Analysis
-
max time kernel
4294225s -
max time network
174s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
19-03-2022 17:07
Static task
static1
Behavioral task
behavioral1
Sample
98c04d9dbe5fcb2d920502beeb6dd342459d0d2ee48ad06402d538c8cdeb806a.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
98c04d9dbe5fcb2d920502beeb6dd342459d0d2ee48ad06402d538c8cdeb806a.exe
Resource
win10v2004-20220310-en
General
-
Target
98c04d9dbe5fcb2d920502beeb6dd342459d0d2ee48ad06402d538c8cdeb806a.exe
-
Size
1.6MB
-
MD5
a8004453810b0b62da1aa007091ce3e2
-
SHA1
d8eab7301e6ac2ac9a24f6395e4024e04e15697d
-
SHA256
98c04d9dbe5fcb2d920502beeb6dd342459d0d2ee48ad06402d538c8cdeb806a
-
SHA512
c6cb7c15b0b0b17d383853e072dd77ca7bd32d2698add1d5277ebb144cc4c0bc60164723e63c9e768129059b160ff7f7a7bf3d33eecf4fdd5ab4362272ec4ae6
Malware Config
Signatures
-
RevcodeRat, WebMonitorRat
WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.
-
WebMonitor Payload 3 IoCs
resource yara_rule behavioral1/memory/1996-69-0x0000000000400000-0x00000000005F7000-memory.dmp family_webmonitor behavioral1/memory/1996-70-0x0000000000400000-0x00000000005F7000-memory.dmp family_webmonitor behavioral1/memory/1996-72-0x0000000002CE0000-0x0000000003CE0000-memory.dmp family_webmonitor -
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Looks for VMWare Tools registry key 2 TTPs
-
resource yara_rule behavioral1/memory/1996-62-0x0000000000400000-0x00000000005F7000-memory.dmp upx behavioral1/memory/1996-64-0x0000000000400000-0x00000000005F7000-memory.dmp upx behavioral1/memory/1996-66-0x0000000000400000-0x00000000005F7000-memory.dmp upx behavioral1/memory/1996-67-0x0000000000400000-0x00000000005F7000-memory.dmp upx behavioral1/memory/1996-68-0x0000000000400000-0x00000000005F7000-memory.dmp upx behavioral1/memory/1996-69-0x0000000000400000-0x00000000005F7000-memory.dmp upx behavioral1/memory/1996-70-0x0000000000400000-0x00000000005F7000-memory.dmp upx -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 98c04d9dbe5fcb2d920502beeb6dd342459d0d2ee48ad06402d538c8cdeb806a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 98c04d9dbe5fcb2d920502beeb6dd342459d0d2ee48ad06402d538c8cdeb806a.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 98c04d9dbe5fcb2d920502beeb6dd342459d0d2ee48ad06402d538c8cdeb806a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 98c04d9dbe5fcb2d920502beeb6dd342459d0d2ee48ad06402d538c8cdeb806a.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1632 set thread context of 1996 1632 98c04d9dbe5fcb2d920502beeb6dd342459d0d2ee48ad06402d538c8cdeb806a.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 476 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1632 98c04d9dbe5fcb2d920502beeb6dd342459d0d2ee48ad06402d538c8cdeb806a.exe Token: SeDebugPrivilege 1996 98c04d9dbe5fcb2d920502beeb6dd342459d0d2ee48ad06402d538c8cdeb806a.exe Token: SeShutdownPrivilege 1996 98c04d9dbe5fcb2d920502beeb6dd342459d0d2ee48ad06402d538c8cdeb806a.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1632 wrote to memory of 476 1632 98c04d9dbe5fcb2d920502beeb6dd342459d0d2ee48ad06402d538c8cdeb806a.exe 30 PID 1632 wrote to memory of 476 1632 98c04d9dbe5fcb2d920502beeb6dd342459d0d2ee48ad06402d538c8cdeb806a.exe 30 PID 1632 wrote to memory of 476 1632 98c04d9dbe5fcb2d920502beeb6dd342459d0d2ee48ad06402d538c8cdeb806a.exe 30 PID 1632 wrote to memory of 476 1632 98c04d9dbe5fcb2d920502beeb6dd342459d0d2ee48ad06402d538c8cdeb806a.exe 30 PID 1632 wrote to memory of 1996 1632 98c04d9dbe5fcb2d920502beeb6dd342459d0d2ee48ad06402d538c8cdeb806a.exe 32 PID 1632 wrote to memory of 1996 1632 98c04d9dbe5fcb2d920502beeb6dd342459d0d2ee48ad06402d538c8cdeb806a.exe 32 PID 1632 wrote to memory of 1996 1632 98c04d9dbe5fcb2d920502beeb6dd342459d0d2ee48ad06402d538c8cdeb806a.exe 32 PID 1632 wrote to memory of 1996 1632 98c04d9dbe5fcb2d920502beeb6dd342459d0d2ee48ad06402d538c8cdeb806a.exe 32 PID 1632 wrote to memory of 1996 1632 98c04d9dbe5fcb2d920502beeb6dd342459d0d2ee48ad06402d538c8cdeb806a.exe 32 PID 1632 wrote to memory of 1996 1632 98c04d9dbe5fcb2d920502beeb6dd342459d0d2ee48ad06402d538c8cdeb806a.exe 32 PID 1632 wrote to memory of 1996 1632 98c04d9dbe5fcb2d920502beeb6dd342459d0d2ee48ad06402d538c8cdeb806a.exe 32 PID 1632 wrote to memory of 1996 1632 98c04d9dbe5fcb2d920502beeb6dd342459d0d2ee48ad06402d538c8cdeb806a.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\98c04d9dbe5fcb2d920502beeb6dd342459d0d2ee48ad06402d538c8cdeb806a.exe"C:\Users\Admin\AppData\Local\Temp\98c04d9dbe5fcb2d920502beeb6dd342459d0d2ee48ad06402d538c8cdeb806a.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ydmvezGInX" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6068.tmp"2⤵
- Creates scheduled task(s)
PID:476
-
-
C:\Users\Admin\AppData\Local\Temp\98c04d9dbe5fcb2d920502beeb6dd342459d0d2ee48ad06402d538c8cdeb806a.exe"{path}"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1996
-