Analysis
-
max time kernel
135s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
01-07-2022 04:02
Static task
static1
Behavioral task
behavioral1
Sample
be684c0623c1f226849c386f594c2626c14c73470a989a8907a03c258e01abfc.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
be684c0623c1f226849c386f594c2626c14c73470a989a8907a03c258e01abfc.exe
Resource
win10v2004-20220414-en
General
-
Target
be684c0623c1f226849c386f594c2626c14c73470a989a8907a03c258e01abfc.exe
-
Size
64KB
-
MD5
b2a52460d7ddcf0d1eb6cb98171309da
-
SHA1
fe2ae9c1d227e045351d4c8e64089cade6ca2f48
-
SHA256
be684c0623c1f226849c386f594c2626c14c73470a989a8907a03c258e01abfc
-
SHA512
d332b3cefa05f13338ebfdf5d2f87de593d82371ad950d815a8b5e4c41f06fb8a8722ab9da77286c7d6da82effc2faa4b7de246943f86f39e91ce3c926deb8cd
Malware Config
Extracted
guloader
https://drive.google.com/uc?export=download&id=1YqiJ4rfI-Gtvq2s00N_eqstSWsnL_fgd
Extracted
webmonitor
olaviqs.wm01.to:443
-
config_key
7GfpikpHRvmQe3t81PSe02B3qwlPiFPx
-
private_key
JklcEIRIO
-
url_path
/recv5.php
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
RevcodeRat, WebMonitorRat
WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.
-
WebMonitor Payload 4 IoCs
resource yara_rule behavioral2/memory/724-146-0x0000000000400000-0x000000000055D000-memory.dmp family_webmonitor behavioral2/memory/724-147-0x0000000000400000-0x000000000055D000-memory.dmp family_webmonitor behavioral2/memory/724-148-0x000000001FAA0000-0x0000000020AA0000-memory.dmp family_webmonitor behavioral2/memory/724-152-0x0000000000400000-0x000000000055D000-memory.dmp family_webmonitor -
suricata: ET MALWARE WebMonitor/RevCode RAT CnC Domain in DNS Lookup
suricata: ET MALWARE WebMonitor/RevCode RAT CnC Domain in DNS Lookup
-
resource yara_rule behavioral2/memory/724-142-0x0000000000400000-0x000000000055D000-memory.dmp upx behavioral2/memory/724-144-0x0000000000400000-0x00000000004F6000-memory.dmp upx behavioral2/memory/724-146-0x0000000000400000-0x000000000055D000-memory.dmp upx behavioral2/memory/724-147-0x0000000000400000-0x000000000055D000-memory.dmp upx behavioral2/memory/724-152-0x0000000000400000-0x000000000055D000-memory.dmp upx -
Unexpected DNS network traffic destination 31 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 185.243.215.214 Destination IP 1.2.4.8 Destination IP 1.2.4.8 Destination IP 185.243.215.214 Destination IP 1.2.4.8 Destination IP 114.114.114.114 Destination IP 1.2.4.8 Destination IP 1.2.4.8 Destination IP 114.114.114.114 Destination IP 185.243.215.214 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 1.2.4.8 Destination IP 185.243.215.214 Destination IP 185.243.215.214 Destination IP 114.114.114.114 Destination IP 185.243.215.214 Destination IP 1.2.4.8 Destination IP 114.114.114.114 Destination IP 1.2.4.8 Destination IP 114.114.114.114 Destination IP 185.243.215.214 Destination IP 185.243.215.214 Destination IP 1.2.4.8 Destination IP 1.2.4.8 Destination IP 185.243.215.214 Destination IP 185.243.215.214 Destination IP 185.243.215.214 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WebMonitor-8211 = "C:\\Users\\Admin\\AppData\\Roaming\\WebMonitor-8211.exe" be684c0623c1f226849c386f594c2626c14c73470a989a8907a03c258e01abfc.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 4884 be684c0623c1f226849c386f594c2626c14c73470a989a8907a03c258e01abfc.exe 724 be684c0623c1f226849c386f594c2626c14c73470a989a8907a03c258e01abfc.exe 724 be684c0623c1f226849c386f594c2626c14c73470a989a8907a03c258e01abfc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4884 set thread context of 724 4884 be684c0623c1f226849c386f594c2626c14c73470a989a8907a03c258e01abfc.exe 83 -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4884 be684c0623c1f226849c386f594c2626c14c73470a989a8907a03c258e01abfc.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 724 be684c0623c1f226849c386f594c2626c14c73470a989a8907a03c258e01abfc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 724 be684c0623c1f226849c386f594c2626c14c73470a989a8907a03c258e01abfc.exe Token: SeCreatePagefilePrivilege 724 be684c0623c1f226849c386f594c2626c14c73470a989a8907a03c258e01abfc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4884 be684c0623c1f226849c386f594c2626c14c73470a989a8907a03c258e01abfc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4884 wrote to memory of 724 4884 be684c0623c1f226849c386f594c2626c14c73470a989a8907a03c258e01abfc.exe 83 PID 4884 wrote to memory of 724 4884 be684c0623c1f226849c386f594c2626c14c73470a989a8907a03c258e01abfc.exe 83 PID 4884 wrote to memory of 724 4884 be684c0623c1f226849c386f594c2626c14c73470a989a8907a03c258e01abfc.exe 83 PID 4884 wrote to memory of 724 4884 be684c0623c1f226849c386f594c2626c14c73470a989a8907a03c258e01abfc.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\be684c0623c1f226849c386f594c2626c14c73470a989a8907a03c258e01abfc.exe"C:\Users\Admin\AppData\Local\Temp\be684c0623c1f226849c386f594c2626c14c73470a989a8907a03c258e01abfc.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\be684c0623c1f226849c386f594c2626c14c73470a989a8907a03c258e01abfc.exe"C:\Users\Admin\AppData\Local\Temp\be684c0623c1f226849c386f594c2626c14c73470a989a8907a03c258e01abfc.exe"2⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
PID:724
-