Analysis

  • max time kernel
    88s
  • max time network
    117s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    27-07-2021 15:13

General

  • Target

    HSBC_PAYMENT_COPY.pdf.exe

  • Size

    1.4MB

  • MD5

    08f2609e7f7daf0f78032f773a68b72c

  • SHA1

    f00e4c61cce15ee5f43c032d8d595aba65fbdc86

  • SHA256

    0ed8f93b98f9cfff89559df9e0a8d360cab3dde1abfa2992216b4a98c5ca1253

  • SHA512

    8c1ba503d2956ad0c60b11547908b81e601a3bfb2c75ae73c03718bd883ff94451b0697f915049614470d59388d161c02893ad90b48466f77fc154a20215da74

Malware Config

Signatures

  • RevcodeRat, WebMonitorRat

    WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.

  • WebMonitor Payload 3 IoCs
  • CustAttr .NET packer 1 IoCs

    Detects CustAttr .NET packer in memory.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HSBC_PAYMENT_COPY.pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\HSBC_PAYMENT_COPY.pdf.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3256
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\HSBC_PAYMENT_COPY.pdf.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2132
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\WTddvQz.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3956
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WTddvQz" /XML "C:\Users\Admin\AppData\Local\Temp\tmpDD56.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:1124
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\WTddvQz.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3544
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
        PID:2904
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        2⤵
          PID:1848
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          2⤵
            PID:2508
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            2⤵
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2544
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\b9rssXR6bEOmXBoW.bat" "
              3⤵
                PID:2980

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2132-148-0x0000000007100000-0x0000000007101000-memory.dmp

            Filesize

            4KB

          • memory/2132-195-0x000000007F160000-0x000000007F161000-memory.dmp

            Filesize

            4KB

          • memory/2132-260-0x0000000007103000-0x0000000007104000-memory.dmp

            Filesize

            4KB

          • memory/2132-154-0x0000000007102000-0x0000000007103000-memory.dmp

            Filesize

            4KB

          • memory/2132-149-0x00000000080C0000-0x00000000080C1000-memory.dmp

            Filesize

            4KB

          • memory/2132-131-0x0000000006F60000-0x0000000006F61000-memory.dmp

            Filesize

            4KB

          • memory/2132-133-0x0000000007740000-0x0000000007741000-memory.dmp

            Filesize

            4KB

          • memory/2544-156-0x0000000000400000-0x00000000004F3000-memory.dmp

            Filesize

            972KB

          • memory/2544-137-0x0000000000400000-0x00000000004F3000-memory.dmp

            Filesize

            972KB

          • memory/3256-117-0x0000000004DF0000-0x0000000004DF1000-memory.dmp

            Filesize

            4KB

          • memory/3256-123-0x0000000008BC0000-0x0000000008CB5000-memory.dmp

            Filesize

            980KB

          • memory/3256-118-0x0000000004E90000-0x0000000004E91000-memory.dmp

            Filesize

            4KB

          • memory/3256-121-0x00000000071B0000-0x00000000071BB000-memory.dmp

            Filesize

            44KB

          • memory/3256-114-0x00000000003C0000-0x00000000003C1000-memory.dmp

            Filesize

            4KB

          • memory/3256-119-0x0000000004D60000-0x0000000004D61000-memory.dmp

            Filesize

            4KB

          • memory/3256-116-0x0000000005250000-0x0000000005251000-memory.dmp

            Filesize

            4KB

          • memory/3256-120-0x0000000004D50000-0x000000000524E000-memory.dmp

            Filesize

            5.0MB

          • memory/3256-122-0x00000000089A0000-0x0000000008AC5000-memory.dmp

            Filesize

            1.1MB

          • memory/3544-152-0x0000000002902000-0x0000000002903000-memory.dmp

            Filesize

            4KB

          • memory/3544-157-0x0000000002900000-0x0000000002901000-memory.dmp

            Filesize

            4KB

          • memory/3544-263-0x0000000002903000-0x0000000002904000-memory.dmp

            Filesize

            4KB

          • memory/3544-252-0x000000007F110000-0x000000007F111000-memory.dmp

            Filesize

            4KB

          • memory/3956-163-0x0000000008070000-0x0000000008071000-memory.dmp

            Filesize

            4KB

          • memory/3956-192-0x000000007EE00000-0x000000007EE01000-memory.dmp

            Filesize

            4KB

          • memory/3956-187-0x0000000008BF0000-0x0000000008C23000-memory.dmp

            Filesize

            204KB

          • memory/3956-203-0x0000000008BD0000-0x0000000008BD1000-memory.dmp

            Filesize

            4KB

          • memory/3956-215-0x0000000008DB0000-0x0000000008DB1000-memory.dmp

            Filesize

            4KB

          • memory/3956-166-0x0000000007E30000-0x0000000007E31000-memory.dmp

            Filesize

            4KB

          • memory/3956-256-0x00000000066C3000-0x00000000066C4000-memory.dmp

            Filesize

            4KB

          • memory/3956-161-0x0000000007A40000-0x0000000007A41000-memory.dmp

            Filesize

            4KB

          • memory/3956-155-0x00000000066C2000-0x00000000066C3000-memory.dmp

            Filesize

            4KB

          • memory/3956-153-0x00000000066C0000-0x00000000066C1000-memory.dmp

            Filesize

            4KB

          • memory/3956-144-0x0000000007650000-0x0000000007651000-memory.dmp

            Filesize

            4KB

          • memory/3956-141-0x0000000007470000-0x0000000007471000-memory.dmp

            Filesize

            4KB

          • memory/3956-138-0x00000000073D0000-0x00000000073D1000-memory.dmp

            Filesize

            4KB