Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-02-2024 03:10
Static task
static1
Behavioral task
behavioral1
Sample
a0cb248c9464e9ea4f72ebc7d7807e98.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a0cb248c9464e9ea4f72ebc7d7807e98.exe
Resource
win10v2004-20240221-en
General
-
Target
a0cb248c9464e9ea4f72ebc7d7807e98.exe
-
Size
1.3MB
-
MD5
a0cb248c9464e9ea4f72ebc7d7807e98
-
SHA1
d049bc23f0604897e32ac0f76f52677a7c8ce991
-
SHA256
28fd0fcdf202f29eaaee33d23939cd5bdd75bd68ee4c7815d4ca4dd2e6a04be5
-
SHA512
4849ad39e130e6513ba56d5a23eae54c73f3f7436ff3a289ebc93ab5106bb9ba56f8b58d543b94576c07ff3c79991e9f3a7f85ad84d9ac4d0317dde2b83dce2c
-
SSDEEP
24576:3qi8cepZHTsP09VGLHRteRCVdjoWfHNcL9NTYV82qU9tUk+MPAnh7wr:3EdTsPHuCPoQtgNTe82vhnPRr
Malware Config
Extracted
webmonitor
niiarmah.wm01.to:443
-
config_key
4EcDHH7aWbl50LayUnuRlJWUXiKQWk0O
-
private_key
yvkn5wM8E
-
url_path
/recv5.php
Signatures
-
RevcodeRat, WebMonitorRat
WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.
-
WebMonitor payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/2996-3-0x0000000000400000-0x00000000004F3000-memory.dmp family_webmonitor behavioral1/memory/2996-5-0x0000000000400000-0x00000000004F3000-memory.dmp family_webmonitor behavioral1/memory/2996-7-0x0000000000400000-0x00000000004F3000-memory.dmp family_webmonitor behavioral1/memory/2996-9-0x0000000000400000-0x00000000004F3000-memory.dmp family_webmonitor behavioral1/memory/2996-11-0x0000000000400000-0x00000000004F3000-memory.dmp family_webmonitor behavioral1/memory/2996-12-0x0000000000400000-0x00000000004F3000-memory.dmp family_webmonitor -
Unexpected DNS network traffic destination 9 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 185.141.152.26 Destination IP 185.141.152.26 Destination IP 1.2.4.8 Destination IP 114.114.114.114 Destination IP 185.141.152.26 Destination IP 185.141.152.26 Destination IP 114.114.114.114 Destination IP 185.141.152.26 Destination IP 1.2.4.8 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
a0cb248c9464e9ea4f72ebc7d7807e98.exedescription pid process target process PID 2156 set thread context of 2996 2156 a0cb248c9464e9ea4f72ebc7d7807e98.exe a0cb248c9464e9ea4f72ebc7d7807e98.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
a0cb248c9464e9ea4f72ebc7d7807e98.exepid process 2156 a0cb248c9464e9ea4f72ebc7d7807e98.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a0cb248c9464e9ea4f72ebc7d7807e98.exedescription pid process Token: SeShutdownPrivilege 2996 a0cb248c9464e9ea4f72ebc7d7807e98.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
a0cb248c9464e9ea4f72ebc7d7807e98.exedescription pid process target process PID 2156 wrote to memory of 2996 2156 a0cb248c9464e9ea4f72ebc7d7807e98.exe a0cb248c9464e9ea4f72ebc7d7807e98.exe PID 2156 wrote to memory of 2996 2156 a0cb248c9464e9ea4f72ebc7d7807e98.exe a0cb248c9464e9ea4f72ebc7d7807e98.exe PID 2156 wrote to memory of 2996 2156 a0cb248c9464e9ea4f72ebc7d7807e98.exe a0cb248c9464e9ea4f72ebc7d7807e98.exe PID 2156 wrote to memory of 2996 2156 a0cb248c9464e9ea4f72ebc7d7807e98.exe a0cb248c9464e9ea4f72ebc7d7807e98.exe PID 2156 wrote to memory of 2996 2156 a0cb248c9464e9ea4f72ebc7d7807e98.exe a0cb248c9464e9ea4f72ebc7d7807e98.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0cb248c9464e9ea4f72ebc7d7807e98.exe"C:\Users\Admin\AppData\Local\Temp\a0cb248c9464e9ea4f72ebc7d7807e98.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\a0cb248c9464e9ea4f72ebc7d7807e98.exe"C:\Users\Admin\AppData\Local\Temp\a0cb248c9464e9ea4f72ebc7d7807e98.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2996
-