Analysis

  • max time kernel
    88s
  • max time network
    117s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    27-07-2021 15:13

General

  • Target

    HSBC_PAYMENT_COPY.pdf.exe

  • Size

    1.4MB

  • MD5

    08f2609e7f7daf0f78032f773a68b72c

  • SHA1

    f00e4c61cce15ee5f43c032d8d595aba65fbdc86

  • SHA256

    0ed8f93b98f9cfff89559df9e0a8d360cab3dde1abfa2992216b4a98c5ca1253

  • SHA512

    8c1ba503d2956ad0c60b11547908b81e601a3bfb2c75ae73c03718bd883ff94451b0697f915049614470d59388d161c02893ad90b48466f77fc154a20215da74

Malware Config

Signatures

  • RevcodeRat, WebMonitorRat

    WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.

  • WebMonitor Payload 3 IoCs
  • CustAttr .NET packer 1 IoCs

    Detects CustAttr .NET packer in memory.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HSBC_PAYMENT_COPY.pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\HSBC_PAYMENT_COPY.pdf.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3256
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\HSBC_PAYMENT_COPY.pdf.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2132
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\WTddvQz.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3956
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WTddvQz" /XML "C:\Users\Admin\AppData\Local\Temp\tmpDD56.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:1124
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\WTddvQz.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3544
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
        PID:2904
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        2⤵
          PID:1848
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          2⤵
            PID:2508
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            2⤵
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2544
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\b9rssXR6bEOmXBoW.bat" "
              3⤵
                PID:2980

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

            MD5

            1c19c16e21c97ed42d5beabc93391fc5

            SHA1

            8ad83f8e0b3acf8dfbbf87931e41f0d664c4df68

            SHA256

            1bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05

            SHA512

            7d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            MD5

            bcd8d4518f1c5e9adf0a7394cd6a96dd

            SHA1

            b1ff1f4d0571d9e685d9c2e66c7ed5eee52f123b

            SHA256

            411865d5f1ac32d3989775f5345e3f82d677fd60b408ba06835aaa950f853c69

            SHA512

            45d9e9d799783b36071b7bdad039366e86054c2eec526ce2c38eb2f199fdf93b7e4bca1c779de271b9e4f83fefb197c2ad4a719a63014d1e1033e43ebaf44f8f

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            MD5

            ab8ff1bff6bf888074c8d480d5f6d509

            SHA1

            7b4082d2143e068f687b61ffa315156a9b99f132

            SHA256

            2a3d73953a9707e5fb45e29f89b86fb86ef2fd90a7e8fc5c1c94f9a9f4c57826

            SHA512

            3ad177a6409d5a7e46d8710122455445e2275b3db8791ac7dce602f1486f0f4dc0fac9c625fbd9cf8e2291f23e96b2cfb041135c94d6e5b26f31a9460aca6cb1

          • C:\Users\Admin\AppData\Local\Temp\b9rssXR6bEOmXBoW.bat

            MD5

            566deed6b247ce6fe4c3f72936440ea0

            SHA1

            e59ffd71c1d28593bb01177f77ddd9cd39a17fb5

            SHA256

            99f20366de63ee626b1f201d218fdbab40ec175ccb47a9b9d6ea8d071f6ad701

            SHA512

            36163da6ac8c1db21e13586af0faa344eb695cb39a712d724b431a520f4d6beb2370b41ac00cad9685d43f1cb7fa14bc67f8e37001fac4986c5c849f87573c6c

          • C:\Users\Admin\AppData\Local\Temp\tmpDD56.tmp

            MD5

            b09c39ec8d3fe0050b3f5742571b0a7a

            SHA1

            2b185059761351b3466fb8c1d2eba182b1b99beb

            SHA256

            f676c7c0ee5734bc5326878ece55ce7916e7b2d3c6c9faa6f2fbb7ced4cefeab

            SHA512

            1847f0a3396cfedc1b457d511f828a763ab6bc6808f5df864521311bad166dc53b2e6662160fbd853e56406a788e40721b4683516163ab8b8c44361555d84ef9

