Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    05-08-2021 05:13

General

  • Target

    7696274f6270b793b2dffc5b283a104be475d79b440500478780e24f6436fd5a.exe

  • Size

    1.9MB

  • MD5

    1372b32848411ad39f19abe9d74b052f

  • SHA1

    b47548451a323c3ae62b25ee6b65f1fe76837639

  • SHA256

    7696274f6270b793b2dffc5b283a104be475d79b440500478780e24f6436fd5a

  • SHA512

    ed15a4855f25b2ff6a00c2e19c4def71aac1d27945d249dbb26718107dbe48a4c3176be1e07cd1f5de29b7d3aeffb2530fb89c70c0f1e9ba77dc0c9bd3396942

Malware Config

Signatures

  • RevcodeRat, WebMonitorRat

    WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.

  • WebMonitor Payload 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7696274f6270b793b2dffc5b283a104be475d79b440500478780e24f6436fd5a.exe
    "C:\Users\Admin\AppData\Local\Temp\7696274f6270b793b2dffc5b283a104be475d79b440500478780e24f6436fd5a.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\7696274f6270b793b2dffc5b283a104be475d79b440500478780e24f6436fd5a.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:412
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\DqkJYq.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:556
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DqkJYq" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF92E.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:876
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\DqkJYq.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1156
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
        PID:1668
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1080

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/412-72-0x0000000004830000-0x0000000004831000-memory.dmp

      Filesize

      4KB

    • memory/412-83-0x0000000000CD0000-0x0000000000CD1000-memory.dmp

      Filesize

      4KB

    • memory/412-66-0x0000000076A81000-0x0000000076A83000-memory.dmp

      Filesize

      8KB

    • memory/412-90-0x0000000002670000-0x0000000002671000-memory.dmp

      Filesize

      4KB

    • memory/412-71-0x0000000000D80000-0x0000000000D81000-memory.dmp

      Filesize

      4KB

    • memory/412-136-0x000000007EF30000-0x000000007EF31000-memory.dmp

      Filesize

      4KB

    • memory/412-99-0x0000000005650000-0x0000000005651000-memory.dmp

      Filesize

      4KB

    • memory/412-104-0x0000000005710000-0x0000000005711000-memory.dmp

      Filesize

      4KB

    • memory/412-105-0x0000000006160000-0x0000000006161000-memory.dmp

      Filesize

      4KB

    • memory/412-112-0x0000000006240000-0x0000000006241000-memory.dmp

      Filesize

      4KB

    • memory/412-135-0x0000000006310000-0x0000000006311000-memory.dmp

      Filesize

      4KB

    • memory/412-134-0x0000000006300000-0x0000000006301000-memory.dmp

      Filesize

      4KB

    • memory/412-119-0x00000000061F0000-0x00000000061F1000-memory.dmp

      Filesize

      4KB

    • memory/412-84-0x0000000000CD2000-0x0000000000CD3000-memory.dmp

      Filesize

      4KB

    • memory/556-85-0x00000000049D0000-0x00000000049D1000-memory.dmp

      Filesize

      4KB

    • memory/556-86-0x00000000049D2000-0x00000000049D3000-memory.dmp

      Filesize

      4KB

    • memory/1080-146-0x0000000002D80000-0x0000000003D80000-memory.dmp

      Filesize

      16.0MB

    • memory/1080-80-0x0000000000400000-0x00000000004F3000-memory.dmp

      Filesize

      972KB

    • memory/1080-96-0x0000000000400000-0x00000000004F3000-memory.dmp

      Filesize

      972KB

    • memory/1156-88-0x0000000004B02000-0x0000000004B03000-memory.dmp

      Filesize

      4KB

    • memory/1156-93-0x00000000028D0000-0x00000000028D1000-memory.dmp

      Filesize

      4KB

    • memory/1156-87-0x0000000004B00000-0x0000000004B01000-memory.dmp

      Filesize

      4KB

    • memory/1964-59-0x0000000000250000-0x0000000000251000-memory.dmp

      Filesize

      4KB

    • memory/1964-64-0x0000000007E70000-0x0000000007F65000-memory.dmp

      Filesize

      980KB

    • memory/1964-63-0x00000000083C0000-0x00000000084F7000-memory.dmp

      Filesize

      1.2MB

    • memory/1964-62-0x0000000000450000-0x000000000046B000-memory.dmp

      Filesize

      108KB

    • memory/1964-61-0x0000000002150000-0x0000000002151000-memory.dmp

      Filesize

      4KB