Resubmissions

23-09-2021 13:59

210923-ractvaefc5 8

22-08-2021 12:44

210822-vqqzsf2ch6 10

Analysis

  • max time kernel
    301s
  • max time network
    305s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    22-08-2021 12:44

General

  • Target

    ApowerREC.exe

  • Size

    8.9MB

  • MD5

    810be064429970190268a24af354a2f1

  • SHA1

    f5e17599a9c30a9eada1dcb276b888bdeffd037d

  • SHA256

    7edf30b359be3f27c9e7313352bc2d4cccb0e36010b34633646ea4823a70a82b

  • SHA512

    d385f16cb89fff66926770768d34686963dededf2fe47cb3889fc1ab9ae791c9067b76d78d0f5b58f2a29d9bdb2e709a672d560c97cf34e1834230b322c157b0

Malware Config

Signatures

  • RevcodeRat, WebMonitorRat

    WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.

  • WebMonitor Payload 1 IoCs
  • Executes dropped EXE 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious use of SetThreadContext 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 3 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 46 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ApowerREC.exe
    "C:\Users\Admin\AppData\Local\Temp\ApowerREC.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c
      2⤵
        PID:3384
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        2⤵
          PID:212
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c schtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Local\Temp\chrome\chrome.exe'" /f
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1140
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Local\Temp\chrome\chrome.exe'" /f
            3⤵
            • Creates scheduled task(s)
            PID:2356
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\ApowerREC.exe" "C:\Users\Admin\AppData\Local\Temp\chrome\chrome.exe"
          2⤵
            PID:4048
        • C:\Users\Admin\AppData\Local\Temp\chrome\chrome.exe
          C:\Users\Admin\AppData\Local\Temp\chrome\chrome.exe
          1⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3264
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c
            2⤵
              PID:200
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              2⤵
                PID:2732
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3264 -s 1892
                2⤵
                • Program crash
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3412
            • C:\Users\Admin\AppData\Local\Temp\chrome\chrome.exe
              C:\Users\Admin\AppData\Local\Temp\chrome\chrome.exe
              1⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:512
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c
                2⤵
                  PID:2172
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  2⤵
                  • Adds Run key to start application
                  • Suspicious use of SetThreadContext
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:2420
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    -d 56007 TCP
                    3⤵
                      PID:1504
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                      -a 10.10.0.30 56007 56007 TCP
                      3⤵
                        PID:2060
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                        -d 56008 TCP
                        3⤵
                          PID:3800
                        • C:\Users\Admin\AppData\Local\Temp\revpe.exe
                          -d 56008 TCP
                          3⤵
                          • Executes dropped EXE
                          PID:808
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                          -a 10.10.0.30 56008 56008 TCP
                          3⤵
                            PID:3896
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 512 -s 1868
                          2⤵
                          • Program crash
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1348
                      • C:\Users\Admin\AppData\Local\Temp\chrome\chrome.exe
                        C:\Users\Admin\AppData\Local\Temp\chrome\chrome.exe
                        1⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3884
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\System32\cmd.exe" /c
                          2⤵
                            PID:3264
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                            2⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2260
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 3884 -s 1868
                            2⤵
                            • Program crash
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1112

                        Network

                        MITRE ATT&CK Matrix ATT&CK v6

                        Execution

                        Scheduled Task

                        1
                        T1053

                        Persistence

                        Registry Run Keys / Startup Folder

                        1
                        T1060

                        Scheduled Task

                        1
                        T1053

                        Privilege Escalation

                        Scheduled Task

                        1
                        T1053

                        Defense Evasion

                        Modify Registry

                        1
                        T1112

                        Discovery

                        System Information Discovery

                        1
                        T1082

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Temp\chrome\chrome.exe
                          MD5

                          810be064429970190268a24af354a2f1

                          SHA1

                          f5e17599a9c30a9eada1dcb276b888bdeffd037d

                          SHA256

                          7edf30b359be3f27c9e7313352bc2d4cccb0e36010b34633646ea4823a70a82b

                          SHA512

                          d385f16cb89fff66926770768d34686963dededf2fe47cb3889fc1ab9ae791c9067b76d78d0f5b58f2a29d9bdb2e709a672d560c97cf34e1834230b322c157b0

                        • C:\Users\Admin\AppData\Local\Temp\chrome\chrome.exe
                          MD5

                          810be064429970190268a24af354a2f1

                          SHA1

                          f5e17599a9c30a9eada1dcb276b888bdeffd037d

                          SHA256

                          7edf30b359be3f27c9e7313352bc2d4cccb0e36010b34633646ea4823a70a82b

                          SHA512

                          d385f16cb89fff66926770768d34686963dededf2fe47cb3889fc1ab9ae791c9067b76d78d0f5b58f2a29d9bdb2e709a672d560c97cf34e1834230b322c157b0

                        • C:\Users\Admin\AppData\Local\Temp\chrome\chrome.exe
                          MD5

