Analysis
-
max time kernel
303s -
max time network
309s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
13-08-2021 14:12
Static task
static1
Behavioral task
behavioral1
Sample
Loader-IDB.exe
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
Loader-IDB.exe
-
Size
2.0MB
-
MD5
fe4f22e8d5f3a4b2bcd81bd69429c12b
-
SHA1
50eec07da09636ab7108e93a2a17224724d5f8c2
-
SHA256
e0fb9bf9bd903a2ea4bc952b168482bd15af73dd1b4ae47529aa10fe6a9112a0
-
SHA512
6295463804ae0b84e90a6dc04d4a673fce7eea5c8f3a9017aae52eb4ea6c0a522e94fe8f9b5403cd42449a78aac438d0d53e44457581d67c4cd94886054b0ef2
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Roaming\\stream.exe\"," regasm.exe -
RevcodeRat, WebMonitorRat
WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.
-
WebMonitor Payload 1 IoCs
resource yara_rule behavioral1/memory/412-141-0x00000000005F5A70-mapping.dmp family_webmonitor -
suricata: ET MALWARE WebMonitor/RevCode RAT CnC Domain in DNS Lookup
suricata: ET MALWARE WebMonitor/RevCode RAT CnC Domain in DNS Lookup
-
Executes dropped EXE 9 IoCs
pid Process 1308 Anyname.exe 2700 Patch.exe 412 MSBuild.exe 4064 MSBuild.exe 3720 revpe.exe 3452 MSBuild.exe 368 revpe.exe 3908 MSBuild.exe 2876 MSBuild.exe -
resource yara_rule behavioral1/files/0x000100000001ab2b-118.dat upx behavioral1/files/0x000100000001ab2b-119.dat upx behavioral1/memory/412-140-0x0000000000400000-0x00000000005F7000-memory.dmp upx behavioral1/memory/412-143-0x0000000000400000-0x00000000005F7000-memory.dmp upx behavioral1/memory/3720-146-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/3720-160-0x0000000000400000-0x000000000041B000-memory.dmp upx -
Loads dropped DLL 1 IoCs
pid Process 2700 Patch.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\WM-f6ff = "C:\\Users\\Admin\\AppData\\Roaming\\WM-f6ff.exe\uf800" MSBuild.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WM-f6ff = "C:\\Users\\Admin\\AppData\\Roaming\\WM-f6ff.exe\uf800" MSBuild.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\WM-f6ff = "C:\\Users\\Admin\\AppData\\Roaming\\WM-f6ff.exe" MSBuild.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WM-f6ff = "C:\\Users\\Admin\\AppData\\Roaming\\WM-f6ff.exe" MSBuild.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\WM-f6ff = "C:\\Users\\Admin\\AppData\\Roaming\\WM-f6ff.exe\ue700" MSBuild.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WM-f6ff = "C:\\Users\\Admin\\AppData\\Roaming\\WM-f6ff.exe\ue700" MSBuild.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 1420 set thread context of 1348 1420 Loader-IDB.exe 79 PID 1348 set thread context of 412 1348 regasm.exe 83 PID 412 set thread context of 3720 412 MSBuild.exe 86 PID 412 set thread context of 368 412 MSBuild.exe 93 PID 412 set thread context of 3908 412 MSBuild.exe 89 PID 412 set thread context of 2876 412 MSBuild.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1348 regasm.exe 1348 regasm.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1420 Loader-IDB.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1348 regasm.exe Token: SeShutdownPrivilege 412 MSBuild.exe Token: SeCreatePagefilePrivilege 412 MSBuild.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1420 Loader-IDB.exe 412 MSBuild.exe -
Suspicious use of WriteProcessMemory 55 IoCs
