Analysis
-
max time kernel
102s -
max time network
136s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
29-07-2021 10:59
Static task
static1
Behavioral task
behavioral1
Sample
250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe
Resource
win10v20210408
General
-
Target
250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe
-
Size
1.8MB
-
MD5
a3a62c034f2eb97d3673d2a608073f7e
-
SHA1
250644fc77d95c6dcaef531b0f351f5ce33bbfbd
-
SHA256
167f23bd6318e7e1bbe296639468d866b2b457410daab0e6b941dac6bcc4563f
-
SHA512
16c0b478ea9f1fcdeb9c13af022ac0f18879798eb7715aabd93446630dd0b9e3e9c3c1e31114657623c9c932502b99f41c1f3c52ede0306311f729810366ed71
Malware Config
Signatures
-
RevcodeRat, WebMonitorRat
WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.
-
WebMonitor Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2668-138-0x0000000000400000-0x00000000004F3000-memory.dmp family_webmonitor behavioral2/memory/2668-139-0x000000000049D8CA-mapping.dmp family_webmonitor behavioral2/memory/2668-150-0x0000000000400000-0x00000000004F3000-memory.dmp family_webmonitor -
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
Processes:
resource yara_rule behavioral2/memory/580-122-0x0000000004EC0000-0x0000000004ECB000-memory.dmp CustAttr -
Suspicious use of SetThreadContext 1 IoCs
Processes:
250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exedescription pid Process procid_target PID 580 set thread context of 2668 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exepowershell.exepowershell.exepowershell.exepid Process 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 3668 powershell.exe 2540 powershell.exe 2912 powershell.exe 2912 powershell.exe 2540 powershell.exe 3668 powershell.exe 2540 powershell.exe 3668 powershell.exe 2912 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exepowershell.exepowershell.exepowershell.exeRegSvcs.exedescription pid Process Token: SeDebugPrivilege 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe Token: SeDebugPrivilege 2912 powershell.exe Token: SeDebugPrivilege 3668 powershell.exe Token: SeDebugPrivilege 2540 powershell.exe Token: SeShutdownPrivilege 2668 RegSvcs.exe Token: SeCreatePagefilePrivilege 2668 RegSvcs.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exeRegSvcs.exedescription pid Process procid_target PID 580 wrote to memory of 3668 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 78 PID 580 wrote to memory of 3668 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 78 PID 580 wrote to memory of 3668 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 78 PID 580 wrote to memory of 2912 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 80 PID 580 wrote to memory of 2912 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 80 PID 580 wrote to memory of 2912 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 80 PID 580 wrote to memory of 3768 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 82 PID 580 wrote to memory of 3768 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 82 PID 580 wrote to memory of 3768 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 82 PID 580 wrote to memory of 2540 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 84 PID 580 wrote to memory of 2540 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 84 PID 580 wrote to memory of 2540 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 84 PID 580 wrote to memory of 2668 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 86 PID 580 wrote to memory of 2668 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 86 PID 580 wrote to memory of 2668 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 86 PID 580 wrote to memory of 2668 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 86 PID 580 wrote to memory of 2668 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 86 PID 580 wrote to memory of 2668 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 86 PID 580 wrote to memory of 2668 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 86 PID 580 wrote to memory of 2668 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 86 PID 580 wrote to memory of 2668 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 86 PID 2668 wrote to memory of 3184 2668 RegSvcs.exe 88 PID 2668 wrote to memory of 3184 2668 RegSvcs.exe 88 PID 2668 wrote to memory of 3184 2668 RegSvcs.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe"C:\Users\Admin\AppData\Local\Temp\250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3668
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\CJFickSnic.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CJFickSnic" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3E04.tmp"2⤵
- Creates scheduled task(s)
PID:3768
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\CJFickSnic.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2540
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WHiwlMen9Z8MEE6t.bat" "3⤵PID:3184
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
1c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
MD5
7247129cd0644457905b7d6bf17fd078
SHA1dbf9139b5a1b72141f170d2eae911bbbe7e128c8
SHA256dfa6e0d79449f29310b2a0400dc7fa5a3a6b08182233147a81902d1f80a0f8e4
SHA5129b1ebd7fe485811f10ec02778d90a7f7eccafa0231027b640b94eaed8408107051da7fcc4f17a9aa0eef900fa2595f44be7fd115331fb6da9b10076f5fcf87e0
-
MD5
7247129cd0644457905b7d6bf17fd078
SHA1dbf9139b5a1b72141f170d2eae911bbbe7e128c8
SHA256dfa6e0d79449f29310b2a0400dc7fa5a3a6b08182233147a81902d1f80a0f8e4
SHA5129b1ebd7fe485811f10ec02778d90a7f7eccafa0231027b640b94eaed8408107051da7fcc4f17a9aa0eef900fa2595f44be7fd115331fb6da9b10076f5fcf87e0
-
MD5
47138b8bec1442c0b5cfb68b8eea5743
SHA12f7f8922681f6dafb2a29ea948dbcb9c031de8bd
SHA256047a8b75864224c417a649072fbf82c00887f784ca714da61f939f2d66478b9a
SHA512fd0fee680909ee95f745a63b0e49becfb4fa6f37c4555d64f49c085cab308d45afc2c630facab68fc9d20ac6335b7ef85e55d2a16d34fbe5a1725f3224816e99
-
MD5
47138b8bec1442c0b5cfb68b8eea5743
SHA12f7f8922681f6dafb2a29ea948dbcb9c031de8bd
SHA256047a8b75864224c417a649072fbf82c00887f784ca714da61f939f2d66478b9a
SHA512fd0fee680909ee95f745a63b0e49becfb4fa6f37c4555d64f49c085cab308d45afc2c630facab68fc9d20ac6335b7ef85e55d2a16d34fbe5a1725f3224816e99
-
MD5
eb1663997fd77515abbec52eb0528488
SHA1d5a2e3ef1dd2ff9a0456025e638cfcb3ba97edac
SHA256c31a7815cb7cffac6c3c1071583ad0b0a3f79485ebff6533175094455d988198
SHA5124107d1c1ccd489d36a53f755c5b192ace457836ef8398d974d904f6e67b62e4aeffa6ab294e723f296f147e9308df14e70e045a7f58230447fb1cc8855d34265
-
MD5
be804f80f44d1cc8f4b80653df14f81d
SHA105ebba138c561d0e490ddfa9cf517d429958ace9
SHA25695d2567356579eed4df3d0ef888e2c12b6006bb1d6296be4387ebb1b19f13866
SHA512f7e8a3f61c5c658ca68cf9a19837f2fb381e2f5f05c3853464a5009f63d0c784547b3bdc65407fd4ffb0801ed08cba78e6463b91d02b41bf90ce5dcd29670da3