Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 17:41
Behavioral task
behavioral1
Sample
Extreme Injector v3.7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Extreme Injector v3.7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Extreme Injector v3.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Extreme Injector v3.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
xyoungsokin.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
xyoungsokin.dll
Resource
win10v2004-20240426-en
General
-
Target
Extreme Injector v3.7.exe
-
Size
365KB
-
MD5
1250fbb9be09180d07d87d1abdc2b349
-
SHA1
c58da16d2e16955498b083bf5d5a55a4cccf32fe
-
SHA256
8979b90d56e060696bcd2f0e36f2c0a10c7ccab4114bfce1bb278bf25ecc2946
-
SHA512
ffe323afa8b5ae6d574dff789dd2b42d0ce80581e47648425fc3b57873092f2ee38dcdb17e45e601803ffd4c806f38fcfaf5d785bbb8a1657f71fde980dcedb1
-
SSDEEP
6144:cxLA03giVtLfLzHbklDubM1oFRgfHaSjcVfUpJqTyZp0KfgxcFmQoZgfHlgASbyz:cxLA4tLf37ktu2qg/aSjosL4Kfgo5oZ2
Malware Config
Extracted
webmonitor
kamilw1337.wm01.to:443
-
config_key
a72oDI537AbYRjeItTOo34O25nOyaPFK
-
private_key
MqUzv9esY
-
url_path
/recv5.php
Signatures
-
RevcodeRat, WebMonitorRat
WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.
-
WebMonitor payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/876-5-0x0000000000400000-0x00000000004F6000-memory.dmp family_webmonitor -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Extreme Injector v3.7.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Extreme Injector v3.7.exe -
Processes:
resource yara_rule behavioral2/memory/876-0-0x0000000000400000-0x00000000004F6000-memory.dmp upx behavioral2/memory/876-5-0x0000000000400000-0x00000000004F6000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: RenamesItself 1 IoCs
Processes:
Extreme Injector v3.7.exepid process 876 Extreme Injector v3.7.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Extreme Injector v3.7.exedescription pid process Token: SeShutdownPrivilege 876 Extreme Injector v3.7.exe Token: SeCreatePagefilePrivilege 876 Extreme Injector v3.7.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Extreme Injector v3.7.exedescription pid process target process PID 876 wrote to memory of 208 876 Extreme Injector v3.7.exe cmd.exe PID 876 wrote to memory of 208 876 Extreme Injector v3.7.exe cmd.exe PID 876 wrote to memory of 208 876 Extreme Injector v3.7.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Extreme Injector v3.7.exe"C:\Users\Admin\AppData\Local\Temp\Extreme Injector v3.7.exe"1⤵
- Checks computer location settings
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WnhH5eCoZrReAsW4.bat" "2⤵PID:208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204B
MD5c102297444c3aa8a1d4dce15cf1a6970
SHA147117d5631779c3b85cae037e370ecbb575045b2
SHA2566d7f9d1fb0c4230b6dbfbbbb610f6e2093b7ddbb9824f7eb4b6babd5c0b8c2b1
SHA5123c0c82f2ae94568406a3142a2cc3576bcc1778e21fafbc228b3d260f6833e0e3a61d90eedd779d60dedd75531f18b823c78b090f3250ac9aee8d4817a3383608