Analysis

  • max time kernel
    149s
  • max time network
    171s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    31-05-2022 06:39

General

  • Target

    06429eae76265388efa2e75096af8ed944a094ff8edcdcbed231a3a12cb5f7ee.exe

  • Size

    934KB

  • MD5

    9fb987b3f3c05b245fe4d9b867296f3f

  • SHA1

    85f479e1198ca53cb34a246ebe0f5843d94c36f2

  • SHA256

    06429eae76265388efa2e75096af8ed944a094ff8edcdcbed231a3a12cb5f7ee

  • SHA512

    73da4822024fb48d2161328f4e0dbf839d94be37b778a26f32f44dc1318cb4afb27b58e5063d9d51714bcf5f3aae92361567be4eed43aee54fd5ed9697632bea

Score
10/10

Malware Config

Signatures

  • suricata: ET MALWARE WebMonitor/RevCode RAT CnC Domain in DNS Lookup

    suricata: ET MALWARE WebMonitor/RevCode RAT CnC Domain in DNS Lookup

  • Unexpected DNS network traffic destination 10 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06429eae76265388efa2e75096af8ed944a094ff8edcdcbed231a3a12cb5f7ee.exe
    "C:\Users\Admin\AppData\Local\Temp\06429eae76265388efa2e75096af8ed944a094ff8edcdcbed231a3a12cb5f7ee.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:676

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/676-54-0x0000000075EF1000-0x0000000075EF3000-memory.dmp

    Filesize

    8KB

  • memory/676-55-0x0000000002CF0000-0x0000000003CF0000-memory.dmp

    Filesize

    16.0MB

  • memory/676-56-0x0000000002CF0000-0x0000000003CF0000-memory.dmp

    Filesize

    16.0MB