Analysis
-
max time kernel
102s -
max time network
136s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
29-07-2021 10:59
Static task
static1
Behavioral task
behavioral1
Sample
250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe
Resource
win10v20210408
General
-
Target
250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe
-
Size
1.8MB
-
MD5
a3a62c034f2eb97d3673d2a608073f7e
-
SHA1
250644fc77d95c6dcaef531b0f351f5ce33bbfbd
-
SHA256
167f23bd6318e7e1bbe296639468d866b2b457410daab0e6b941dac6bcc4563f
-
SHA512
16c0b478ea9f1fcdeb9c13af022ac0f18879798eb7715aabd93446630dd0b9e3e9c3c1e31114657623c9c932502b99f41c1f3c52ede0306311f729810366ed71
Malware Config
Signatures
-
RevcodeRat, WebMonitorRat
WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.
-
WebMonitor Payload 3 IoCs
resource yara_rule behavioral2/memory/2668-138-0x0000000000400000-0x00000000004F3000-memory.dmp family_webmonitor behavioral2/memory/2668-139-0x000000000049D8CA-mapping.dmp family_webmonitor behavioral2/memory/2668-150-0x0000000000400000-0x00000000004F3000-memory.dmp family_webmonitor -
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral2/memory/580-122-0x0000000004EC0000-0x0000000004ECB000-memory.dmp CustAttr -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 580 set thread context of 2668 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3768 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 3668 powershell.exe 2540 powershell.exe 2912 powershell.exe 2912 powershell.exe 2540 powershell.exe 3668 powershell.exe 2540 powershell.exe 3668 powershell.exe 2912 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe Token: SeDebugPrivilege 2912 powershell.exe Token: SeDebugPrivilege 3668 powershell.exe Token: SeDebugPrivilege 2540 powershell.exe Token: SeShutdownPrivilege 2668 RegSvcs.exe Token: SeCreatePagefilePrivilege 2668 RegSvcs.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 580 wrote to memory of 3668 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 78 PID 580 wrote to memory of 3668 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 78 PID 580 wrote to memory of 3668 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 78 PID 580 wrote to memory of 2912 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 80 PID 580 wrote to memory of 2912 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 80 PID 580 wrote to memory of 2912 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 80 PID 580 wrote to memory of 3768 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 82 PID 580 wrote to memory of 3768 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 82 PID 580 wrote to memory of 3768 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 82 PID 580 wrote to memory of 2540 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 84 PID 580 wrote to memory of 2540 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 84 PID 580 wrote to memory of 2540 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 84 PID 580 wrote to memory of 2668 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 86 PID 580 wrote to memory of 2668 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 86 PID 580 wrote to memory of 2668 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 86 PID 580 wrote to memory of 2668 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 86 PID 580 wrote to memory of 2668 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 86 PID 580 wrote to memory of 2668 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 86 PID 580 wrote to memory of 2668 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 86 PID 580 wrote to memory of 2668 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 86 PID 580 wrote to memory of 2668 580 250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe 86 PID 2668 wrote to memory of 3184 2668 RegSvcs.exe 88 PID 2668 wrote to memory of 3184 2668 RegSvcs.exe 88 PID 2668 wrote to memory of 3184 2668 RegSvcs.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe"C:\Users\Admin\AppData\Local\Temp\250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\250644fc77d95c6dcaef531b0f351f5ce33bbfbd.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3668
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\CJFickSnic.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CJFickSnic" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3E04.tmp"2⤵
- Creates scheduled task(s)
PID:3768
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\CJFickSnic.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2540
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WHiwlMen9Z8MEE6t.bat" "3⤵PID:3184
-
-