Analysis
-
max time kernel
88s -
max time network
117s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
27-07-2021 15:13
Static task
static1
Behavioral task
behavioral1
Sample
HSBC_PAYMENT_COPY.pdf.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
HSBC_PAYMENT_COPY.pdf.exe
Resource
win10v20210410
General
-
Target
HSBC_PAYMENT_COPY.pdf.exe
-
Size
1.4MB
-
MD5
08f2609e7f7daf0f78032f773a68b72c
-
SHA1
f00e4c61cce15ee5f43c032d8d595aba65fbdc86
-
SHA256
0ed8f93b98f9cfff89559df9e0a8d360cab3dde1abfa2992216b4a98c5ca1253
-
SHA512
8c1ba503d2956ad0c60b11547908b81e601a3bfb2c75ae73c03718bd883ff94451b0697f915049614470d59388d161c02893ad90b48466f77fc154a20215da74
Malware Config
Signatures
-
RevcodeRat, WebMonitorRat
WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.
-
WebMonitor Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2544-137-0x0000000000400000-0x00000000004F3000-memory.dmp family_webmonitor behavioral2/memory/2544-140-0x000000000049D8CA-mapping.dmp family_webmonitor behavioral2/memory/2544-156-0x0000000000400000-0x00000000004F3000-memory.dmp family_webmonitor -
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
Processes:
resource yara_rule behavioral2/memory/3256-121-0x00000000071B0000-0x00000000071BB000-memory.dmp CustAttr -
Suspicious use of SetThreadContext 1 IoCs
Processes:
HSBC_PAYMENT_COPY.pdf.exedescription pid Process procid_target PID 3256 set thread context of 2544 3256 HSBC_PAYMENT_COPY.pdf.exe 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
HSBC_PAYMENT_COPY.pdf.exepowershell.exepowershell.exepowershell.exepid Process 3256 HSBC_PAYMENT_COPY.pdf.exe 3256 HSBC_PAYMENT_COPY.pdf.exe 3256 HSBC_PAYMENT_COPY.pdf.exe 3256 HSBC_PAYMENT_COPY.pdf.exe 3256 HSBC_PAYMENT_COPY.pdf.exe 3256 HSBC_PAYMENT_COPY.pdf.exe 2132 powershell.exe 3956 powershell.exe 3256 HSBC_PAYMENT_COPY.pdf.exe 3956 powershell.exe 3544 powershell.exe 2132 powershell.exe 3544 powershell.exe 3956 powershell.exe 2132 powershell.exe 3544 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
HSBC_PAYMENT_COPY.pdf.exepowershell.exepowershell.exepowershell.exeRegSvcs.exedescription pid Process Token: SeDebugPrivilege 3256 HSBC_PAYMENT_COPY.pdf.exe Token: SeDebugPrivilege 2132 powershell.exe Token: SeDebugPrivilege 3956 powershell.exe Token: SeDebugPrivilege 3544 powershell.exe Token: SeShutdownPrivilege 2544 RegSvcs.exe Token: SeCreatePagefilePrivilege 2544 RegSvcs.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
HSBC_PAYMENT_COPY.pdf.exeRegSvcs.exedescription pid Process procid_target PID 3256 wrote to memory of 2132 3256 HSBC_PAYMENT_COPY.pdf.exe 79 PID 3256 wrote to memory of 2132 3256 HSBC_PAYMENT_COPY.pdf.exe 79 PID 3256 wrote to memory of 2132 3256 HSBC_PAYMENT_COPY.pdf.exe 79 PID 3256 wrote to memory of 3956 3256 HSBC_PAYMENT_COPY.pdf.exe 81 PID 3256 wrote to memory of 3956 3256 HSBC_PAYMENT_COPY.pdf.exe 81 PID 3256 wrote to memory of 3956 3256 HSBC_PAYMENT_COPY.pdf.exe 81 PID 3256 wrote to memory of 1124 3256 HSBC_PAYMENT_COPY.pdf.exe 83 PID 3256 wrote to memory of 1124 3256 HSBC_PAYMENT_COPY.pdf.exe 83 PID 3256 wrote to memory of 1124 3256 HSBC_PAYMENT_COPY.pdf.exe 83 PID 3256 wrote to memory of 3544 3256 HSBC_PAYMENT_COPY.pdf.exe 85 PID 3256 wrote to memory of 3544 3256 HSBC_PAYMENT_COPY.pdf.exe 85 PID 3256 wrote to memory of 3544 3256 HSBC_PAYMENT_COPY.pdf.exe 85 PID 3256 wrote to memory of 2904 3256 HSBC_PAYMENT_COPY.pdf.exe 86 PID 3256 wrote to memory of 2904 3256 