Analysis

  • max time kernel
    102s
  • max time network
    136s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    29-07-2021 10:59

General

  • Target

    250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe

  • Size

    1.8MB

  • MD5

    a3a62c034f2eb97d3673d2a608073f7e

  • SHA1

    250644fc77d95c6dcaef531b0f351f5ce33bbfbd

  • SHA256

    167f23bd6318e7e1bbe296639468d866b2b457410daab0e6b941dac6bcc4563f

  • SHA512

    16c0b478ea9f1fcdeb9c13af022ac0f18879798eb7715aabd93446630dd0b9e3e9c3c1e31114657623c9c932502b99f41c1f3c52ede0306311f729810366ed71

Malware Config

Signatures

  • RevcodeRat, WebMonitorRat

    WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.

  • WebMonitor Payload 3 IoCs
  • CustAttr .NET packer 1 IoCs

    Detects CustAttr .NET packer in memory.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe
    "C:\Users\Admin\AppData\Local\Temp\250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:580
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3668
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\CJFickSnic.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2912
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CJFickSnic" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3E04.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:3768
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\CJFickSnic.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2540
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2668
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WHiwlMen9Z8MEE6t.bat" "
        3⤵
          PID:3184

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/580-119-0x0000000004B00000-0x0000000004B01000-memory.dmp

      Filesize

      4KB

    • memory/580-123-0x00000000073B0000-0x00000000074E5000-memory.dmp

      Filesize

      1.2MB

    • memory/580-124-0x00000000074F0000-0x00000000075E0000-memory.dmp

      Filesize

      960KB

    • memory/580-122-0x0000000004EC0000-0x0000000004ECB000-memory.dmp

      Filesize

      44KB

    • memory/580-121-0x0000000004AE0000-0x0000000004B7C000-memory.dmp

      Filesize

      624KB

    • memory/580-120-0x0000000004DF0000-0x0000000004DF1000-memory.dmp

      Filesize

      4KB

    • memory/580-114-0x0000000000120000-0x0000000000121000-memory.dmp

      Filesize

      4KB

    • memory/580-118-0x0000000004C20000-0x0000000004C21000-memory.dmp

      Filesize

      4KB

    • memory/580-117-0x00000000051D0000-0x00000000051D1000-memory.dmp

      Filesize

      4KB

    • memory/580-116-0x0000000004B80000-0x0000000004B81000-memory.dmp

      Filesize

      4KB

    • memory/2540-225-0x000000007E9B0000-0x000000007E9B1000-memory.dmp

      Filesize

      4KB

    • memory/2540-160-0x0000000008010000-0x0000000008011000-memory.dmp

      Filesize

      4KB

    • memory/2540-246-0x0000000007113000-0x0000000007114000-memory.dmp

      Filesize

      4KB

    • memory/2540-169-0x0000000008730000-0x0000000008731000-memory.dmp

      Filesize

      4KB

    • memory/2540-166-0x0000000008420000-0x0000000008421000-memory.dmp

      Filesize

      4KB

    • memory/2540-148-0x0000000007110000-0x0000000007111000-memory.dmp

      Filesize

      4KB

    • memory/2540-149-0x0000000007112000-0x0000000007113000-memory.dmp

      Filesize

      4KB

    • memory/2540-163-0x0000000007F60000-0x0000000007F61000-memory.dmp

      Filesize

      4KB

    • memory/2540-151-0x0000000007630000-0x0000000007631000-memory.dmp

      Filesize

      4KB

    • memory/2668-150-0x0000000000400000-0x00000000004F3000-memory.dmp

      Filesize

      972KB

    • memory/2668-138-0x0000000000400000-0x00000000004F3000-memory.dmp

      Filesize

      972KB

    • memory/2912-154-0x0000000006C90000-0x0000000006C91000-memory.dmp

      Filesize

      4KB

    • memory/2912-147-0x0000000006752000-0x0000000006753000-memory.dmp

      Filesize

      4KB

    • memory/2912-146-0x0000000006750000-0x0000000006751000-memory.dmp

      Filesize

      4KB

    • memory/2912-193-0x0000000008A80000-0x0000000008AB3000-memory.dmp

      Filesize

      204KB

    • memory/2912-212-0x0000000008A40000-0x0000000008A41000-memory.dmp

      Filesize

      4KB

    • memory/2912-228-0x000000007FD60000-0x000000007FD61000-memory.dmp

      Filesize

      4KB

    • memory/2912-157-0x0000000006D00000-0x0000000006D01000-memory.dmp

      Filesize

      4KB

    • memory/2912-245-0x0000000006753000-0x0000000006754000-memory.dmp

      Filesize

      4KB

    • memory/3668-243-0x00000000044C3000-0x00000000044C4000-memory.dmp

      Filesize

      4KB

    • memory/3668-145-0x00000000044C2000-0x00000000044C3000-memory.dmp

      Filesize

      4KB

    • memory/3668-144-0x00000000044C0000-0x00000000044C1000-memory.dmp

      Filesize

      4KB

    • memory/3668-131-0x0000000006EB0000-0x0000000006EB1000-memory.dmp

      Filesize

      4KB

    • memory/3668-129-0x0000000004390000-0x0000000004391000-memory.dmp

      Filesize

      4KB

    • memory/3668-231-0x000000007E340000-0x000000007E341000-memory.dmp

      Filesize

      4KB