Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-02-2024 11:19
Static task
static1
Behavioral task
behavioral1
Sample
a3a62c034f2eb97d3673d2a608073f7e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a3a62c034f2eb97d3673d2a608073f7e.exe
Resource
win10v2004-20240221-en
General
-
Target
a3a62c034f2eb97d3673d2a608073f7e.exe
-
Size
1.8MB
-
MD5
a3a62c034f2eb97d3673d2a608073f7e
-
SHA1
250644fc77d95c6dcaef531b0f351f5ce33bbfbd
-
SHA256
167f23bd6318e7e1bbe296639468d866b2b457410daab0e6b941dac6bcc4563f
-
SHA512
16c0b478ea9f1fcdeb9c13af022ac0f18879798eb7715aabd93446630dd0b9e3e9c3c1e31114657623c9c932502b99f41c1f3c52ede0306311f729810366ed71
-
SSDEEP
49152:y4bKFBaK648EFZ6hBYiYsQvoQhTnAYD6Xa:yOK+AZIBYi/coQl
Malware Config
Extracted
webmonitor
niiarmah.wm01.to:443
-
config_key
4EcDHH7aWbl50LayUnuRlJWUXiKQWk0O
-
private_key
yvkn5wM8E
-
url_path
/recv5.php
Signatures
-
RevcodeRat, WebMonitorRat
WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.
-
WebMonitor payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2692-27-0x0000000000400000-0x00000000004F3000-memory.dmp family_webmonitor -
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
Processes:
resource yara_rule behavioral1/memory/1984-3-0x0000000000310000-0x0000000000322000-memory.dmp CustAttr -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepowershell.exepowershell.exepid process 2496 powershell.exe 2492 powershell.exe 1200 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 2496 powershell.exe Token: SeDebugPrivilege 1200 powershell.exe Token: SeDebugPrivilege 2492 powershell.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
a3a62c034f2eb97d3673d2a608073f7e.exedescription pid process target process PID 1984 wrote to memory of 2496 1984 a3a62c034f2eb97d3673d2a608073f7e.exe powershell.exe PID 1984 wrote to memory of 2496 1984 a3a62c034f2eb97d3673d2a608073f7e.exe powershell.exe PID 1984 wrote to memory of 2496 1984 a3a62c034f2eb97d3673d2a608073f7e.exe powershell.exe PID 1984 wrote to memory of 2496 1984 a3a62c034f2eb97d3673d2a608073f7e.exe powershell.exe PID 1984 wrote to memory of 2492 1984 a3a62c034f2eb97d3673d2a608073f7e.exe powershell.exe PID 1984 wrote to memory of 2492 1984 a3a62c034f2eb97d3673d2a608073f7e.exe powershell.exe PID 1984 wrote to memory of 2492 1984 a3a62c034f2eb97d3673d2a608073f7e.exe powershell.exe PID 1984 wrote to memory of 2492 1984 a3a62c034f2eb97d3673d2a608073f7e.exe powershell.exe PID 1984 wrote to memory of 1748 1984 a3a62c034f2eb97d3673d2a608073f7e.exe schtasks.exe PID 1984 wrote to memory of 1748 1984 a3a62c034f2eb97d3673d2a608073f7e.exe schtasks.exe PID 1984 wrote to memory of 1748 1984 a3a62c034f2eb97d3673d2a608073f7e.exe schtasks.exe PID 1984 wrote to memory of 1748 1984 a3a62c034f2eb97d3673d2a608073f7e.exe schtasks.exe PID 1984 wrote to memory of 1200 1984 a3a62c034f2eb97d3673d2a608073f7e.exe powershell.exe PID 1984 wrote to memory of 1200 1984 a3a62c034f2eb97d3673d2a608073f7e.exe powershell.exe PID 1984 wrote to memory of 1200 1984 a3a62c034f2eb97d3673d2a608073f7e.exe powershell.exe PID 1984 wrote to memory of 1200 1984 a3a62c034f2eb97d3673d2a608073f7e.exe powershell.exe PID 1984 wrote to memory of 2692 1984 a3a62c034f2eb97d3673d2a608073f7e.exe RegSvcs.exe PID 1984 wrote to memory of 2692 1984 a3a62c034f2eb97d3673d2a608073f7e.exe RegSvcs.exe PID 1984 wrote to memory of 2692 1984 a3a62c034f2eb97d3673d2a608073f7e.exe RegSvcs.exe PID 1984 wrote to memory of 2692 1984 a3a62c034f2eb97d3673d2a608073f7e.exe RegSvcs.exe PID 1984 wrote to memory of 2692 1984 a3a62c034f2eb97d3673d2a608073f7e.exe RegSvcs.exe PID 1984 wrote to memory of 2692 1984 a3a62c034f2eb97d3673d2a608073f7e.exe RegSvcs.exe PID 1984 wrote to memory of 2692 1984 a3a62c034f2eb97d3673d2a608073f7e.exe RegSvcs.exe PID 1984 wrote to memory of 2692 1984 a3a62c034f2eb97d3673d2a608073f7e.exe RegSvcs.exe PID 1984 wrote to memory of 2692 1984 a3a62c034f2eb97d3673d2a608073f7e.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3a62c034f2eb97d3673d2a608073f7e.exe"C:\Users\Admin\AppData\Local\Temp\a3a62c034f2eb97d3673d2a608073f7e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\a3a62c034f2eb97d3673d2a608073f7e.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2496
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\CJFickSnic.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2492
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CJFickSnic" /XML "C:\Users\Admin\AppData\Local\Temp\tmpCBC7.tmp"2⤵
- Creates scheduled task(s)
PID:1748
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\CJFickSnic.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1200
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5424f2d0f1b25ce078e8c8c199beb8726
SHA134357aa0f9a4925b6a5db9225010e302c26a63bd
SHA25605b4d71bc61538c7fd803031726139a29316419bad6d8ac0839e8bdd6851a48e
SHA512b0a6393746ce483851dd50757c84a60f3ab277595048d86b38ee1a2d13078cf7b6bbdc17d045ead4f9228aee54747cc0dc6f3909a2f0edd1e73faa9cc4454a9a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\9V8DNG4GBF9QF10N41XE.temp
Filesize7KB
MD5e5382fba94e2b693dffbb20dd65cdb47
SHA1fa97bfb28a2e710a9281308dd88ed4f945d3e1cd
SHA2566968e323ff6bdcad24c419c6cd0347aa8f5a2bccec5c4f661972e48cf9d257e8
SHA512dabddbd8076c76183e60bb4cd3bea4e620fc174edc136af62ec6b7730a18f22fb68930dbafc211c01b16632c47de0bf24e6e02340dc4eb3f6a1412dbaca88463