Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-03-2024 11:42
Static task
static1
Behavioral task
behavioral1
Sample
STATEMENT OF ACCOUNT.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
STATEMENT OF ACCOUNT.exe
Resource
win10v2004-20240226-en
General
-
Target
STATEMENT OF ACCOUNT.exe
-
Size
962KB
-
MD5
d39da4595ca51a748ac33447965d80e3
-
SHA1
e7e0ec21e7cb1d67c906169e6e039d4b29c423c7
-
SHA256
77732e74850050bb6f935945e510d32a0499d820fa1197752df8bd01c66e8210
-
SHA512
620cf557f657213ff9f52b2939fdd689906f4b634a20210d3a6062802b25e30d3085c3b6bf0336c880fa8deedafc67f4daee2dd999f911d86184bda47d3ba178
-
SSDEEP
24576:0FsVd+29QFw53L5o3DVUYR35Xc32WBjshPQ:0FsqtFwaFi3JX
Malware Config
Extracted
webmonitor
niiarmah.wm01.to:443
-
config_key
4EcDHH7aWbl50LayUnuRlJWUXiKQWk0O
-
private_key
yvkn5wM8E
-
url_path
/recv5.php
Signatures
-
RevcodeRat, WebMonitorRat
WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.
-
WebMonitor payload 6 IoCs
Processes:
resource yara_rule behavioral2/memory/3096-3-0x0000000000400000-0x00000000004F3000-memory.dmp family_webmonitor behavioral2/memory/3096-4-0x0000000000400000-0x00000000004F3000-memory.dmp family_webmonitor behavioral2/memory/3096-5-0x0000000000400000-0x00000000004F3000-memory.dmp family_webmonitor behavioral2/memory/3096-6-0x0000000000400000-0x00000000004F3000-memory.dmp family_webmonitor behavioral2/memory/3096-7-0x0000000000400000-0x00000000004F3000-memory.dmp family_webmonitor behavioral2/memory/3096-11-0x0000000000400000-0x00000000004F3000-memory.dmp family_webmonitor -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
STATEMENT OF ACCOUNT.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation STATEMENT OF ACCOUNT.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
STATEMENT OF ACCOUNT.exedescription pid process target process PID 1464 set thread context of 3096 1464 STATEMENT OF ACCOUNT.exe STATEMENT OF ACCOUNT.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
STATEMENT OF ACCOUNT.exepid process 1464 STATEMENT OF ACCOUNT.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
STATEMENT OF ACCOUNT.exepid process 3096 STATEMENT OF ACCOUNT.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
STATEMENT OF ACCOUNT.exedescription pid process Token: SeShutdownPrivilege 3096 STATEMENT OF ACCOUNT.exe Token: SeCreatePagefilePrivilege 3096 STATEMENT OF ACCOUNT.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
STATEMENT OF ACCOUNT.exeSTATEMENT OF ACCOUNT.exedescription pid process target process PID 1464 wrote to memory of 3096 1464 STATEMENT OF ACCOUNT.exe STATEMENT OF ACCOUNT.exe PID 1464 wrote to memory of 3096 1464 STATEMENT OF ACCOUNT.exe STATEMENT OF ACCOUNT.exe PID 1464 wrote to memory of 3096 1464 STATEMENT OF ACCOUNT.exe STATEMENT OF ACCOUNT.exe PID 1464 wrote to memory of 3096 1464 STATEMENT OF ACCOUNT.exe STATEMENT OF ACCOUNT.exe PID 3096 wrote to memory of 3328 3096 STATEMENT OF ACCOUNT.exe cmd.exe PID 3096 wrote to memory of 3328 3096 STATEMENT OF ACCOUNT.exe cmd.exe PID 3096 wrote to memory of 3328 3096 STATEMENT OF ACCOUNT.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT.exe"C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT.exe"C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT.exe"2⤵
- Checks computer location settings
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\H5tMJERy9hTkJoSd.bat" "3⤵PID:3328
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1348 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:81⤵PID:4120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204B
MD5b7c9988fe552a4fb92f69cf7a3d8441c
SHA1c9a77927afb56cc84312893221db2dbefd16aa3e
SHA256f518aa5c9aa678fff9df589dee3b5b5391227d3d4a5b3c1b284c0b33299d15e9
SHA5121008fd1d669f80cbd48192be913b8a2ec7dcd14a8d05917cdcbd13cb9e2451bc7833cd4339a440e0e7c78be72f3c4566ba3a11f486708f18fe6e83738226b8c7