Analysis
-
max time kernel
152s -
max time network
120s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
11-12-2021 20:10
Static task
static1
Behavioral task
behavioral1
Sample
Perfectly Clear Workbench.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
Perfectly Clear Workbench.exe
Resource
win10-en-20211208
General
-
Target
Perfectly Clear Workbench.exe
-
Size
22.7MB
-
MD5
07c8ab309a013e4786c9587db7a65bdf
-
SHA1
ef8ab1daf015590cf14ce47a350a99c82b71d125
-
SHA256
9f9f34da4353b46d4b59673ac0520cdf7bd5a513c0590dfde99363cf5f1db657
-
SHA512
ef392d50539d36eac9609ffcd76a68fa2e18b9fde03e2f8d4554a557e1bd093129aae302211b0ccd04f39b277feff7067cf0bf33b34604e0ab5a3f8d34dfadf2
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
regasm.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "\"C:\\Users\\Admin\\AppData\\Roaming\\255P0r6tYV31PInc\\AqBLOT4psgtW.exe\",explorer.exe" regasm.exe -
RevcodeRat, WebMonitorRat
WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.
-
WebMonitor Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1852-113-0x0000000000400000-0x00000000005F7000-memory.dmp family_webmonitor -
Executes dropped EXE 1 IoCs
Processes:
IDMan.exepid process 1400 IDMan.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\IDMan.exe upx C:\Users\Admin\AppData\Local\Temp\IDMan.exe upx behavioral1/memory/1852-108-0x0000000000400000-0x00000000005F7000-memory.dmp upx behavioral1/memory/1852-109-0x0000000000400000-0x00000000005F7000-memory.dmp upx behavioral1/memory/1852-110-0x0000000000400000-0x00000000005F7000-memory.dmp upx behavioral1/memory/1852-113-0x0000000000400000-0x00000000005F7000-memory.dmp upx behavioral1/memory/1852-114-0x0000000000400000-0x00000000005F7000-memory.dmp upx -
Loads dropped DLL 1 IoCs
Processes:
Perfectly Clear Workbench.exepid process 1904 Perfectly Clear Workbench.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
AppLaunch.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\WM-3631 = "C:\\Users\\Admin\\AppData\\Roaming\\WM-3631.exe" AppLaunch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WM-3631 = "C:\\Users\\Admin\\AppData\\Roaming\\WM-3631.exe" AppLaunch.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
Perfectly Clear Workbench.exeregasm.exedescription pid process target process PID 1904 set thread context of 1156 1904 Perfectly Clear Workbench.exe regasm.exe PID 1156 set thread context of 1852 1156 regasm.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1172 1852 WerFault.exe AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
regasm.exeWerFault.exepid process 1156 regasm.exe 1172 WerFault.exe 1172 WerFault.exe 1172 WerFault.exe 1172 WerFault.exe 1172 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
WerFault.exepid process 1172 WerFault.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
Perfectly Clear Workbench.exepid process 1904 Perfectly Clear Workbench.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
regasm.exeAppLaunch.exeWerFault.exedescription pid process Token: SeDebugPrivilege 1156 regasm.exe Token: SeDebugPrivilege 1852 AppLaunch.exe Token: SeShutdownPrivilege 1852 AppLaunch.exe Token: SeDebugPrivilege 1172 WerFault.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
Perfectly Clear Workbench.exeAppLaunch.exepid process 1904 Perfectly Clear Workbench.exe 1852 AppLaunch.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
Perfectly Clear Workbench.exeregasm.exeAppLaunch.exedescription pid process target process PID 1904 wrote to memory of 1400 1904 Perfectly Clear Workbench.exe IDMan.exe PID 1904 wrote to memory of 1400 1904 Perfectly Clear Workbench.exe IDMan.exe PID 1904 wrote to memory of 1400 1904 Perfectly Clear Workbench.exe IDMan.exe PID 1904 wrote to memory of 1400 1904 Perfectly Clear Workbench.exe IDMan.exe PID 1904 wrote to memory of 1156 1904 Perfectly Clear Workbench.exe regasm.exe PID 1904 wrote to memory of 1156 1904 Perfectly Clear Workbench.exe regasm.exe PID 1904 wrote to memory of 1156 1904 Perfectly Clear Workbench.exe regasm.exe PID 1904 wrote to memory of 1156 1904 Perfectly Clear Workbench.exe regasm.exe PID 1904 wrote to memory of 1156 1904 Perfectly Clear Workbench.exe regasm.exe PID 1904 wrote to memory of 1156 1904 Perfectly Clear Workbench.exe regasm.exe PID 1904 wrote to memory of 1156 1904 Perfectly Clear Workbench.exe regasm.exe PID 1904 wrote to memory of 1156 1904 Perfectly Clear Workbench.exe regasm.exe PID 1156 wrote to memory of 1852 1156 regasm.exe AppLaunch.exe PID 1156 wrote to memory of 1852 1156 regasm.exe AppLaunch.exe PID 1156 wrote to memory of 1852 1156 regasm.exe AppLaunch.exe PID 1156 wrote to memory of 1852 1156 regasm.exe AppLaunch.exe PID 1156 wrote to memory of 1852 1156 regasm.exe AppLaunch.exe PID 1156 wrote to memory of 1852 1156 regasm.exe AppLaunch.exe PID 1156 wrote to memory of 1852 1156 regasm.exe AppLaunch.exe PID 1156 wrote to memory of 1852 1156 regasm.exe AppLaunch.exe PID 1156 wrote to memory of 1852 1156 regasm.exe AppLaunch.exe PID 1156 wrote to memory of 1852 1156 regasm.exe AppLaunch.exe PID 1156 wrote to memory of 1852 1156 regasm.exe AppLaunch.exe PID 1852 wrote to memory of 1172 1852 AppLaunch.exe WerFault.exe PID 1852 wrote to memory of 1172 1852 AppLaunch.exe WerFault.exe PID 1852 wrote to memory of 1172 1852 AppLaunch.exe WerFault.exe PID 1852 wrote to memory of 1172 1852 AppLaunch.exe WerFault.exe PID 1852 wrote to memory of 1172 1852 AppLaunch.exe WerFault.exe PID 1852 wrote to memory of 1172 1852 AppLaunch.exe WerFault.exe PID 1852 wrote to memory of 1172 1852 AppLaunch.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Perfectly Clear Workbench.exe"C:\Users\Admin\AppData\Local\Temp\Perfectly Clear Workbench.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\IDMan.exeC:\Users\Admin\AppData\Local\Temp\IDMan.exe2⤵
- Executes dropped EXE
PID:1400
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"2⤵
- Modifies WinLogon for persistence
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"3⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 16924⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1172
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
840f6ec78053bc2351083006c19eb6ec
SHA10ea47ee5f735b227e47228332a4349dbaf951a7c
SHA256973e4e3d6328c0fc06194b424ee902673831c894a70b1e34ef48f15e5ac916af
SHA5129dc8f809b7cbc9b1742111b7c3112ff07b9c2d4cb9e7369bfc0e556e740fbe46a06cbae465807ae995b1b34e5321cf6ec219d2237cb1a53b51d97a2190419d9e
-
MD5
840f6ec78053bc2351083006c19eb6ec
SHA10ea47ee5f735b227e47228332a4349dbaf951a7c
SHA256973e4e3d6328c0fc06194b424ee902673831c894a70b1e34ef48f15e5ac916af
SHA5129dc8f809b7cbc9b1742111b7c3112ff07b9c2d4cb9e7369bfc0e556e740fbe46a06cbae465807ae995b1b34e5321cf6ec219d2237cb1a53b51d97a2190419d9e