Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10_x64 -
resource
win10v200217 -
submitted
09-03-2020 00:30
Static task
static1
Behavioral task
behavioral1
Sample
DHL 2723382830領収書,pdf.exe
Resource
win7v200217
windows7_x64
0 signatures
0 seconds
General
-
Target
DHL 2723382830領収書,pdf.exe
-
Size
654KB
-
MD5
cb4a7469e6eb99572ba41e5aff6c63c5
-
SHA1
b760cdb563386f0afbafea1f793d7ba16cef4167
-
SHA256
55de0a43df1a914bef31d31c8fcdc495a25ebbd90d9ef44a329030da306d9313
-
SHA512
aa9e6135cdcda394aaa760b7836c27c059fa4afcac8e5b0473c34ead56b39753add220bf8a1cf989bd770032c2adab5975da5b854a2073f3eae011f94f231634
Malware Config
Extracted
Family
remcos
C2
favournwa.ddns.net:7171
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
dfghjhjgf.exedescription pid process target process PID 4016 set thread context of 3368 4016 dfghjhjgf.exe dfghjhjgf.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
dfghjhjgf.exepid process 3368 dfghjhjgf.exe -
Suspicious behavior: EnumeratesProcesses 1578 IoCs
Processes:
DHL 2723382830領収書,pdf.exedfghjhjgf.exedfghjhjgf.exepid process 3956 DHL 2723382830領収書,pdf.exe 3956 DHL 2723382830領収書,pdf.exe 4016 dfghjhjgf.exe 4016 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe 3312 dfghjhjgf.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
DHL 2723382830領収書,pdf.exedfghjhjgf.exedescription pid process target process PID 3956 wrote to memory of 4016 3956 DHL 2723382830領収書,pdf.exe dfghjhjgf.exe PID 3956 wrote to memory of 4016 3956 DHL 2723382830領収書,pdf.exe dfghjhjgf.exe PID 3956 wrote to memory of 4016 3956 DHL 2723382830領収書,pdf.exe dfghjhjgf.exe PID 4016 wrote to memory of 3368 4016 dfghjhjgf.exe dfghjhjgf.exe PID 4016 wrote to memory of 3368 4016 dfghjhjgf.exe dfghjhjgf.exe PID 4016 wrote to memory of 3368 4016 dfghjhjgf.exe dfghjhjgf.exe PID 4016 wrote to memory of 3312 4016 dfghjhjgf.exe dfghjhjgf.exe PID 4016 wrote to memory of 3312 4016 dfghjhjgf.exe dfghjhjgf.exe PID 4016 wrote to memory of 3312 4016 dfghjhjgf.exe dfghjhjgf.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
dfghjhjgf.exepid process 4016 dfghjhjgf.exe -
Executes dropped EXE 3 IoCs
Processes:
dfghjhjgf.exedfghjhjgf.exedfghjhjgf.exepid process 4016 dfghjhjgf.exe 3368 dfghjhjgf.exe 3312 dfghjhjgf.exe -
Drops startup file 1 IoCs
Processes:
dfghjhjgf.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\grace.vbs dfghjhjgf.exe -
NTFS ADS 1 IoCs
Processes:
DHL 2723382830領収書,pdf.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\grace\dfghjhjgf.exe:ZoneIdentifier DHL 2723382830領収書,pdf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DHL 2723382830領収書,pdf.exe"C:\Users\Admin\AppData\Local\Temp\DHL 2723382830領収書,pdf.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- NTFS ADS
PID:3956 -
C:\Users\Admin\AppData\Roaming\grace\dfghjhjgf.exe"C:\Users\Admin\AppData\Roaming\grace\dfghjhjgf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
- Executes dropped EXE
- Drops startup file
PID:4016 -
C:\Users\Admin\AppData\Roaming\grace\dfghjhjgf.exe"C:\Users\Admin\AppData\Roaming\grace\dfghjhjgf.exe"3⤵
- Suspicious use of SetWindowsHookEx
- Executes dropped EXE
PID:3368
-
-
C:\Users\Admin\AppData\Roaming\grace\dfghjhjgf.exe"C:\Users\Admin\AppData\Roaming\grace\dfghjhjgf.exe" 2 3368 884063⤵
- Suspicious behavior: EnumeratesProcesses
- Executes dropped EXE
PID:3312
-
-