Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10v200217
  • submitted
    02-04-2020 15:16

General

  • Target

    blank.ps1

  • Size

    26B

  • MD5

    ef623f762ecb5a3d8f2a21b6f36fe827

  • SHA1

    422c8588283d250dc49141a18f9c9079fa62ecf0

  • SHA256

    95a0316c3a89e5fb1824447591dfa1c9fa08ea2a06567fb63e923d73838a0596

  • SHA512

    b11b6510c73f126d4dcb10281111eeb0ab328a713fa5c183230f679cfbeaf41af27b658b734c3334a9cef94667d8d478d41ce54112483a99f332f2f85286b1db

Malware Config

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\blank.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4012
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3528
    • C:\Users\Admin\AppData\Local\Temp\SBA_DISA.EXE
      "C:\Users\Admin\AppData\Local\Temp\SBA_DISA.EXE"
      1⤵
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:756
      • C:\Users\Admin\AppData\Local\Temp\SBA_DISA.EXE
        "C:\Users\Admin\AppData\Local\Temp\SBA_DISA.EXE"
        2⤵
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of WriteProcessMemory
        PID:2652
        • C:\Users\Admin\Sugaryse\benzinforh.exe
          "C:\Users\Admin\Sugaryse\benzinforh.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1784
          • C:\Users\Admin\Sugaryse\benzinforh.exe
            "C:\Users\Admin\Sugaryse\benzinforh.exe"
            4⤵
            • Loads dropped DLL
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious use of SetThreadContext
            • Modifies system certificate store
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1920
            • C:\Windows\SysWOW64\svchost.exe
              C:\Windows\SysWOW64\svchost.exe
              5⤵
                PID:2744
              • C:\Users\Admin\Sugaryse\dwn.exe
                "C:\Users\Admin\Sugaryse\dwn.exe"
                5⤵
                • Executes dropped EXE
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious use of SetThreadContext
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:3508
                • C:\Users\Admin\Sugaryse\dwn.exe
                  "C:\Users\Admin\Sugaryse\dwn.exe"
                  6⤵
                  • Loads dropped DLL
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  PID:2932
              • C:\Users\Admin\Sugaryse\benzinforh.exe
                C:\Users\Admin\Sugaryse\benzinforh.exe /stext "C:\Users\Admin\AppData\Local\Temp\gvvrpntnpejymoivkzijhciecuom"
                5⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                PID:3832
              • C:\Users\Admin\Sugaryse\benzinforh.exe
                C:\Users\Admin\Sugaryse\benzinforh.exe /stext "C:\Users\Admin\AppData\Local\Temp\ryijqfdhdmbdxuxztjuljpdnliynujk"
                5⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3416
              • C:\Users\Admin\Sugaryse\benzinforh.exe
                C:\Users\Admin\Sugaryse\benzinforh.exe /stext "C:\Users\Admin\AppData\Local\Temp\tsnc"
                5⤵
                • Executes dropped EXE
                PID:508

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      2
      T1112

      Install Root Certificate

      1
      T1130

      Credential Access

      Credentials in Files

      1
      T1081

      Collection

      Data from Local System

      1
      T1005

      Command and Control

      Web Service

      1
      T1102

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BE8B021F9E811DFC8C8A28572A17C05A_0B97942EE72A6E3F514E8E84F294CC72
        MD5

        9dc91d1ae0ad42bc7ea59d04f5764cde

        SHA1

        9c8b4cfc2333d7a459571ed90ee63d18a342b09e

        SHA256

        9d7cc95d37e7f03d74ec159888a058d5a7e8f10c974f167ee2094334671a687d

        SHA512

        bf849ccda5a8d1266b97eff77a75a9063ae37d1ae6af3141f40a94d1a1d334691aa86cabe909a4bc134ec41fac7bf957cef9a01e86482fb10fb5484b09e7b283

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BE8B021F9E811DFC8C8A28572A17C05A_BA8650709FF65A42B9202D73C10A8F29
        MD5

        869c8fb2e075d4fa18e18b14a6105ea5

        SHA1

        58a73030ac4ec92b6777dc3f2f85af3c96e9fc55

        SHA256

        d2bfa48276a89799e6f2d529b15cd27318c32431daa2e13cf38528e09b04de2e

        SHA512

        1552265fdc1b8c125638ae54443e1a20bdd00eb9ca7dce03a6a37a780ae548c747b5ecf1a772ed2db804bd5c1cfe85d3246b85b6daf2279f750072ff0a1cfefd

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CFE86DBBE02D859DC92F1E17E0574EE8_46766FC45507C0B9E264E4C18BC7288B
        MD5

        e550da03aee5b546b436cd553d3233b9

        SHA1

        7d4f842c50f4136f10c6c6a2e891bfc4a182a0ed

        SHA256

        9abfd4e29b96cca442502b1de6071fe0293455df22b4eff19fa3e6df060947e7

        SHA512

        e758228aa2b04ec44ded777ae2318ecf6e9278b6b5981d29d10378e0f66885fabccab48ece78fc279755e710fb531575b58a4fe28469d199736eeb24aa62c767

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BE8B021F9E811DFC8C8A28572A17C05A_0B97942EE72A6E3F514E8E84F294CC72
        MD5

