Analysis

  • max time kernel
    123s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-02-2023 17:29

General

  • Target

    Eagle Monitor RAT Reborn/Eagle Monitor RAT Reborn (x32).exe

  • Size

    4.6MB

  • MD5

    d198c696d700df56e04317a1f5169920

  • SHA1

    89ceb4b7b35f2c74f3b9acd1db9d5e6411fe3346

  • SHA256

    a3de5d8587704bc3073e147389fd4c426f99c9cafef0c0b71fab1569a2e892e9

  • SHA512

    118ff90488bd8489b890438c5552fff26c036182529061032e0f463def453b9e1cc0c5b37ec770166020391d06ea4ee891b83ad9352d698f05feb917d1517294

  • SSDEEP

    98304:TRg+YNMTFbFPCYyvR/kYu6kFEOAElyaK:TRgXOTFbFK9vZk36zOAEl

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Eagle Monitor RAT Reborn\Eagle Monitor RAT Reborn (x32).exe
    "C:\Users\Admin\AppData\Local\Temp\Eagle Monitor RAT Reborn\Eagle Monitor RAT Reborn (x32).exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1308
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:4256

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1308-133-0x0000000000EF0000-0x0000000001396000-memory.dmp
      Filesize

      4.6MB

    • memory/1308-134-0x0000000006420000-0x00000000069C4000-memory.dmp
      Filesize

      5.6MB

    • memory/1308-135-0x0000000005DB0000-0x0000000005E42000-memory.dmp
      Filesize

      584KB

    • memory/1308-136-0x0000000005E60000-0x0000000005E70000-memory.dmp
      Filesize

      64KB

    • memory/1308-137-0x00000000062B0000-0x00000000062BA000-memory.dmp
      Filesize

      40KB

    • memory/1308-138-0x0000000005E60000-0x0000000005E70000-memory.dmp
      Filesize

      64KB

    • memory/1308-139-0x000000000B450000-0x000000000B472000-memory.dmp
      Filesize

      136KB

    • memory/1308-140-0x000000000D650000-0x000000000D6EC000-memory.dmp
      Filesize

      624KB

    • memory/1308-141-0x0000000005E60000-0x0000000005E70000-memory.dmp
      Filesize

      64KB

    • memory/1308-142-0x0000000005E60000-0x0000000005E70000-memory.dmp
      Filesize

      64KB