Analysis
-
max time kernel
151s -
max time network
144s -
platform
windows7_x64 -
resource
win7v200217 -
submitted
09-03-2020 00:30
Static task
static1
Behavioral task
behavioral1
Sample
DHL 2723382830領収書,pdf.exe
Resource
win7v200217
windows7_x64
0 signatures
0 seconds
General
-
Target
DHL 2723382830領収書,pdf.exe
-
Size
654KB
-
MD5
cb4a7469e6eb99572ba41e5aff6c63c5
-
SHA1
b760cdb563386f0afbafea1f793d7ba16cef4167
-
SHA256
55de0a43df1a914bef31d31c8fcdc495a25ebbd90d9ef44a329030da306d9313
-
SHA512
aa9e6135cdcda394aaa760b7836c27c059fa4afcac8e5b0473c34ead56b39753add220bf8a1cf989bd770032c2adab5975da5b854a2073f3eae011f94f231634
Malware Config
Extracted
Family
remcos
C2
favournwa.ddns.net:7171
Signatures
-
Suspicious behavior: EnumeratesProcesses 984 IoCs
Processes:
DHL 2723382830領収書,pdf.exedfghjhjgf.exedfghjhjgf.exepid process 1864 DHL 2723382830領収書,pdf.exe 1888 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe 1924 dfghjhjgf.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
dfghjhjgf.exepid process 1908 dfghjhjgf.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
dfghjhjgf.exedescription pid process target process PID 1888 set thread context of 1908 1888 dfghjhjgf.exe dfghjhjgf.exe -
NTFS ADS 1 IoCs
Processes:
DHL 2723382830領収書,pdf.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\grace\dfghjhjgf.exe:ZoneIdentifier DHL 2723382830領収書,pdf.exe -
Drops startup file 1 IoCs
Processes:
dfghjhjgf.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\grace.vbs dfghjhjgf.exe -
Loads dropped DLL 2 IoCs
Processes:
DHL 2723382830領収書,pdf.exepid process 1864 DHL 2723382830領収書,pdf.exe 1864 DHL 2723382830領収書,pdf.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
DHL 2723382830領収書,pdf.exedfghjhjgf.exedescription pid process target process PID 1864 wrote to memory of 1888 1864 DHL 2723382830領収書,pdf.exe dfghjhjgf.exe PID 1864 wrote to memory of 1888 1864 DHL 2723382830領収書,pdf.exe dfghjhjgf.exe PID 1864 wrote to memory of 1888 1864 DHL 2723382830領収書,pdf.exe dfghjhjgf.exe PID 1864 wrote to memory of 1888 1864 DHL 2723382830領収書,pdf.exe dfghjhjgf.exe PID 1888 wrote to memory of 1908 1888 dfghjhjgf.exe dfghjhjgf.exe PID 1888 wrote to memory of 1908 1888 dfghjhjgf.exe dfghjhjgf.exe PID 1888 wrote to memory of 1908 1888 dfghjhjgf.exe dfghjhjgf.exe PID 1888 wrote to memory of 1908 1888 dfghjhjgf.exe dfghjhjgf.exe PID 1888 wrote to memory of 1924 1888 dfghjhjgf.exe dfghjhjgf.exe PID 1888 wrote to memory of 1924 1888 dfghjhjgf.exe dfghjhjgf.exe PID 1888 wrote to memory of 1924 1888 dfghjhjgf.exe dfghjhjgf.exe PID 1888 wrote to memory of 1924 1888 dfghjhjgf.exe dfghjhjgf.exe -
Executes dropped EXE 3 IoCs
Processes:
dfghjhjgf.exedfghjhjgf.exedfghjhjgf.exepid process 1888 dfghjhjgf.exe 1908 dfghjhjgf.exe 1924 dfghjhjgf.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
dfghjhjgf.exepid process 1888 dfghjhjgf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DHL 2723382830領収書,pdf.exe"C:\Users\Admin\AppData\Local\Temp\DHL 2723382830領収書,pdf.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- NTFS ADS
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Users\Admin\AppData\Roaming\grace\dfghjhjgf.exe"C:\Users\Admin\AppData\Roaming\grace\dfghjhjgf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
- Drops startup file
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
- Suspicious behavior: MapViewOfSection
PID:1888 -
C:\Users\Admin\AppData\Roaming\grace\dfghjhjgf.exe"C:\Users\Admin\AppData\Roaming\grace\dfghjhjgf.exe"3⤵
- Suspicious use of SetWindowsHookEx
- Executes dropped EXE
PID:1908
-
-
C:\Users\Admin\AppData\Roaming\grace\dfghjhjgf.exe"C:\Users\Admin\AppData\Roaming\grace\dfghjhjgf.exe" 2 1908 732263⤵
- Suspicious behavior: EnumeratesProcesses
- Executes dropped EXE
PID:1924
-
-