Analysis
-
max time kernel
132s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
18-04-2022 12:45
Static task
static1
Behavioral task
behavioral1
Sample
Statement for due invoices.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Statement for due invoices.exe
Resource
win10v2004-20220414-en
General
-
Target
Statement for due invoices.exe
-
Size
1020KB
-
MD5
39812fe18840e436a74aff55785f08d4
-
SHA1
88c0f62af95c53b0a4d1f2d9422c9016490851ed
-
SHA256
0d2cf62b947967dcece71936fe76d44d03d97f11c6ec580c67f33761a99ef708
-
SHA512
7188efcc5c683c4bdab4ad5dace8df49402e64de6c3bf6c6be980e831ae1aca9a7a094aee89f97236f1f00468e6ba93988dad2ca8c2778557f8f5d5418ccaa24
Malware Config
Extracted
webmonitor
blackwire.wm01.to:443
-
config_key
XHSPjxLqnkGzEknQM1EIWtzFAMfNcnJY
-
private_key
Bm19W87ME
-
url_path
/recv5.php
Signatures
-
RevcodeRat, WebMonitorRat
WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.
-
WebMonitor Payload 3 IoCs
resource yara_rule behavioral1/memory/1804-68-0x0000000000400000-0x00000000004F6000-memory.dmp family_webmonitor behavioral1/memory/1804-69-0x0000000000400000-0x00000000004F6000-memory.dmp family_webmonitor behavioral1/memory/1804-71-0x00000000032C0000-0x00000000042C0000-memory.dmp family_webmonitor -
resource yara_rule behavioral1/memory/1804-60-0x0000000000400000-0x00000000004F6000-memory.dmp upx behavioral1/memory/1804-62-0x0000000000400000-0x00000000004F6000-memory.dmp upx behavioral1/memory/1804-63-0x0000000000400000-0x00000000004F6000-memory.dmp upx behavioral1/memory/1804-65-0x0000000000400000-0x00000000004F6000-memory.dmp upx behavioral1/memory/1804-67-0x0000000000400000-0x00000000004F6000-memory.dmp upx behavioral1/memory/1804-68-0x0000000000400000-0x00000000004F6000-memory.dmp upx behavioral1/memory/1804-69-0x0000000000400000-0x00000000004F6000-memory.dmp upx behavioral1/memory/1804-71-0x00000000032C0000-0x00000000042C0000-memory.dmp upx -
Unexpected DNS network traffic destination 2 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 185.243.215.214 Destination IP 185.243.215.214 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2044 set thread context of 1804 2044 Statement for due invoices.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1820 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1804 Statement for due invoices.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2044 wrote to memory of 1820 2044 Statement for due invoices.exe 27 PID 2044 wrote to memory of 1820 2044 Statement for due invoices.exe 27 PID 2044 wrote to memory of 1820 2044 Statement for due invoices.exe 27 PID 2044 wrote to memory of 1820 2044 Statement for due invoices.exe 27 PID 2044 wrote to memory of 1804 2044 Statement for due invoices.exe 29 PID 2044 wrote to memory of 1804 2044 Statement for due invoices.exe 29 PID 2044 wrote to memory of 1804 2044 Statement for due invoices.exe 29 PID 2044 wrote to memory of 1804 2044 Statement for due invoices.exe 29 PID 2044 wrote to memory of 1804 2044 Statement for due invoices.exe 29 PID 2044 wrote to memory of 1804 2044 Statement for due invoices.exe 29 PID 2044 wrote to memory of 1804 2044 Statement for due invoices.exe 29 PID 2044 wrote to memory of 1804 2044 Statement for due invoices.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\Statement for due invoices.exe"C:\Users\Admin\AppData\Local\Temp\Statement for due invoices.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\iPiuyFhOmJALV" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE071.tmp"2⤵
- Creates scheduled task(s)
PID:1820
-
-
C:\Users\Admin\AppData\Local\Temp\Statement for due invoices.exe"{path}"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1804
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5da176821e55af7dcad375ba593082684
SHA1edb7dec1d8ebb16f086a32f40f7aaf258226ee26
SHA2569727d50a2f2da4774cfc70b6a607106f84ce12df2d3819a49e84b1cf6e8a87aa
SHA512480a858a540b670d8398cfb8d6678d447ce47190da238c9721e2ad4f29266e283102a6e0ff1056e6be8ea67bccd0cf6bf4083ae7daec6b6c24f0ebc71d8bd9ce