Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
31-07-2021 08:15
Static task
static1
Behavioral task
behavioral1
Sample
fe4f22e8d5f3a4b2bcd81bd69429c12b.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
fe4f22e8d5f3a4b2bcd81bd69429c12b.exe
Resource
win10v20210408
General
-
Target
fe4f22e8d5f3a4b2bcd81bd69429c12b.exe
-
Size
2.0MB
-
MD5
fe4f22e8d5f3a4b2bcd81bd69429c12b
-
SHA1
50eec07da09636ab7108e93a2a17224724d5f8c2
-
SHA256
e0fb9bf9bd903a2ea4bc952b168482bd15af73dd1b4ae47529aa10fe6a9112a0
-
SHA512
6295463804ae0b84e90a6dc04d4a673fce7eea5c8f3a9017aae52eb4ea6c0a522e94fe8f9b5403cd42449a78aac438d0d53e44457581d67c4cd94886054b0ef2
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Roaming\\stream.exe\"," regasm.exe -
RevcodeRat, WebMonitorRat
WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.
-
WebMonitor Payload 1 IoCs
resource yara_rule behavioral2/memory/2276-141-0x00000000005F5A70-mapping.dmp family_webmonitor -
suricata: ET MALWARE WebMonitor/RevCode RAT CnC Domain in DNS Lookup
-
Executes dropped EXE 3 IoCs
pid Process 3732 Anyname.exe 640 Patch.exe 2276 MSBuild.exe -
resource yara_rule behavioral2/files/0x000200000001ab50-118.dat upx behavioral2/files/0x000200000001ab50-119.dat upx behavioral2/memory/2276-140-0x0000000000400000-0x00000000005F7000-memory.dmp upx behavioral2/memory/2276-143-0x0000000000400000-0x00000000005F7000-memory.dmp upx -
Loads dropped DLL 1 IoCs
pid Process 640 Patch.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 860 set thread context of 576 860 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe 78 PID 576 set thread context of 2276 576 regasm.exe 82 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 576 regasm.exe 576 regasm.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 860 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe 860 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 576 regasm.exe Token: SeDebugPrivilege 2276 MSBuild.exe Token: SeShutdownPrivilege 2276 MSBuild.exe Token: SeCreatePagefilePrivilege 2276 MSBuild.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 860 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 860 wrote to memory of 3732 860 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe 75 PID 860 wrote to memory of 3732 860 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe 75 PID 860 wrote to memory of 3732 860 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe 75 PID 3732 wrote to memory of 640 3732 Anyname.exe 76 PID 3732 wrote to memory of 640 3732 Anyname.exe 76 PID 3732 wrote to memory of 640 3732 Anyname.exe 76 PID 860 wrote to memory of 2424 860 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe 77 PID 860 wrote to memory of 2424 860 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe 77 PID 860 wrote to memory of 2424 860 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe 77 PID 860 wrote to memory of 2424 860 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe 77 PID 860 wrote to memory of 576 860 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe 78 PID 860 wrote to memory of 576 860 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe 78 PID 860 wrote to memory of 576 860 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe 78 PID 860 wrote to memory of 576 860 fe4f22e8d5f3a4b2bcd81bd69429c12b.exe 78 PID 576 wrote to memory of 2276 576 regasm.exe 82 PID 576 wrote to memory of 2276 576 regasm.exe 82 PID 576 wrote to memory of 2276 576 regasm.exe 82 PID 576 wrote to memory of 2276 576 regasm.exe 82 PID 576 wrote to memory of 2276 576 regasm.exe 82 PID 576 wrote to memory of 2276 576 regasm.exe 82 PID 576 wrote to memory of 2276 576 regasm.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe4f22e8d5f3a4b2bcd81bd69429c12b.exe"C:\Users\Admin\AppData\Local\Temp\fe4f22e8d5f3a4b2bcd81bd69429c12b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:860 -
C:\ProgramData\Anyname.exe"C:\ProgramData\Anyname.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\Patch.exePatch.exe /silent3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:640
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"2⤵PID:2424
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"2⤵
- Modifies WinLogon for persistence
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Users\Admin\AppData\Local\Temp\MSBuild.exeC:\Users\Admin\AppData\Local\Temp\MSBuild.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2276
-
-