Analysis
-
max time kernel
149s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
30-05-2022 21:24
Static task
static1
Behavioral task
behavioral1
Sample
089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exe
Resource
win10v2004-20220414-en
General
-
Target
089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exe
-
Size
1.5MB
-
MD5
a95b331fccf2956d61809a5cd4c8ae80
-
SHA1
2c174632ebdb5a799763d0d798f73513065ec28c
-
SHA256
089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7
-
SHA512
be7a0217dae7eb90974aeffde0c3ca660f07fb9fc8ade2766455bbffee93c6fe5d081a78ea1a4cddbe29da359912f5f2f98a38fa27154cb39d3142bb196d9e22
Malware Config
Extracted
webmonitor
preetha.wm01.to:443
-
config_key
QuvlUX1F0t9VVObPIMdFN2IC4RdIDe8m
-
private_key
32i3qiVRG
-
url_path
/recv5.php
Signatures
-
RevcodeRat, WebMonitorRat
WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.
-
WebMonitor Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1168-82-0x0000000000400000-0x00000000004F2000-memory.dmp family_webmonitor behavioral1/memory/1168-86-0x0000000000400000-0x00000000004F2000-memory.dmp family_webmonitor behavioral1/memory/1168-87-0x0000000003500000-0x0000000004500000-memory.dmp family_webmonitor behavioral1/memory/1168-88-0x0000000000400000-0x00000000004F2000-memory.dmp family_webmonitor -
Executes dropped EXE 1 IoCs
Processes:
089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exepid process 1168 089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exe -
Processes:
resource yara_rule behavioral1/memory/1168-72-0x0000000000400000-0x00000000004F2000-memory.dmp upx behavioral1/memory/1168-75-0x0000000000400000-0x00000000004F2000-memory.dmp upx behavioral1/memory/1168-74-0x0000000000400000-0x00000000004F2000-memory.dmp upx behavioral1/memory/1168-78-0x0000000000400000-0x00000000004F2000-memory.dmp upx behavioral1/memory/1168-80-0x0000000000400000-0x00000000004F2000-memory.dmp upx behavioral1/memory/1168-82-0x0000000000400000-0x00000000004F2000-memory.dmp upx behavioral1/memory/1168-86-0x0000000000400000-0x00000000004F2000-memory.dmp upx behavioral1/memory/1168-87-0x0000000003500000-0x0000000004500000-memory.dmp upx behavioral1/memory/1168-88-0x0000000000400000-0x00000000004F2000-memory.dmp upx -
Loads dropped DLL 1 IoCs
Processes:
089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exepid process 1324 089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exe -
Unexpected DNS network traffic destination 4 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 185.243.215.214 Destination IP 1.2.4.8 Destination IP 185.243.215.214 Destination IP 185.243.215.214 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\WebMonitor-3033 = "C:\\Users\\Admin\\AppData\\Roaming\\WebMonitor-3033.exe" 089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exedescription pid process target process PID 1324 set thread context of 1168 1324 089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exe 089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 1 IoCs
Processes:
cmd.exedescription ioc process File created C:\Users\Admin\AppData\Local\Temp\089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exe:Zone.Identifier cmd.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exepid process 1168 089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exe089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exedescription pid process Token: SeDebugPrivilege 1324 089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exe Token: SeShutdownPrivilege 1168 089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exedescription pid process target process PID 1324 wrote to memory of 1604 1324 089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exe cmd.exe PID 1324 wrote to memory of 1604 1324 089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exe cmd.exe PID 1324 wrote to memory of 1604 1324 089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exe cmd.exe PID 1324 wrote to memory of 1604 1324 089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exe cmd.exe PID 1324 wrote to memory of 1168 1324 089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exe 089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exe PID 1324 wrote to memory of 1168 1324 089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exe 089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exe PID 1324 wrote to memory of 1168 1324 