                          810be064429970190268a24af354a2f1

                          SHA1

                          f5e17599a9c30a9eada1dcb276b888bdeffd037d

                          SHA256

                          7edf30b359be3f27c9e7313352bc2d4cccb0e36010b34633646ea4823a70a82b

                          SHA512

                          d385f16cb89fff66926770768d34686963dededf2fe47cb3889fc1ab9ae791c9067b76d78d0f5b58f2a29d9bdb2e709a672d560c97cf34e1834230b322c157b0

                        • C:\Users\Admin\AppData\Local\Temp\chrome\chrome.exe
                          MD5

                          810be064429970190268a24af354a2f1

                          SHA1

                          f5e17599a9c30a9eada1dcb276b888bdeffd037d

                          SHA256

                          7edf30b359be3f27c9e7313352bc2d4cccb0e36010b34633646ea4823a70a82b

                          SHA512

                          d385f16cb89fff66926770768d34686963dededf2fe47cb3889fc1ab9ae791c9067b76d78d0f5b58f2a29d9bdb2e709a672d560c97cf34e1834230b322c157b0

                        • C:\Users\Admin\AppData\Local\Temp\revpe.exe
                          MD5

                          ca42e05f9d53c7ec9383307c1ea282bb

                          SHA1

                          ed0efa1b59b461dcda08121a39411bee72f6b4cb

                          SHA256

                          63a7295e66183379580db16d0d191bb261ccc9edb982980051291c8bdf6c4ade

                          SHA512

                          4a1e3655a93f5e29ac7191eb3249b5b5a61b90353e78cc0bae4e81008aaff43bd9db4c2fde0c5ffcdae5e7eb87dfccffd4a1f383c78f5d40d52cbc4d61890196

                        • C:\Users\Admin\AppData\Local\Temp\revpe.exe
                          MD5

                          ca42e05f9d53c7ec9383307c1ea282bb

                          SHA1

                          ed0efa1b59b461dcda08121a39411bee72f6b4cb

                          SHA256

                          63a7295e66183379580db16d0d191bb261ccc9edb982980051291c8bdf6c4ade

                          SHA512

                          4a1e3655a93f5e29ac7191eb3249b5b5a61b90353e78cc0bae4e81008aaff43bd9db4c2fde0c5ffcdae5e7eb87dfccffd4a1f383c78f5d40d52cbc4d61890196

                        • memory/200-134-0x0000000000000000-mapping.dmp
                        • memory/212-122-0x00000000005F5A70-mapping.dmp
                        • memory/512-143-0x0000000002B30000-0x0000000002B31000-memory.dmp
                          Filesize

                          4KB

                        • memory/808-162-0x0000000000418F40-mapping.dmp
                        • memory/1140-123-0x0000000000000000-mapping.dmp
                        • memory/1504-155-0x0000000000400000-0x000000000041B000-memory.dmp
                          Filesize

                          108KB

                        • memory/1504-171-0x0000000000400000-0x000000000041B000-memory.dmp
                          Filesize

                          108KB

                        • memory/1504-156-0x0000000000418F40-mapping.dmp
                        • memory/1968-117-0x0000000005200000-0x0000000005201000-memory.dmp
                          Filesize

                          4KB

                        • memory/1968-114-0x0000000000B10000-0x0000000000B11000-memory.dmp
                          Filesize

                          4KB

                        • memory/1968-116-0x0000000005700000-0x0000000005701000-memory.dmp
                          Filesize

                          4KB

                        • memory/1968-118-0x0000000005130000-0x0000000005131000-memory.dmp
                          Filesize

                          4KB

                        • memory/1968-119-0x00000000051E0000-0x00000000051E1000-memory.dmp
                          Filesize

                          4KB

                        • memory/2060-158-0x0000000000418F40-mapping.dmp
                        • memory/2172-144-0x0000000000000000-mapping.dmp
                        • memory/2260-181-0x00000000005F5A70-mapping.dmp
                        • memory/2356-125-0x0000000000000000-mapping.dmp
                        • memory/2420-146-0x00000000005F5A70-mapping.dmp
                        • memory/2420-154-0x0000000007530000-0x0000000008530000-memory.dmp
                          Filesize

                          16.0MB

                        • memory/2420-149-0x0000000000400000-0x00000000005F7000-memory.dmp
                          Filesize

                          2.0MB

                        • memory/2420-145-0x0000000000400000-0x00000000005F7000-memory.dmp
                          Filesize

                          2.0MB

                        • memory/2732-136-0x00000000005F5A70-mapping.dmp
                        • memory/3264-133-0x0000000000A10000-0x0000000000A11000-memory.dmp
                          Filesize

                          4KB

                        • memory/3264-128-0x0000000000B50000-0x0000000000B51000-memory.dmp
                          Filesize

                          4KB

                        • memory/3264-179-0x0000000000000000-mapping.dmp
                        • memory/3384-120-0x0000000000000000-mapping.dmp
                        • memory/3884-177-0x0000000005740000-0x0000000005741000-memory.dmp
                          Filesize

                          4KB

                        • memory/3896-165-0x0000000000418F40-mapping.dmp
                        • memory/4048-124-0x0000000000000000-mapping.dmp