Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
31-07-2021 08:15
Static task
static1
Behavioral task
behavioral1
Sample
fe4f22e8d5f3a4b2bcd81bd69429c12b.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
fe4f22e8d5f3a4b2bcd81bd69429c12b.exe
Resource
win10v20210408
General
-
Target
fe4f22e8d5f3a4b2bcd81bd69429c12b.exe
-
Size
2.0MB
-
MD5
fe4f22e8d5f3a4b2bcd81bd69429c12b
-
SHA1
50eec07da09636ab7108e93a2a17224724d5f8c2
-
SHA256
e0fb9bf9bd903a2ea4bc952b168482bd15af73dd1b4ae47529aa10fe6a9112a0
-
SHA512
6295463804ae0b84e90a6dc04d4a673fce7eea5c8f3a9017aae52eb4ea6c0a522e94fe8f9b5403cd42449a78aac438d0d53e44457581d67c4cd94886054b0ef2
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
regasm.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Roaming\\stream.exe\"," regasm.exe -
RevcodeRat, WebMonitorRat
WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.
-
WebMonitor Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/896-88-0x00000000005F5A70-mapping.dmp family_webmonitor -
Executes dropped EXE 3 IoCs
Processes:
Anyname.exePatch.exeMSBuild.exepid process 1984 Anyname.exe 1900 Patch.exe 896 MSBuild.exe -
Processes:
resource yara_rule \ProgramData\Anyname.exe upx \ProgramData\Anyname.exe upx C:\ProgramData\Anyname.exe upx behavioral1/memory/896-87-0x0000000000400000-0x00000000005F7000-memory.dmp upx behavioral1/memory/896-90-0x0000000000400000-0x00000000005F7000-memory.dmp upx -
Loads dropped DLL 5 IoCs
Processes:
fe4f22e8d5f3a4b2bcd81bd69429c12b.exeAnyname.exePatch.exeregasm.exepid process 1044 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe 1044 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe 1984 Anyname.exe 1900 Patch.exe 1612 regasm.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
fe4f22e8d5f3a4b2bcd81bd69429c12b.exeregasm.exedescription pid process target process PID 1044 set thread context of 1612 1044 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe regasm.exe PID 1612 set thread context of 896 1612 regasm.exe MSBuild.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regasm.exepid process 1612 regasm.exe 1612 regasm.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
fe4f22e8d5f3a4b2bcd81bd69429c12b.exepid process 1044 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
regasm.exeMSBuild.exedescription pid process Token: SeDebugPrivilege 1612 regasm.exe Token: SeDebugPrivilege 896 MSBuild.exe Token: SeShutdownPrivilege 896 MSBuild.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
fe4f22e8d5f3a4b2bcd81bd69429c12b.exepid process 1044 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
fe4f22e8d5f3a4b2bcd81bd69429c12b.exeAnyname.exeregasm.exedescription pid process target process PID 1044 wrote to memory of 1984 1044 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe Anyname.exe PID 1044 wrote to memory of 1984 1044 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe Anyname.exe PID 1044 wrote to memory of 1984 1044 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe Anyname.exe PID 1044 wrote to memory of 1984 1044 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe Anyname.exe PID 1984 wrote to memory of 1900 1984 Anyname.exe Patch.exe PID 1984 wrote to memory of 1900 1984 Anyname.exe Patch.exe PID 1984 wrote to memory of 1900 1984 Anyname.exe Patch.exe PID 1984 wrote to memory of 1900 1984 Anyname.exe Patch.exe PID 1984 wrote to memory of 1900 1984 Anyname.exe Patch.exe PID 1984 wrote to memory of 1900 1984 Anyname.exe Patch.exe PID 1984 wrote to memory of 1900 1984 Anyname.exe Patch.exe PID 1044 wrote to memory of 1612 1044 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe regasm.exe PID 1044 wrote to memory of 1612 1044 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe regasm.exe PID 1044 wrote to memory of 1612 1044 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe regasm.exe PID 1044 wrote to memory of 1612 1044 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe