Analysis

  • max time kernel
    157s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    24-05-2022 16:41

General

  • Target

    e510da3919bd636fcc0b09a3f00355175b660761fe0481809a8cef06d305f553.exe

  • Size

    365KB

  • MD5

    7bb890fdf757f2dca62acdfb2bb26ff9

  • SHA1

    7fba93d7d5fe0250e736675a7ce85c6129341de6

  • SHA256

    e510da3919bd636fcc0b09a3f00355175b660761fe0481809a8cef06d305f553

  • SHA512

    6021fab5a5ff2d10df93173c3fbfbbe64bed1bc15bcf3958c5bc152eb3fcd7b1fde7baac97cd52a1cb5cd75bbb94d6f09bb6dcc8bb694e048d3c95eff32048bb

Malware Config

Signatures

  • RevcodeRat, WebMonitorRat

    WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.

  • suricata: ET MALWARE WebMonitor/RevCode RAT CnC Domain in DNS Lookup

    suricata: ET MALWARE WebMonitor/RevCode RAT CnC Domain in DNS Lookup

  • Unexpected DNS network traffic destination 9 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e510da3919bd636fcc0b09a3f00355175b660761fe0481809a8cef06d305f553.exe
    "C:\Users\Admin\AppData\Local\Temp\e510da3919bd636fcc0b09a3f00355175b660761fe0481809a8cef06d305f553.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    PID:1068

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1068-54-0x0000000075DE1000-0x0000000075DE3000-memory.dmp

    Filesize

    8KB

  • memory/1068-55-0x0000000002D00000-0x0000000003D00000-memory.dmp

    Filesize

    16.0MB