Analysis
-
max time kernel
150s -
max time network
177s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
03-08-2021 13:03
Static task
static1
Behavioral task
behavioral1
Sample
REQUEST FOR QUOTATION.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
REQUEST FOR QUOTATION.exe
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
REQUEST FOR QUOTATION.exe
-
Size
1.4MB
-
MD5
065f86911f83ae3ce15517458719cd38
-
SHA1
63f1c19bef78a88efa1139f8f6174caab6842174
-
SHA256
7252276a3d4ce0aaadb10b11422e4c4f625845c9c3359ffbaa63346b9fc65b4a
-
SHA512
b339223de8842297f29f838ceee752ca42693e6baf0994162fc059686e10c065eb16dae8e9687157d8a1e3600b0df40eb56412de532b2a220e6cf8184d87ef20
Malware Config
Signatures
-
RevcodeRat, WebMonitorRat
WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.
-
WebMonitor Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1420-62-0x0000000000400000-0x00000000004F3000-memory.dmp family_webmonitor -
suricata: ET MALWARE WebMonitor/RevCode RAT CnC Domain in DNS Lookup
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
REQUEST FOR QUOTATION.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WebMonitor-ced9 = "C:\\Users\\Admin\\AppData\\Roaming\\WebMonitor-ced9.exe" REQUEST FOR QUOTATION.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\WebMonitor-ced9 = "C:\\Users\\Admin\\AppData\\Roaming\\WebMonitor-ced9.exe" REQUEST FOR QUOTATION.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
REQUEST FOR QUOTATION.exedescription pid Process procid_target PID 684 set thread context of 1420 684 REQUEST FOR QUOTATION.exe 26 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
REQUEST FOR QUOTATION.exepid Process 684 REQUEST FOR QUOTATION.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
REQUEST FOR QUOTATION.exedescription pid Process Token: SeShutdownPrivilege 1420 REQUEST FOR QUOTATION.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
REQUEST FOR QUOTATION.exepid Process 1420 REQUEST FOR QUOTATION.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
REQUEST FOR QUOTATION.exedescription pid Process procid_target PID 684 wrote to memory of 1420 684 REQUEST FOR QUOTATION.exe 26 PID 684 wrote to memory of 1420 684 REQUEST FOR QUOTATION.exe 26 PID 684 wrote to memory of 1420 684 REQUEST FOR QUOTATION.exe 26 PID 684 wrote to memory of 1420 684 REQUEST FOR QUOTATION.exe 26 PID 684 wrote to memory of 1420 684 REQUEST FOR QUOTATION.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\REQUEST FOR QUOTATION.exe"C:\Users\Admin\AppData\Local\Temp\REQUEST FOR QUOTATION.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\AppData\Local\Temp\REQUEST FOR QUOTATION.exe"C:\Users\Admin\AppData\Local\Temp\REQUEST FOR QUOTATION.exe"2⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1420
-