regasm.exe PID 1044 wrote to memory of 1612 1044 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe regasm.exe PID 1044 wrote to memory of 1612 1044 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe regasm.exe PID 1044 wrote to memory of 1612 1044 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe regasm.exe PID 1044 wrote to memory of 1612 1044 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe regasm.exe PID 1612 wrote to memory of 896 1612 regasm.exe MSBuild.exe PID 1612 wrote to memory of 896 1612 regasm.exe MSBuild.exe PID 1612 wrote to memory of 896 1612 regasm.exe MSBuild.exe PID 1612 wrote to memory of 896 1612 regasm.exe MSBuild.exe PID 1612 wrote to memory of 896 1612 regasm.exe MSBuild.exe PID 1612 wrote to memory of 896 1612 regasm.exe MSBuild.exe PID 1612 wrote to memory of 896 1612 regasm.exe MSBuild.exe PID 1612 wrote to memory of 896 1612 regasm.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe4f22e8d5f3a4b2bcd81bd69429c12b.exe"C:\Users\Admin\AppData\Local\Temp\fe4f22e8d5f3a4b2bcd81bd69429c12b.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\ProgramData\Anyname.exe"C:\ProgramData\Anyname.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\Patch.exePatch.exe /silent3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1900
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"2⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\MSBuild.exeC:\Users\Admin\AppData\Local\Temp\MSBuild.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:896
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
40142677d0bb0ecaad6f45521581a8e3
SHA1b107dea7dc8ec3d53769484173bf59b24a3a526a
SHA2568592243aeb23282bb68e22aee5f3aa19288d289c554e6318ff92b3bb80fb2e24
SHA512fa0a0e0e13f59f6169ad417842b04aa3fa66376a585995d9d1737fb655c46d44e2183209e1266909568c8f80ae9d6e43368d461f3d40be432f683ba2b7048e59
-
MD5
9af17c8393f0970ee5136bd3ffa27001
SHA14b285b72c1a11285a25f31f2597e090da6bbc049
SHA25671d6a7a3fe5f8dc878cd5bdeca0e09177efb85c01e9a8a10a95262cabefaa019
SHA512b90f7de7d5ce72dccb264c7ba609e173c529b9d99ed9a63f88632bc58b1a994bbb727365f519c73b979f8918bd6de3c39a9f0347eb3a4bccdce4b2772a6516a3
-
MD5
c8ecc6d21f0d96f5adb10ba0fad59327
SHA163f5f489890b0ea90327a551787120bc71559aed
SHA256e652438962d628a62456c778b1693390423223dd12f5c233e361c5c5273ecec0
SHA51227618145d7fabefae7f2fdd56b9b3d0ea6c624a6d6e833bff52bf2d87210b73536052640b39d3419808d02a7c7829b589292087f154ed494145b54ef1fab621a
-
MD5
40142677d0bb0ecaad6f45521581a8e3
SHA1b107dea7dc8ec3d53769484173bf59b24a3a526a
SHA2568592243aeb23282bb68e22aee5f3aa19288d289c554e6318ff92b3bb80fb2e24
SHA512fa0a0e0e13f59f6169ad417842b04aa3fa66376a585995d9d1737fb655c46d44e2183209e1266909568c8f80ae9d6e43368d461f3d40be432f683ba2b7048e59
-
MD5
40142677d0bb0ecaad6f45521581a8e3
SHA1b107dea7dc8ec3d53769484173bf59b24a3a526a
SHA2568592243aeb23282bb68e22aee5f3aa19288d289c554e6318ff92b3bb80fb2e24
SHA512fa0a0e0e13f59f6169ad417842b04aa3fa66376a585995d9d1737fb655c46d44e2183209e1266909568c8f80ae9d6e43368d461f3d40be432f683ba2b7048e59
-
MD5
9af17c8393f0970ee5136bd3ffa27001
SHA14b285b72c1a11285a25f31f2597e090da6bbc049
SHA25671d6a7a3fe5f8dc878cd5bdeca0e09177efb85c01e9a8a10a95262cabefaa019
SHA512b90f7de7d5ce72dccb264c7ba609e173c529b9d99ed9a63f88632bc58b1a994bbb727365f519c73b979f8918bd6de3c39a9f0347eb3a4bccdce4b2772a6516a3
-
MD5
c8ecc6d21f0d96f5adb10ba0fad59327
SHA163f5f489890b0ea90327a551787120bc71559aed
SHA256e652438962d628a62456c778b1693390423223dd12f5c233e361c5c5273ecec0
SHA51227618145d7fabefae7f2fdd56b9b3d0ea6c624a6d6e833bff52bf2d87210b73536052640b39d3419808d02a7c7829b589292087f154ed494145b54ef1fab621a
-
MD5
f6a5ee057facebdbe0f7fcc684408bfe
SHA12481e7f2051d4563bdb161acc045c4a12054b9e0
SHA2560716d3af51df49db26fa4856fbf219e23d2ae3ffe25272669c8cb5b527fbb6bf
SHA5128153a568ea1f1f954721af33366ae81c00eb9950070004b5e5e2942073be9d6de012fe8233331c9f792f080442d973dd1713823bb6abb0ba0b55af544f6a10a8