Analysis
-
max time kernel
151s -
max time network
159s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
19-08-2021 10:56
Static task
static1
Behavioral task
behavioral1
Sample
bdc5cb40d2d655865ed182688f4cb623c545dd9875c6198bf16d616e53c52eb0.exe
Resource
win10v20210408
0 signatures
0 seconds
General
-
Target
bdc5cb40d2d655865ed182688f4cb623c545dd9875c6198bf16d616e53c52eb0.exe
-
Size
721KB
-
MD5
1502cb8a7caf4853614f9fd8f860631e
-
SHA1
813dc57d206536db600a16f8a5da362240cb8516
-
SHA256
bdc5cb40d2d655865ed182688f4cb623c545dd9875c6198bf16d616e53c52eb0
-
SHA512
fa4c28bb760aabba20e7dbf98fe093687cd18c072bca07ed650c01fdee2c498bc8a89e2a6b41a6ca72762d7a2616e207562ee5f3b253fe375b8ff239294bef08
Score
10/10
Malware Config
Signatures
-
RevcodeRat, WebMonitorRat
WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.
-
WebMonitor Payload 1 IoCs
resource yara_rule behavioral1/memory/1720-125-0x0000000000400000-0x00000000004EA000-memory.dmp family_webmonitor -
Executes dropped EXE 1 IoCs
pid Process 2128 despacito.exe -
resource yara_rule behavioral1/memory/1720-123-0x0000000000400000-0x00000000004EA000-memory.dmp upx behavioral1/memory/1720-125-0x0000000000400000-0x00000000004EA000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\updator = "C:\\Users\\Admin\\Music\\despacito.exe -boot" despacito.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2128 set thread context of 1720 2128 despacito.exe 84 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2128 despacito.exe 2128 despacito.exe 2128 despacito.exe 2128 despacito.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3728 bdc5cb40d2d655865ed182688f4cb623c545dd9875c6198bf16d616e53c52eb0.exe Token: SeDebugPrivilege 2128 despacito.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3728 wrote to memory of 2404 3728 bdc5cb40d2d655865ed182688f4cb623c545dd9875c6198bf16d616e53c52eb0.exe 78 PID 3728 wrote to memory of 2404 3728 bdc5cb40d2d655865ed182688f4cb623c545dd9875c6198bf16d616e53c52eb0.exe 78 PID 3728 wrote to memory of 2404 3728 bdc5cb40d2d655865ed182688f4cb623c545dd9875c6198bf16d616e53c52eb0.exe 78 PID 3728 wrote to memory of 2460 3728 bdc5cb40d2d655865ed182688f4cb623c545dd9875c6198bf16d616e53c52eb0.exe 80 PID 3728 wrote to memory of 2460 3728 bdc5cb40d2d655865ed182688f4cb623c545dd9875c6198bf16d616e53c52eb0.exe 80 PID 3728 wrote to memory of 2460 3728 bdc5cb40d2d655865ed182688f4cb623c545dd9875c6198bf16d616e53c52eb0.exe 80 PID 3148 wrote to memory of 2128 3148 explorer.exe 82 PID 3148 wrote to memory of 2128 3148 explorer.exe 82 PID 3148 wrote to memory of 2128 3148 explorer.exe 82 PID 2128 wrote to memory of 1720 2128 despacito.exe 84 PID 2128 wrote to memory of 1720 2128 despacito.exe 84 PID 2128 wrote to memory of 1720 2128 despacito.exe 84 PID 2128 wrote to memory of 1720 2128 despacito.exe 84 PID 2128 wrote to memory of 1720 2128 despacito.exe 84 PID 2128 wrote to memory of 1720 2128 despacito.exe 84 PID 2128 wrote to memory of 1720 2128 despacito.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\bdc5cb40d2d655865ed182688f4cb623c545dd9875c6198bf16d616e53c52eb0.exe"C:\Users\Admin\AppData\Local\Temp\bdc5cb40d2d655865ed182688f4cb623c545dd9875c6198bf16d616e53c52eb0.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\bdc5cb40d2d655865ed182688f4cb623c545dd9875c6198bf16d616e53c52eb0.exe" "C:\Users\Admin\Music\despacito.exe"2⤵PID:2404
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe" /c, "C:\Users\Admin\Music\despacito.exe"2⤵PID:2460
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Users\Admin\Music\despacito.exe"C:\Users\Admin\Music\despacito.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"3⤵PID:1720
-
-