Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
31-07-2021 08:15
Static task
static1
Behavioral task
behavioral1
Sample
fe4f22e8d5f3a4b2bcd81bd69429c12b.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
fe4f22e8d5f3a4b2bcd81bd69429c12b.exe
Resource
win10v20210408
General
-
Target
fe4f22e8d5f3a4b2bcd81bd69429c12b.exe
-
Size
2.0MB
-
MD5
fe4f22e8d5f3a4b2bcd81bd69429c12b
-
SHA1
50eec07da09636ab7108e93a2a17224724d5f8c2
-
SHA256
e0fb9bf9bd903a2ea4bc952b168482bd15af73dd1b4ae47529aa10fe6a9112a0
-
SHA512
6295463804ae0b84e90a6dc04d4a673fce7eea5c8f3a9017aae52eb4ea6c0a522e94fe8f9b5403cd42449a78aac438d0d53e44457581d67c4cd94886054b0ef2
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Roaming\\stream.exe\"," regasm.exe -
RevcodeRat, WebMonitorRat
WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.
-
WebMonitor Payload 1 IoCs
resource yara_rule behavioral1/memory/896-88-0x00000000005F5A70-mapping.dmp family_webmonitor -
Executes dropped EXE 3 IoCs
pid Process 1984 Anyname.exe 1900 Patch.exe 896 MSBuild.exe -
resource yara_rule behavioral1/files/0x00040000000130e0-62.dat upx behavioral1/files/0x00040000000130e0-63.dat upx behavioral1/files/0x00040000000130e0-65.dat upx behavioral1/memory/896-87-0x0000000000400000-0x00000000005F7000-memory.dmp upx behavioral1/memory/896-90-0x0000000000400000-0x00000000005F7000-memory.dmp upx -
Loads dropped DLL 5 IoCs
pid Process 1044 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe 1044 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe 1984 Anyname.exe 1900 Patch.exe 1612 regasm.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1044 set thread context of 1612 1044 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe 31 PID 1612 set thread context of 896 1612 regasm.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1612 regasm.exe 1612 regasm.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1044 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1612 regasm.exe Token: SeDebugPrivilege 896 MSBuild.exe Token: SeShutdownPrivilege 896 MSBuild.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1044 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1044 wrote to memory of 1984 1044 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe 26 PID 1044 wrote to memory of 1984 1044 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe 26 PID 1044 wrote to memory of 1984 1044 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe 26 PID 1044 wrote to memory of 1984 1044 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe 26 PID 1984 wrote to memory of 1900 1984 Anyname.exe 27 PID 1984 wrote to memory of 1900 1984 Anyname.exe 27 PID 1984 wrote to memory of 1900 1984 Anyname.exe 27 PID 1984 wrote to memory of 1900 1984 Anyname.exe 27 PID 1984 wrote to memory of 1900 1984 Anyname.exe 27 PID 1984 wrote to memory of 1900 1984 Anyname.exe 27 PID 1984 wrote to memory of 1900 1984 Anyname.exe 27 PID 1044 wrote to memory of 1612 1044 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe 31 PID 1044 wrote to memory of 1612 1044 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe 31 PID 1044 wrote to memory of 1612 1044 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe 31 PID 1044 wrote to memory of 1612 1044 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe 31 PID 1044 wrote to memory of 1612 1044 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe 31 PID 1044 wrote to memory of 1612 1044 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe 31 PID 1044 wrote to memory of 1612 1044 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe 31 PID 1044 wrote to memory of 1612 1044 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe 31 PID 1612 wrote to memory of 896 1612 regasm.exe 32 PID 1612 wrote to memory of 896 1612 regasm.exe 32 PID 1612 wrote to memory of 896 1612 regasm.exe 32 PID 1612 wrote to memory of 896 1612 regasm.exe 32 PID 1612 wrote to memory of 896 1612 regasm.exe 32 PID 1612 wrote to memory of 896 1612 regasm.exe 32 PID 1612 wrote to memory of 896 1612 regasm.exe 32 PID 1612 wrote to memory of 896 1612 regasm.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe4f22e8d5f3a4b2bcd81bd69429c12b.exe"C:\Users\Admin\AppData\Local\Temp\fe4f22e8d5f3a4b2bcd81bd69429c12b.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\ProgramData\Anyname.exe"C:\ProgramData\Anyname.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\Patch.exePatch.exe /silent3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1900
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"2⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\MSBuild.exeC:\Users\Admin\AppData\Local\Temp\MSBuild.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:896
-
-