description pid Process procid_target PID 1420 wrote to memory of 1308 1420 Loader-IDB.exe 77 PID 1420 wrote to memory of 1308 1420 Loader-IDB.exe 77 PID 1420 wrote to memory of 1308 1420 Loader-IDB.exe 77 PID 1308 wrote to memory of 2700 1308 Anyname.exe 78 PID 1308 wrote to memory of 2700 1308 Anyname.exe 78 PID 1308 wrote to memory of 2700 1308 Anyname.exe 78 PID 1420 wrote to memory of 1348 1420 Loader-IDB.exe 79 PID 1420 wrote to memory of 1348 1420 Loader-IDB.exe 79 PID 1420 wrote to memory of 1348 1420 Loader-IDB.exe 79 PID 1420 wrote to memory of 1348 1420 Loader-IDB.exe 79 PID 1348 wrote to memory of 412 1348 regasm.exe 83 PID 1348 wrote to memory of 412 1348 regasm.exe 83 PID 1348 wrote to memory of 412 1348 regasm.exe 83 PID 1348 wrote to memory of 412 1348 regasm.exe 83 PID 1348 wrote to memory of 412 1348 regasm.exe 83 PID 1348 wrote to memory of 412 1348 regasm.exe 83 PID 1348 wrote to memory of 412 1348 regasm.exe 83 PID 412 wrote to memory of 4064 412 MSBuild.exe 85 PID 412 wrote to memory of 4064 412 MSBuild.exe 85 PID 412 wrote to memory of 4064 412 MSBuild.exe 85 PID 412 wrote to memory of 3720 412 MSBuild.exe 86 PID 412 wrote to memory of 3720 412 MSBuild.exe 86 PID 412 wrote to memory of 3720 412 MSBuild.exe 86 PID 412 wrote to memory of 3720 412 MSBuild.exe 86 PID 412 wrote to memory of 3720 412 MSBuild.exe 86 PID 412 wrote to memory of 3720 412 MSBuild.exe 86 PID 412 wrote to memory of 3720 412 MSBuild.exe 86 PID 412 wrote to memory of 3720 412 MSBuild.exe 86 PID 412 wrote to memory of 3452 412 MSBuild.exe 87 PID 412 wrote to memory of 3452 412 MSBuild.exe 87 PID 412 wrote to memory of 3452 412 MSBuild.exe 87 PID 412 wrote to memory of 368 412 MSBuild.exe 93 PID 412 wrote to memory of 368 412 MSBuild.exe 93 PID 412 wrote to memory of 368 412 MSBuild.exe 93 PID 412 wrote to memory of 368 412 MSBuild.exe 93 PID 412 wrote to memory of 368 412 MSBuild.exe 93 PID 412 wrote to memory of 368 412 MSBuild.exe 93 PID 412 wrote to memory of 368 412 MSBuild.exe 93 PID 412 wrote to memory of 368 412 MSBuild.exe 93 PID 412 wrote to memory of 3908 412 MSBuild.exe 89 PID 412 wrote to memory of 3908 412 MSBuild.exe 89 PID 412 wrote to memory of 3908 412 MSBuild.exe 89 PID 412 wrote to memory of 3908 412 MSBuild.exe 89 PID 412 wrote to memory of 3908 412 MSBuild.exe 89 PID 412 wrote to memory of 3908 412 MSBuild.exe 89 PID 412 wrote to memory of 3908 412 MSBuild.exe 89 PID 412 wrote to memory of 3908 412 MSBuild.exe 89 PID 412 wrote to memory of 2876 412 MSBuild.exe 91 PID 412 wrote to memory of 2876 412 MSBuild.exe 91 PID 412 wrote to memory of 2876 412 MSBuild.exe 91 PID 412 wrote to memory of 2876 412 MSBuild.exe 91 PID 412 wrote to memory of 2876 412 MSBuild.exe 91 PID 412 wrote to memory of 2876 412 MSBuild.exe 91 PID 412 wrote to memory of 2876 412 MSBuild.exe 91 PID 412 wrote to memory of 2876 412 MSBuild.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loader-IDB.exe"C:\Users\Admin\AppData\Local\Temp\Loader-IDB.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\ProgramData\Anyname.exe"C:\ProgramData\Anyname.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\Patch.exePatch.exe /silent3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2700
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"2⤵
- Modifies WinLogon for persistence
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\MSBuild.exeC:\Users\Admin\AppData\Local\Temp\MSBuild.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Users\Admin\AppData\Local\Temp\MSBuild.exe-d 56007 TCP4⤵
- Executes dropped EXE
PID:4064
-
-
C:\Users\Admin\AppData\Local\Temp\revpe.exe-d 56007 TCP4⤵
- Executes dropped EXE
PID:3720
-
-
C:\Users\Admin\AppData\Local\Temp\MSBuild.exe-a 10.10.0.27 56007 56007 TCP4⤵
- Executes dropped EXE
PID:3452
-
-
C:\Users\Admin\AppData\Local\Temp\MSBuild.exe-d 56008 TCP4⤵
- Executes dropped EXE
PID:3908
-
-
C:\Users\Admin\AppData\Local\Temp\MSBuild.exe-a 10.10.0.27 56008 56008 TCP4⤵
- Executes dropped EXE
PID:2876
-
-
C:\Users\Admin\AppData\Local\Temp\revpe.exe-a 10.10.0.27 56007 56007 TCP4⤵
- Executes dropped EXE
PID:368
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1092