HSBC_PAYMENT_COPY.pdf.exe 86 PID 3256 wrote to memory of 2904 3256 HSBC_PAYMENT_COPY.pdf.exe 86 PID 3256 wrote to memory of 1848 3256 HSBC_PAYMENT_COPY.pdf.exe 88 PID 3256 wrote to memory of 1848 3256 HSBC_PAYMENT_COPY.pdf.exe 88 PID 3256 wrote to memory of 1848 3256 HSBC_PAYMENT_COPY.pdf.exe 88 PID 3256 wrote to memory of 2508 3256 HSBC_PAYMENT_COPY.pdf.exe 89 PID 3256 wrote to memory of 2508 3256 HSBC_PAYMENT_COPY.pdf.exe 89 PID 3256 wrote to memory of 2508 3256 HSBC_PAYMENT_COPY.pdf.exe 89 PID 3256 wrote to memory of 2544 3256 HSBC_PAYMENT_COPY.pdf.exe 90 PID 3256 wrote to memory of 2544 3256 HSBC_PAYMENT_COPY.pdf.exe 90 PID 3256 wrote to memory of 2544 3256 HSBC_PAYMENT_COPY.pdf.exe 90 PID 3256 wrote to memory of 2544 3256 HSBC_PAYMENT_COPY.pdf.exe 90 PID 3256 wrote to memory of 2544 3256 HSBC_PAYMENT_COPY.pdf.exe 90 PID 3256 wrote to memory of 2544 3256 HSBC_PAYMENT_COPY.pdf.exe 90 PID 3256 wrote to memory of 2544 3256 HSBC_PAYMENT_COPY.pdf.exe 90 PID 3256 wrote to memory of 2544 3256 HSBC_PAYMENT_COPY.pdf.exe 90 PID 3256 wrote to memory of 2544 3256 HSBC_PAYMENT_COPY.pdf.exe 90 PID 2544 wrote to memory of 2980 2544 RegSvcs.exe 92 PID 2544 wrote to memory of 2980 2544 RegSvcs.exe 92 PID 2544 wrote to memory of 2980 2544 RegSvcs.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\HSBC_PAYMENT_COPY.pdf.exe"C:\Users\Admin\AppData\Local\Temp\HSBC_PAYMENT_COPY.pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\HSBC_PAYMENT_COPY.pdf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2132
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\WTddvQz.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3956
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WTddvQz" /XML "C:\Users\Admin\AppData\Local\Temp\tmpDD56.tmp"2⤵
- Creates scheduled task(s)
PID:1124
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\WTddvQz.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3544
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2904
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:1848
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2508
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\b9rssXR6bEOmXBoW.bat" "3⤵PID:2980
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
1c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
MD5
bcd8d4518f1c5e9adf0a7394cd6a96dd
SHA1b1ff1f4d0571d9e685d9c2e66c7ed5eee52f123b
SHA256411865d5f1ac32d3989775f5345e3f82d677fd60b408ba06835aaa950f853c69
SHA51245d9e9d799783b36071b7bdad039366e86054c2eec526ce2c38eb2f199fdf93b7e4bca1c779de271b9e4f83fefb197c2ad4a719a63014d1e1033e43ebaf44f8f
-
MD5
ab8ff1bff6bf888074c8d480d5f6d509
SHA17b4082d2143e068f687b61ffa315156a9b99f132
SHA2562a3d73953a9707e5fb45e29f89b86fb86ef2fd90a7e8fc5c1c94f9a9f4c57826
SHA5123ad177a6409d5a7e46d8710122455445e2275b3db8791ac7dce602f1486f0f4dc0fac9c625fbd9cf8e2291f23e96b2cfb041135c94d6e5b26f31a9460aca6cb1
-
MD5
566deed6b247ce6fe4c3f72936440ea0
SHA1e59ffd71c1d28593bb01177f77ddd9cd39a17fb5
SHA25699f20366de63ee626b1f201d218fdbab40ec175ccb47a9b9d6ea8d071f6ad701
SHA51236163da6ac8c1db21e13586af0faa344eb695cb39a712d724b431a520f4d6beb2370b41ac00cad9685d43f1cb7fa14bc67f8e37001fac4986c5c849f87573c6c
-
MD5
b09c39ec8d3fe0050b3f5742571b0a7a
SHA12b185059761351b3466fb8c1d2eba182b1b99beb
SHA256f676c7c0ee5734bc5326878ece55ce7916e7b2d3c6c9faa6f2fbb7ced4cefeab
SHA5121847f0a3396cfedc1b457d511f828a763ab6bc6808f5df864521311bad166dc53b2e6662160fbd853e56406a788e40721b4683516163ab8b8c44361555d84ef9