Analysis

  • max time kernel
    102s
  • max time network
    136s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    29-07-2021 10:59

General

  • Target

    250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe

  • Size

    1.8MB

  • MD5

    a3a62c034f2eb97d3673d2a608073f7e

  • SHA1

    250644fc77d95c6dcaef531b0f351f5ce33bbfbd

  • SHA256

    167f23bd6318e7e1bbe296639468d866b2b457410daab0e6b941dac6bcc4563f

  • SHA512

    16c0b478ea9f1fcdeb9c13af022ac0f18879798eb7715aabd93446630dd0b9e3e9c3c1e31114657623c9c932502b99f41c1f3c52ede0306311f729810366ed71

Malware Config

Signatures

  • RevcodeRat, WebMonitorRat

    WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.

  • WebMonitor Payload 3 IoCs
  • CustAttr .NET packer 1 IoCs

    Detects CustAttr .NET packer in memory.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe
    "C:\Users\Admin\AppData\Local\Temp\250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:580
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3668
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\CJFickSnic.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2912
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CJFickSnic" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3E04.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:3768
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\CJFickSnic.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2540
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2668
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WHiwlMen9Z8MEE6t.bat" "
        3⤵
          PID:3184

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
      MD5

      1c19c16e21c97ed42d5beabc93391fc5

      SHA1

      8ad83f8e0b3acf8dfbbf87931e41f0d664c4df68

      SHA256

      1bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05

      SHA512

      7d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
      MD5

      7247129cd0644457905b7d6bf17fd078

      SHA1

      dbf9139b5a1b72141f170d2eae911bbbe7e128c8

      SHA256

      dfa6e0d79449f29310b2a0400dc7fa5a3a6b08182233147a81902d1f80a0f8e4

      SHA512

      9b1ebd7fe485811f10ec02778d90a7f7eccafa0231027b640b94eaed8408107051da7fcc4f17a9aa0eef900fa2595f44be7fd115331fb6da9b10076f5fcf87e0

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
      MD5

      7247129cd0644457905b7d6bf17fd078

      SHA1

      dbf9139b5a1b72141f170d2eae911bbbe7e128c8

      SHA256

      dfa6e0d79449f29310b2a0400dc7fa5a3a6b08182233147a81902d1f80a0f8e4

      SHA512

      9b1ebd7fe485811f10ec02778d90a7f7eccafa0231027b640b94eaed8408107051da7fcc4f17a9aa0eef900fa2595f44be7fd115331fb6da9b10076f5fcf87e0

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      MD5

      47138b8bec1442c0b5cfb68b8eea5743

      SHA1

      2f7f8922681f6dafb2a29ea948dbcb9c031de8bd

      SHA256

      047a8b75864224c417a649072fbf82c00887f784ca714da61f939f2d66478b9a

      SHA512

      fd0fee680909ee95f745a63b0e49becfb4fa6f37c4555d64f49c085cab308d45afc2c630facab68fc9d20ac6335b7ef85e55d2a16d34fbe5a1725f3224816e99

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      MD5

      47138b8bec1442c0b5cfb68b8eea5743

      SHA1

      2f7f8922681f6dafb2a29ea948dbcb9c031de8bd

      SHA256

      047a8b75864224c417a649072fbf82c00887f784ca714da61f939f2d66478b9a

      SHA512

      fd0fee680909ee95f745a63b0e49becfb4fa6f37c4555d64f49c085cab308d45afc2c630facab68fc9d20ac6335b7ef85e55d2a16d34fbe5a1725f3224816e99

    • C:\Users\Admin\AppData\Local\Temp\WHiwlMen9Z8MEE6t.bat
      MD5

      eb1663997fd77515abbec52eb0528488

      SHA1

      d5a2e3ef1dd2ff9a0456025e638cfcb3ba97edac

      SHA256

      c31a7815cb7cffac6c3c1071583ad0b0a3f79485ebff6533175094455d988198

      SHA512

      4107d1c1ccd489d36a53f755c5b192ace457836ef8398d974d904f6e67b62e4aeffa6ab294e723f296f147e9308df14e70e045a7f58230447fb1cc8855d34265

    • C:\Users\Admin\AppData\Local\Temp\tmp3E04.tmp
      MD5

      be804f80f44d1cc8f4b80653df14f81d

      SHA1

      05ebba138c561d0e490ddfa9cf517d429958ace9

      SHA256

      95d2567356579eed4df3d0ef888e2c12b6006bb1d6296be4387ebb1b19f13866

      SHA512

      f7e8a3f61c5c658ca68cf9a19837f2fb381e2f5f05c3853464a5009f63d0c784547b3bdc65407fd4ffb0801ed08cba78e6463b91d02b41bf90ce5dcd29670da3

