Analysis
-
max time kernel
152s -
max time network
120s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
11-12-2021 20:10
Static task
static1
Behavioral task
behavioral1
Sample
Perfectly Clear Workbench.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Perfectly Clear Workbench.exe
Resource
win10-en-20211208
windows10_x64
0 signatures
0 seconds
General
-
Target
Perfectly Clear Workbench.exe
-
Size
22.7MB
-
MD5
07c8ab309a013e4786c9587db7a65bdf
-
SHA1
ef8ab1daf015590cf14ce47a350a99c82b71d125
-
SHA256
9f9f34da4353b46d4b59673ac0520cdf7bd5a513c0590dfde99363cf5f1db657
-
SHA512
ef392d50539d36eac9609ffcd76a68fa2e18b9fde03e2f8d4554a557e1bd093129aae302211b0ccd04f39b277feff7067cf0bf33b34604e0ab5a3f8d34dfadf2
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "\"C:\\Users\\Admin\\AppData\\Roaming\\255P0r6tYV31PInc\\AqBLOT4psgtW.exe\",explorer.exe" regasm.exe -
RevcodeRat, WebMonitorRat
WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.
-
WebMonitor Payload 1 IoCs
resource yara_rule behavioral1/memory/1852-113-0x0000000000400000-0x00000000005F7000-memory.dmp family_webmonitor -
Executes dropped EXE 1 IoCs
pid Process 1400 IDMan.exe -
resource yara_rule behavioral1/files/0x000800000001227a-93.dat upx behavioral1/files/0x000800000001227a-95.dat upx behavioral1/memory/1852-108-0x0000000000400000-0x00000000005F7000-memory.dmp upx behavioral1/memory/1852-109-0x0000000000400000-0x00000000005F7000-memory.dmp upx behavioral1/memory/1852-110-0x0000000000400000-0x00000000005F7000-memory.dmp upx behavioral1/memory/1852-113-0x0000000000400000-0x00000000005F7000-memory.dmp upx behavioral1/memory/1852-114-0x0000000000400000-0x00000000005F7000-memory.dmp upx -
Loads dropped DLL 1 IoCs
pid Process 1904 Perfectly Clear Workbench.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\WM-3631 = "C:\\Users\\Admin\\AppData\\Roaming\\WM-3631.exe" AppLaunch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WM-3631 = "C:\\Users\\Admin\\AppData\\Roaming\\WM-3631.exe" AppLaunch.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1904 set thread context of 1156 1904 Perfectly Clear Workbench.exe 28 PID 1156 set thread context of 1852 1156 regasm.exe 29 -
Program crash 1 IoCs
pid pid_target Process procid_target 1172 1852 WerFault.exe 29 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1156 regasm.exe 1172 WerFault.exe 1172 WerFault.exe 1172 WerFault.exe 1172 WerFault.exe 1172 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1172 WerFault.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1904 Perfectly Clear Workbench.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1156 regasm.exe Token: SeDebugPrivilege 1852 AppLaunch.exe Token: SeShutdownPrivilege 1852 AppLaunch.exe Token: SeDebugPrivilege 1172 WerFault.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1904 Perfectly Clear Workbench.exe 1852 AppLaunch.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1904 wrote to memory of 1400 1904 Perfectly Clear Workbench.exe 27 PID 1904 wrote to memory of 1400 1904 Perfectly Clear Workbench.exe 27 PID 1904 wrote to memory of 1400 1904 Perfectly Clear Workbench.exe 27 PID 1904 wrote to memory of 1400 1904 Perfectly Clear Workbench.exe 27 PID 1904 wrote to memory of 1156 1904 Perfectly Clear Workbench.exe 28 PID 1904 wrote to memory of 1156 1904 Perfectly Clear Workbench.exe 28 PID 1904 wrote to memory of 1156 1904 Perfectly Clear Workbench.exe 28 PID 1904 wrote to memory of 1156 1904 Perfectly Clear Workbench.exe 28 PID 1904 wrote to memory of 1156 1904 Perfectly Clear Workbench.exe 28 PID 1904 wrote to memory of 1156 1904 Perfectly Clear Workbench.exe 28 PID 1904 wrote to memory of 1156 1904 Perfectly Clear Workbench.exe 28 PID 1904 wrote to memory of 1156 1904 Perfectly Clear Workbench.exe 28 PID 1156 wrote to memory of 1852 1156 regasm.exe 29 PID 1156 wrote to memory of 1852 1156 regasm.exe 29 PID 1156 wrote to memory of 1852 1156 regasm.exe 29 PID 1156 wrote to memory of 1852 1156 regasm.exe 29 PID 1156 wrote to memory of 1852 1156 regasm.exe 29 PID 1156 wrote to memory of 1852 1156 regasm.exe 29 PID 1156 wrote to memory of 1852 1156 regasm.exe 29 PID 1156 wrote to memory of 1852 1156 regasm.exe 29 PID 1156 wrote to memory of 1852 1156 regasm.exe 29 PID 1156 wrote to memory of 1852 1156 regasm.exe 29 PID 1156 wrote to memory of 1852 1156 regasm.exe 29 PID 1852 wrote to memory of 1172 1852 AppLaunch.exe 33 PID 1852 wrote to memory of 1172 1852 AppLaunch.exe 33 PID 1852 wrote to memory of 1172 1852 AppLaunch.exe 33 PID 1852 wrote to memory of 1172 1852 AppLaunch.exe 33 PID 1852 wrote to memory of 1172 1852 AppLaunch.exe 33 PID 1852 wrote to memory of 1172 1852 AppLaunch.exe 33 PID 1852 wrote to memory of 1172 1852 AppLaunch.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\Perfectly Clear Workbench.exe"C:\Users\Admin\AppData\Local\Temp\Perfectly Clear Workbench.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\IDMan.exeC:\Users\Admin\AppData\Local\Temp\IDMan.exe2⤵
- Executes dropped EXE
PID:1400
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"2⤵
- Modifies WinLogon for persistence
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"3⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 16924⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1172
-
-
-