          • memory/1124-126-0x0000000000000000-mapping.dmp

          • memory/2132-148-0x0000000007100000-0x0000000007101000-memory.dmp

            Filesize

            4KB

          • memory/2132-195-0x000000007F160000-0x000000007F161000-memory.dmp

            Filesize

            4KB

          • memory/2132-260-0x0000000007103000-0x0000000007104000-memory.dmp

            Filesize

            4KB

          • memory/2132-124-0x0000000000000000-mapping.dmp

          • memory/2132-154-0x0000000007102000-0x0000000007103000-memory.dmp

            Filesize

            4KB

          • memory/2132-149-0x00000000080C0000-0x00000000080C1000-memory.dmp

            Filesize

            4KB

          • memory/2132-131-0x0000000006F60000-0x0000000006F61000-memory.dmp

            Filesize

            4KB

          • memory/2132-133-0x0000000007740000-0x0000000007741000-memory.dmp

            Filesize

            4KB

          • memory/2544-156-0x0000000000400000-0x00000000004F3000-memory.dmp

            Filesize

            972KB

          • memory/2544-140-0x000000000049D8CA-mapping.dmp

          • memory/2544-137-0x0000000000400000-0x00000000004F3000-memory.dmp

            Filesize

            972KB

          • memory/2980-495-0x0000000000000000-mapping.dmp

          • memory/3256-117-0x0000000004DF0000-0x0000000004DF1000-memory.dmp

            Filesize

            4KB

          • memory/3256-123-0x0000000008BC0000-0x0000000008CB5000-memory.dmp

            Filesize

            980KB

          • memory/3256-118-0x0000000004E90000-0x0000000004E91000-memory.dmp

            Filesize

            4KB

          • memory/3256-121-0x00000000071B0000-0x00000000071BB000-memory.dmp

            Filesize

            44KB

          • memory/3256-114-0x00000000003C0000-0x00000000003C1000-memory.dmp

            Filesize

            4KB

          • memory/3256-119-0x0000000004D60000-0x0000000004D61000-memory.dmp

            Filesize

            4KB

          • memory/3256-116-0x0000000005250000-0x0000000005251000-memory.dmp

            Filesize

            4KB

          • memory/3256-120-0x0000000004D50000-0x000000000524E000-memory.dmp

            Filesize

            5.0MB

          • memory/3256-122-0x00000000089A0000-0x0000000008AC5000-memory.dmp

            Filesize

            1.1MB

          • memory/3544-152-0x0000000002902000-0x0000000002903000-memory.dmp

            Filesize

            4KB

          • memory/3544-157-0x0000000002900000-0x0000000002901000-memory.dmp

            Filesize

            4KB

          • memory/3544-263-0x0000000002903000-0x0000000002904000-memory.dmp

            Filesize

            4KB

          • memory/3544-136-0x0000000000000000-mapping.dmp

          • memory/3544-252-0x000000007F110000-0x000000007F111000-memory.dmp

            Filesize

            4KB

          • memory/3956-163-0x0000000008070000-0x0000000008071000-memory.dmp

            Filesize

            4KB

          • memory/3956-192-0x000000007EE00000-0x000000007EE01000-memory.dmp

            Filesize

            4KB

          • memory/3956-187-0x0000000008BF0000-0x0000000008C23000-memory.dmp

            Filesize

            204KB

          • memory/3956-203-0x0000000008BD0000-0x0000000008BD1000-memory.dmp

            Filesize

            4KB

          • memory/3956-215-0x0000000008DB0000-0x0000000008DB1000-memory.dmp

            Filesize

            4KB

          • memory/3956-166-0x0000000007E30000-0x0000000007E31000-memory.dmp

            Filesize

            4KB

          • memory/3956-256-0x00000000066C3000-0x00000000066C4000-memory.dmp

            Filesize

            4KB

          • memory/3956-161-0x0000000007A40000-0x0000000007A41000-memory.dmp

            Filesize

            4KB

          • memory/3956-155-0x00000000066C2000-0x00000000066C3000-memory.dmp

            Filesize

            4KB

          • memory/3956-125-0x0000000000000000-mapping.dmp

          • memory/3956-153-0x00000000066C0000-0x00000000066C1000-memory.dmp

            Filesize

            4KB

          • memory/3956-144-0x0000000007650000-0x0000000007651000-memory.dmp

            Filesize

            4KB

          • memory/3956-141-0x0000000007470000-0x0000000007471000-memory.dmp

            Filesize

            4KB

          • memory/3956-138-0x00000000073D0000-0x00000000073D1000-memory.dmp

            Filesize

            4KB