    • memory/580-119-0x0000000004B00000-0x0000000004B01000-memory.dmp
      Filesize

      4KB

    • memory/580-123-0x00000000073B0000-0x00000000074E5000-memory.dmp
      Filesize

      1.2MB

    • memory/580-124-0x00000000074F0000-0x00000000075E0000-memory.dmp
      Filesize

      960KB

    • memory/580-122-0x0000000004EC0000-0x0000000004ECB000-memory.dmp
      Filesize

      44KB

    • memory/580-121-0x0000000004AE0000-0x0000000004B7C000-memory.dmp
      Filesize

      624KB

    • memory/580-120-0x0000000004DF0000-0x0000000004DF1000-memory.dmp
      Filesize

      4KB

    • memory/580-114-0x0000000000120000-0x0000000000121000-memory.dmp
      Filesize

      4KB

    • memory/580-118-0x0000000004C20000-0x0000000004C21000-memory.dmp
      Filesize

      4KB

    • memory/580-117-0x00000000051D0000-0x00000000051D1000-memory.dmp
      Filesize

      4KB

    • memory/580-116-0x0000000004B80000-0x0000000004B81000-memory.dmp
      Filesize

      4KB

    • memory/2540-225-0x000000007E9B0000-0x000000007E9B1000-memory.dmp
      Filesize

      4KB

    • memory/2540-160-0x0000000008010000-0x0000000008011000-memory.dmp
      Filesize

      4KB

    • memory/2540-137-0x0000000000000000-mapping.dmp
    • memory/2540-246-0x0000000007113000-0x0000000007114000-memory.dmp
      Filesize

      4KB

    • memory/2540-169-0x0000000008730000-0x0000000008731000-memory.dmp
      Filesize

      4KB

    • memory/2540-166-0x0000000008420000-0x0000000008421000-memory.dmp
      Filesize

      4KB

    • memory/2540-148-0x0000000007110000-0x0000000007111000-memory.dmp
      Filesize

      4KB

    • memory/2540-149-0x0000000007112000-0x0000000007113000-memory.dmp
      Filesize

      4KB

    • memory/2540-163-0x0000000007F60000-0x0000000007F61000-memory.dmp
      Filesize

      4KB

    • memory/2540-151-0x0000000007630000-0x0000000007631000-memory.dmp
      Filesize

      4KB

    • memory/2668-150-0x0000000000400000-0x00000000004F3000-memory.dmp
      Filesize

      972KB

    • memory/2668-139-0x000000000049D8CA-mapping.dmp
    • memory/2668-138-0x0000000000400000-0x00000000004F3000-memory.dmp
      Filesize

      972KB

    • memory/2912-154-0x0000000006C90000-0x0000000006C91000-memory.dmp
      Filesize

      4KB

    • memory/2912-147-0x0000000006752000-0x0000000006753000-memory.dmp
      Filesize

      4KB

    • memory/2912-146-0x0000000006750000-0x0000000006751000-memory.dmp
      Filesize

      4KB

    • memory/2912-193-0x0000000008A80000-0x0000000008AB3000-memory.dmp
      Filesize

      204KB

    • memory/2912-212-0x0000000008A40000-0x0000000008A41000-memory.dmp
      Filesize

      4KB

    • memory/2912-228-0x000000007FD60000-0x000000007FD61000-memory.dmp
      Filesize

      4KB

    • memory/2912-128-0x0000000000000000-mapping.dmp
    • memory/2912-157-0x0000000006D00000-0x0000000006D01000-memory.dmp
      Filesize

      4KB

    • memory/2912-245-0x0000000006753000-0x0000000006754000-memory.dmp
      Filesize

      4KB

    • memory/3184-445-0x0000000000000000-mapping.dmp
    • memory/3668-243-0x00000000044C3000-0x00000000044C4000-memory.dmp
      Filesize

      4KB

    • memory/3668-145-0x00000000044C2000-0x00000000044C3000-memory.dmp
      Filesize

      4KB

    • memory/3668-144-0x00000000044C0000-0x00000000044C1000-memory.dmp
      Filesize

      4KB

    • memory/3668-131-0x0000000006EB0000-0x0000000006EB1000-memory.dmp
      Filesize

      4KB

    • memory/3668-129-0x0000000004390000-0x0000000004391000-memory.dmp
      Filesize

      4KB

    • memory/3668-231-0x000000007E340000-0x000000007E341000-memory.dmp
      Filesize

      4KB

    • memory/3668-125-0x0000000000000000-mapping.dmp
    • memory/3768-130-0x0000000000000000-mapping.dmp