Analysis
-
max time kernel
90s -
max time network
124s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
27-07-2021 15:11
Static task
static1
Behavioral task
behavioral1
Sample
HSBC_PAYMENT_COPY.pdf.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
HSBC_PAYMENT_COPY.pdf.exe
Resource
win10v20210410
General
-
Target
HSBC_PAYMENT_COPY.pdf.exe
-
Size
1.4MB
-
MD5
08f2609e7f7daf0f78032f773a68b72c
-
SHA1
f00e4c61cce15ee5f43c032d8d595aba65fbdc86
-
SHA256
0ed8f93b98f9cfff89559df9e0a8d360cab3dde1abfa2992216b4a98c5ca1253
-
SHA512
8c1ba503d2956ad0c60b11547908b81e601a3bfb2c75ae73c03718bd883ff94451b0697f915049614470d59388d161c02893ad90b48466f77fc154a20215da74
Malware Config
Signatures
-
RevcodeRat, WebMonitorRat
WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.
-
WebMonitor Payload 3 IoCs
resource yara_rule behavioral2/memory/2744-141-0x0000000000400000-0x00000000004F3000-memory.dmp family_webmonitor behavioral2/memory/2744-142-0x000000000049D8CA-mapping.dmp family_webmonitor behavioral2/memory/2744-159-0x0000000000400000-0x00000000004F3000-memory.dmp family_webmonitor -
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral2/memory/3368-121-0x0000000004D40000-0x0000000004D4B000-memory.dmp CustAttr -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3368 set thread context of 2744 3368 HSBC_PAYMENT_COPY.pdf.exe 85 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2212 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3368 HSBC_PAYMENT_COPY.pdf.exe 3376 powershell.exe 1264 powershell.exe 2584 powershell.exe 3376 powershell.exe 1264 powershell.exe 2584 powershell.exe 1264 powershell.exe 3376 powershell.exe 2584 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3368 HSBC_PAYMENT_COPY.pdf.exe Token: SeDebugPrivilege 1264 powershell.exe Token: SeDebugPrivilege 3376 powershell.exe Token: SeDebugPrivilege 2584 powershell.exe Token: SeShutdownPrivilege 2744 RegSvcs.exe Token: SeCreatePagefilePrivilege 2744 RegSvcs.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3368 wrote to memory of 3376 3368 HSBC_PAYMENT_COPY.pdf.exe 79 PID 3368 wrote to memory of 3376 3368 HSBC_PAYMENT_COPY.pdf.exe 79 PID 3368 wrote to memory of 3376 3368 HSBC_PAYMENT_COPY.pdf.exe 79 PID 3368 wrote to memory of 1264 3368 HSBC_PAYMENT_COPY.pdf.exe 81 PID 3368 wrote to memory of 1264 3368 HSBC_PAYMENT_COPY.pdf.exe 81 PID 3368 wrote to memory of 1264 3368 HSBC_PAYMENT_COPY.pdf.exe 81 PID 3368 wrote to memory of 2212 3368 HSBC_PAYMENT_COPY.pdf.exe 83 PID 3368 wrote to memory of 2212 3368 HSBC_PAYMENT_COPY.pdf.exe 83 PID 3368 wrote to memory of 2212 3368 HSBC_PAYMENT_COPY.pdf.exe 83 PID 3368 wrote to memory of 2584 3368 HSBC_PAYMENT_COPY.pdf.exe 87 PID 3368 wrote to memory of 2584 3368 HSBC_PAYMENT_COPY.pdf.exe 87 PID 3368 wrote to memory of 2584 3368 HSBC_PAYMENT_COPY.pdf.exe 87 PID 3368 wrote to memory of 2744 3368 HSBC_PAYMENT_COPY.pdf.exe 85 PID 3368 wrote to memory of 2744 3368 HSBC_PAYMENT_COPY.pdf.exe 85 PID 3368 wrote to memory of 2744 3368 HSBC_PAYMENT_COPY.pdf.exe 85 PID 3368 wrote to memory of 2744 3368 HSBC_PAYMENT_COPY.pdf.exe 85 PID 3368 wrote to memory of 2744 3368 HSBC_PAYMENT_COPY.pdf.exe 85 PID 3368 wrote to memory of 2744 3368 HSBC_PAYMENT_COPY.pdf.exe 85 PID 3368 wrote to memory of 2744 3368 HSBC_PAYMENT_COPY.pdf.exe 85 PID 3368 wrote to memory of 2744 3368 HSBC_PAYMENT_COPY.pdf.exe 85 PID 3368 wrote to memory of 2744 3368 HSBC_PAYMENT_COPY.pdf.exe 85 PID 2744 wrote to memory of 3856 2744 RegSvcs.exe 89 PID 2744 wrote to memory of 3856 2744 RegSvcs.exe 89 PID 2744 wrote to memory of 3856 2744 RegSvcs.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\HSBC_PAYMENT_COPY.pdf.exe"C:\Users\Admin\AppData\Local\Temp\HSBC_PAYMENT_COPY.pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\HSBC_PAYMENT_COPY.pdf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3376
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\WTddvQz.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1264
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WTddvQz" /XML "C:\Users\Admin\AppData\Local\Temp\tmp101E.tmp"2⤵
- Creates scheduled task(s)
PID:2212
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hlaVAn6udZ4CwxyY.bat" "3⤵PID:3856
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\WTddvQz.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2584
-