Analysis
-
max time kernel
146s -
max time network
138s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
15-10-2021 13:18
Static task
static1
Behavioral task
behavioral1
Sample
f010795b19f2c56b230b7de0f9803cd3aeea208a.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
f010795b19f2c56b230b7de0f9803cd3aeea208a.exe
Resource
win10-en-20211014
General
-
Target
f010795b19f2c56b230b7de0f9803cd3aeea208a.exe
-
Size
2.0MB
-
MD5
517e0a4d7e27837a7075615032a6cc69
-
SHA1
f010795b19f2c56b230b7de0f9803cd3aeea208a
-
SHA256
f4743b96b2336504bd9b8207b0794da22e9eaf583703a7e3dd58cf872314ac4f
-
SHA512
5c9f1b9c874587b79852e98fe7adb06f544dbbb5b5af7bd60205cd4c24a43e5ab37d85d4ccb1fb22815942e6546cf936f1caa371718440cd01618094a0f18bb7
Malware Config
Signatures
-
RevcodeRat, WebMonitorRat
WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.
-
WebMonitor Payload 5 IoCs
resource yara_rule behavioral1/memory/580-74-0x0000000000420000-0x0000000000513000-memory.dmp family_webmonitor behavioral1/memory/580-75-0x0000000000420000-0x0000000000513000-memory.dmp family_webmonitor behavioral1/memory/580-76-0x0000000000420000-0x0000000000513000-memory.dmp family_webmonitor behavioral1/memory/580-78-0x000000000049D8CA-mapping.dmp family_webmonitor behavioral1/memory/580-80-0x0000000000421000-0x000000000050B000-memory.dmp family_webmonitor -
Executes dropped EXE 4 IoCs
pid Process 1220 Updates.exe 580 AddInProcess32.exe 1688 Antivirus.exe 1068 Antivirus.exe -
Loads dropped DLL 4 IoCs
pid Process 1516 f010795b19f2c56b230b7de0f9803cd3aeea208a.exe 1220 Updates.exe 1220 Updates.exe 1688 Antivirus.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/memory/1516-56-0x00000000020F0000-0x0000000002111000-memory.dmp agile_net -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\Run\Updates1 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Updates.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1220 set thread context of 580 1220 Updates.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1516 f010795b19f2c56b230b7de0f9803cd3aeea208a.exe 1516 f010795b19f2c56b230b7de0f9803cd3aeea208a.exe 1516 f010795b19f2c56b230b7de0f9803cd3aeea208a.exe 1516 f010795b19f2c56b230b7de0f9803cd3aeea208a.exe 1220 Updates.exe 1220 Updates.exe 1220 Updates.exe 1220 Updates.exe 1688 Antivirus.exe 1068 Antivirus.exe 1068 Antivirus.exe 1068 Antivirus.exe 1220 Updates.exe 1220 Updates.exe 1220 Updates.exe 1220 Updates.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1516 f010795b19f2c56b230b7de0f9803cd3aeea208a.exe Token: SeDebugPrivilege 1220 Updates.exe Token: SeDebugPrivilege 1688 Antivirus.exe Token: SeDebugPrivilege 1068 Antivirus.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1516 wrote to memory of 1012 1516 f010795b19f2c56b230b7de0f9803cd3aeea208a.exe 27 PID 1516 wrote to memory of 1012 1516 f010795b19f2c56b230b7de0f9803cd3aeea208a.exe 27 PID 1516 wrote to memory of 1012 1516 f010795b19f2c56b230b7de0f9803cd3aeea208a.exe 27 PID 1516 wrote to memory of 1012 1516 f010795b19f2c56b230b7de0f9803cd3aeea208a.exe 27 PID 1012 wrote to memory of 1736 1012 cmd.exe 29 PID 1012 wrote to memory of 1736 1012 cmd.exe 29 PID 1012 wrote to memory of 1736 1012 cmd.exe 29 PID 1012 wrote to memory of 1736 1012 cmd.exe 29 PID 1516 wrote to memory of 1220 1516 f010795b19f2c56b230b7de0f9803cd3aeea208a.exe 30 PID 1516 wrote to memory of 1220 1516 f010795b19f2c56b230b7de0f9803cd3aeea208a.exe 30 PID 1516 wrote to memory of 1220 1516 f010795b19f2c56b230b7de0f9803cd3aeea208a.exe 30 PID 1516 wrote to memory of 1220 1516 f010795b19f2c56b230b7de0f9803cd3aeea208a.exe 30 PID 1516 wrote to memory of 1220 1516 f010795b19f2c56b230b7de0f9803cd3aeea208a.exe 30 PID 1516 wrote to memory of 1220 1516 f010795b19f2c56b230b7de0f9803cd3aeea208a.exe 30 PID 1516 wrote to memory of 1220 1516 f010795b19f2c56b230b7de0f9803cd3aeea208a.exe 30 PID 1220 wrote to memory of 580 1220 Updates.exe 33 PID 1220 wrote to memory of 580 1220 Updates.exe 33 PID 1220 wrote to memory of 580 1220 Updates.exe 33 PID 1220 wrote to memory of 580 1220 Updates.exe 33 PID 1220 wrote to memory of 580 1220 Updates.exe 33 PID 1220 wrote to memory of 580 1220 Updates.exe 33 PID 1220 wrote to memory of 580 1220 Updates.exe 33 PID 1220 wrote to memory of 580 1220 Updates.exe 33 PID 1220 wrote to memory of 580 1220 Updates.exe 33 PID 1220 wrote to memory of 580 1220 Updates.exe 33 PID 1220 wrote to memory of 1688 1220 Updates.exe 34 PID 1220 wrote to memory of 1688 1220 Updates.exe 34 PID 1220 wrote to memory of 1688 1220 Updates.exe 34 PID 1220 wrote to memory of 1688 1220 Updates.exe 34 PID 1688 wrote to memory of 1068 1688 Antivirus.exe 35 PID 1688 wrote to memory of 1068 1688 Antivirus.exe 35 PID 1688 wrote to memory of 1068 1688 Antivirus.exe 35 PID 1688 wrote to memory of 1068 1688 Antivirus.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\f010795b19f2c56b230b7de0f9803cd3aeea208a.exe"C:\Users\Admin\AppData\Local\Temp\f010795b19f2c56b230b7de0f9803cd3aeea208a.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Updates1" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Updates.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Updates1" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Updates.exe"3⤵
- Adds Run key to start application
PID:1736
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Updates.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Updates.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"3⤵
- Executes dropped EXE
PID:580
-
-
C:\Users\Admin\AppData\Local\Temp\Antivirus.exe"C:\Users\Admin\AppData\Local\Temp\Antivirus.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\Antivirus.exe"C:\Users\Admin\AppData\Local\Temp\Antivirus.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1068
-
-
-