69b5d7d8ccb84fc39d71830d6e49ad37994
SHA256becbfde127d5cef3440e90d91e849588818da16ae1ee2af18ac6ac3101a5f8b0
SHA51203f3e97e5e1a3a0ff4e96a6159119f50a4be6b9c1c8c1eb4ca7ed3be42fce49a3966fdb9d30f50131e0094c1b0e8a0fbbd8576f62779d1825c82388d77d2b424
-
MD5
6b09edf9b3e075658999cddb26f79b64
SHA110fffb7743460538c3adf61f72ea6f661b02f626
SHA2569272070f68335264668256c130e0b052dd2fc3ec54eeea3ada6b47b326810ac7
SHA51258fd0ab799bba7d7a798fb6e79c16ab5fee37af3b67265b01c1249d4dac7d22f2b6aca8321676b1c9848de2fec95669a1bea5a6d5e14254e063dfbcc0bd8dfc8
-
MD5
9d3d1196c4fb801994c20ddd945b6317
SHA1d2ea040bc327607376d87376cde89dfb11969b03
SHA256a2d3f984cf2e45e1b93e353d1676c1db3f193b7b6d65210fc89369dfefd765bc
SHA512c9e9c45457f87922f69471803ced26333363cd80ccd4cd2fe081935141e1072d4a56d1e7cc751476e76f9fb4773d3cdeaa6d08e8aa7f902211fb6638a9571fd0