Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 17:41
Behavioral task
behavioral1
Sample
Extreme Injector v3.7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Extreme Injector v3.7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Extreme Injector v3.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Extreme Injector v3.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
xyoungsokin.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
xyoungsokin.dll
Resource
win10v2004-20240426-en
General
-
Target
Extreme Injector v3.7.exe
-
Size
365KB
-
MD5
1250fbb9be09180d07d87d1abdc2b349
-
SHA1
c58da16d2e16955498b083bf5d5a55a4cccf32fe
-
SHA256
8979b90d56e060696bcd2f0e36f2c0a10c7ccab4114bfce1bb278bf25ecc2946
-
SHA512
ffe323afa8b5ae6d574dff789dd2b42d0ce80581e47648425fc3b57873092f2ee38dcdb17e45e601803ffd4c806f38fcfaf5d785bbb8a1657f71fde980dcedb1
-
SSDEEP
6144:cxLA03giVtLfLzHbklDubM1oFRgfHaSjcVfUpJqTyZp0KfgxcFmQoZgfHlgASbyz:cxLA4tLf37ktu2qg/aSjosL4Kfgo5oZ2
Malware Config
Extracted
webmonitor
kamilw1337.wm01.to:443
-
config_key
a72oDI537AbYRjeItTOo34O25nOyaPFK
-
private_key
MqUzv9esY
-
url_path
/recv5.php
Signatures
-
RevcodeRat, WebMonitorRat
WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.
-
WebMonitor payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/1948-3-0x0000000000400000-0x00000000004F6000-memory.dmp family_webmonitor behavioral1/memory/1948-6-0x0000000000400000-0x00000000004F6000-memory.dmp family_webmonitor behavioral1/memory/1948-7-0x0000000000400000-0x00000000004F6000-memory.dmp family_webmonitor behavioral1/memory/1948-10-0x0000000000400000-0x00000000004F6000-memory.dmp family_webmonitor behavioral1/memory/1948-13-0x0000000000400000-0x00000000004F6000-memory.dmp family_webmonitor behavioral1/memory/1948-14-0x0000000000400000-0x00000000004F6000-memory.dmp family_webmonitor behavioral1/memory/1948-17-0x0000000000400000-0x00000000004F6000-memory.dmp family_webmonitor -
Processes:
resource yara_rule behavioral1/memory/1948-0-0x0000000000400000-0x00000000004F6000-memory.dmp upx behavioral1/memory/1948-3-0x0000000000400000-0x00000000004F6000-memory.dmp upx behavioral1/memory/1948-6-0x0000000000400000-0x00000000004F6000-memory.dmp upx behavioral1/memory/1948-7-0x0000000000400000-0x00000000004F6000-memory.dmp upx behavioral1/memory/1948-10-0x0000000000400000-0x00000000004F6000-memory.dmp upx behavioral1/memory/1948-13-0x0000000000400000-0x00000000004F6000-memory.dmp upx behavioral1/memory/1948-14-0x0000000000400000-0x00000000004F6000-memory.dmp upx behavioral1/memory/1948-17-0x0000000000400000-0x00000000004F6000-memory.dmp upx -
Unexpected DNS network traffic destination 10 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 114.114.114.114 Destination IP 185.141.152.26 Destination IP 185.141.152.26 Destination IP 1.2.4.8 Destination IP 185.141.152.26 Destination IP 1.2.4.8 Destination IP 185.141.152.26 Destination IP 185.141.152.26 Destination IP 114.114.114.114 Destination IP 1.2.4.8 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Extreme Injector v3.7.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\WebMonitor-4299 = "C:\\Users\\Admin\\AppData\\Roaming\\WebMonitor-4299.exe" Extreme Injector v3.7.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
Extreme Injector v3.7.exepid process 1948 Extreme Injector v3.7.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Extreme Injector v3.7.exedescription pid process Token: SeShutdownPrivilege 1948 Extreme Injector v3.7.exe