089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exe 089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exe PID 1324 wrote to memory of 1168 1324 089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exe 089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exe PID 1324 wrote to memory of 1168 1324 089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exe 089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exe PID 1324 wrote to memory of 1168 1324 089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exe 089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exe PID 1324 wrote to memory of 1168 1324 089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exe 089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exe PID 1324 wrote to memory of 1168 1324 089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exe 089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exe"C:\Users\Admin\AppData\Local\Temp\089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exe:Zone.Identifier"2⤵
- NTFS ADS
-
C:\Users\Admin\AppData\Local\Temp\089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exeC:\Users\Admin\AppData\Local\Temp\089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exeFilesize
1.5MB
MD5a95b331fccf2956d61809a5cd4c8ae80
SHA12c174632ebdb5a799763d0d798f73513065ec28c
SHA256089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7
SHA512be7a0217dae7eb90974aeffde0c3ca660f07fb9fc8ade2766455bbffee93c6fe5d081a78ea1a4cddbe29da359912f5f2f98a38fa27154cb39d3142bb196d9e22
-
\Users\Admin\AppData\Local\Temp\089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7.exeFilesize
1.5MB
MD5a95b331fccf2956d61809a5cd4c8ae80
SHA12c174632ebdb5a799763d0d798f73513065ec28c
SHA256089a955d548f789370a8cacbf2c3f35f34b10cb087686ddada98db5dfc717bf7
SHA512be7a0217dae7eb90974aeffde0c3ca660f07fb9fc8ade2766455bbffee93c6fe5d081a78ea1a4cddbe29da359912f5f2f98a38fa27154cb39d3142bb196d9e22
-
memory/1168-80-0x0000000000400000-0x00000000004F2000-memory.dmpFilesize
968KB
-
memory/1168-87-0x0000000003500000-0x0000000004500000-memory.dmpFilesize
16.0MB
-
memory/1168-86-0x0000000000400000-0x00000000004F2000-memory.dmpFilesize
968KB
-
memory/1168-82-0x0000000000400000-0x00000000004F2000-memory.dmpFilesize
968KB
-
memory/1168-88-0x0000000000400000-0x00000000004F2000-memory.dmpFilesize
968KB
-
memory/1168-78-0x0000000000400000-0x00000000004F2000-memory.dmpFilesize
968KB
-
memory/1168-89-0x0000000003500000-0x0000000004500000-memory.dmpFilesize
16.0MB
-
memory/1168-76-0x00000000004F0800-mapping.dmp
-
memory/1168-74-0x0000000000400000-0x00000000004F2000-memory.dmpFilesize
968KB
-
memory/1168-75-0x0000000000400000-0x00000000004F2000-memory.dmpFilesize
968KB
-
memory/1168-72-0x0000000000400000-0x00000000004F2000-memory.dmpFilesize
968KB
-
memory/1168-71-0x0000000000400000-0x00000000004F2000-memory.dmpFilesize
968KB
-
memory/1324-70-0x000000006FB40000-0x000000006FD11000-memory.dmpFilesize
1.8MB
-
memory/1324-61-0x0000000074AD0000-0x0000000074BF3000-memory.dmpFilesize
1.1MB
-
memory/1324-54-0x00000000011A0000-0x000000000131C000-memory.dmpFilesize
1.5MB
-
memory/1324-67-0x0000000070040000-0x0000000070D96000-memory.dmpFilesize
13.3MB
-
memory/1324-66-0x0000000070F30000-0x0000000071C4D000-memory.dmpFilesize
13.1MB
-
memory/1324-65-0x0000000071C50000-0x0000000072430000-memory.dmpFilesize
7.9MB
-
memory/1324-64-0x0000000072E40000-0x00000000741CF000-memory.dmpFilesize
19.6MB
-
memory/1324-63-0x0000000075410000-0x000000007544B000-memory.dmpFilesize
236KB
-
memory/1324-62-0x0000000074930000-0x0000000074AC4000-memory.dmpFilesize
1.6MB
-
memory/1324-68-0x000000006FD20000-0x000000007003B000-memory.dmpFilesize
3.1MB
-
memory/1324-81-0x0000000072E40000-0x00000000741CF000-memory.dmpFilesize
19.6MB
-
memory/1324-60-0x0000000072430000-0x0000000072E40000-memory.dmpFilesize
10.1MB
-
memory/1324-83-0x0000000072430000-0x0000000072E40000-memory.dmpFilesize
10.1MB
-
memory/1324-59-0x0000000075450000-0x0000000075495000-memory.dmpFilesize
276KB
-
memory/1324-84-0x0000000074930000-0x0000000074AC4000-memory.dmpFilesize
1.6MB
-
memory/1324-85-0x0000000071C50000-0x0000000072430000-memory.dmpFilesize
7.9MB
-
memory/1324-55-0x0000000072E40000-0x00000000741CF000-memory.dmpFilesize
19.6MB
-
memory/1324-57-0x0000000076011000-0x0000000076013000-memory.dmpFilesize
8KB
-
memory/1324-56-0x00000000006A0000-0x00000000006C6000-memory.dmpFilesize
152KB
-
memory/1604-58-0x0000000000000000-mapping.dmp