        0a2922918404b363db478360b5c7c278

        SHA1

        99a05de33b01dc29189f5adb79435d8241f1662e

        SHA256

        e396cce665890637f1931f8196dd09b85e28b604919d3afcb8d5fcf5b7537ed4

        SHA512

        22f00a150d0d691b065079ff24c19dbf85cd06b1ab3edb5be4dcbb47c749207123ac492dab4c982423fb0813b65ff2de54c47622b774ed56e7d5f12ae6eef6c5

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BE8B021F9E811DFC8C8A28572A17C05A_BA8650709FF65A42B9202D73C10A8F29
        MD5

        fdad4d8973994deba0210d1999f98fef

        SHA1

        cf582eb1f86c9eeac1d0dd7f248278c96f811aad

        SHA256

        15c857a6136dbd66db61c0af63891bf531b1c45897311352f0891b8de5c81dfa

        SHA512

        7722322cbd5b0faa0b415df45d0636786bcc9805741f956079ecb9aa586638ebf6410604a99fa9f831d715d80e7fb4a24b51defaac78a261a3d812bfff361b57

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CFE86DBBE02D859DC92F1E17E0574EE8_46766FC45507C0B9E264E4C18BC7288B
        MD5

        14b373937fc3d21e89492899c31d7553

        SHA1

        629da35d9b7704459bbdc24b1c95d7d8d0aeda12

        SHA256

        b61e1a18303fb65fe4b0c746642a11df9ff7ee452ae411f3d5546e6aa5e61697

        SHA512

        90ae1598f277c7a994e234ce698102fc95c58c5784a56efec2fd83d88fb08bb2bc1f6a122f6e7f1dc2c8f79d912173711af616b2d8d60d76ec473ff87cc57a0d

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\MXNWSZRB.cookie
        MD5

        bd3ab0fa7fb18894b3ff8e4c8548634a

        SHA1

        1658100549c87404d01cdc37e4b984085396492f

        SHA256

        a84431934aabbe162e95989d7775a12bcfdd5d88a9bedb2ef456e20d7e28f477

        SHA512

        74253d670fadb8d80efba62ee7d062b0085ced49fb42be04b58efcb408a701228fd8b64a82a5e2f9fd04fc08e86d0fa441158c750ade018e97aaff82d5a368fb

      • C:\Users\Admin\AppData\Local\Temp\gvvrpntnpejymoivkzijhciecuom
        MD5

        789064d8c49c486f874b6efae420cc61

        SHA1

        24aeacf5398df3acac56cbeb50980cc23ade6028

        SHA256

        01ed0cd7f645777ed9307bc566656bf459a9daa0e00311dedfd514889aec5bf3

        SHA512

        9859fb64ca0565af253af0cdb49b63b759a38d6d988462cc4c2b2ca11d53680ed082aa8df29fce360e483d092d22d472e61085ea809056af682f09ea69b8b863

      • C:\Users\Admin\Sugaryse\benzinforh.exe
        MD5

        43927d58e211d5a2d2670bf46b1d9884

        SHA1

        89dba75b13a506ee5042b5636c06555baf85050c

        SHA256

        a6cc856405546af76f769ae3148e782571675af436ae9701c17d081266d6c835

        SHA512

        12982c56cf7b9864b60829336b4c33a1caee4061fccf434fa9809f71b3259c3823cb6786656d639bc0fabe0a683793df4a6ba34d9f35b47801688b3f28bb5521

      • C:\Users\Admin\Sugaryse\benzinforh.exe
        MD5

        43927d58e211d5a2d2670bf46b1d9884

        SHA1

        89dba75b13a506ee5042b5636c06555baf85050c

        SHA256

        a6cc856405546af76f769ae3148e782571675af436ae9701c17d081266d6c835

        SHA512

        12982c56cf7b9864b60829336b4c33a1caee4061fccf434fa9809f71b3259c3823cb6786656d639bc0fabe0a683793df4a6ba34d9f35b47801688b3f28bb5521

      • C:\Users\Admin\Sugaryse\benzinforh.exe
        MD5

        43927d58e211d5a2d2670bf46b1d9884

        SHA1

        89dba75b13a506ee5042b5636c06555baf85050c

        SHA256

        a6cc856405546af76f769ae3148e782571675af436ae9701c17d081266d6c835

        SHA512

        12982c56cf7b9864b60829336b4c33a1caee4061fccf434fa9809f71b3259c3823cb6786656d639bc0fabe0a683793df4a6ba34d9f35b47801688b3f28bb5521

      • C:\Users\Admin\Sugaryse\benzinforh.exe
        MD5

        43927d58e211d5a2d2670bf46b1d9884

        SHA1

        89dba75b13a506ee5042b5636c06555baf85050c

        SHA256

        a6cc856405546af76f769ae3148e782571675af436ae9701c17d081266d6c835

        SHA512

        12982c56cf7b9864b60829336b4c33a1caee4061fccf434fa9809f71b3259c3823cb6786656d639bc0fabe0a683793df4a6ba34d9f35b47801688b3f28bb5521

      • C:\Users\Admin\Sugaryse\benzinforh.exe
        MD5

        43927d58e211d5a2d2670bf46b1d9884

        SHA1

        89dba75b13a506ee5042b5636c06555baf85050c

        SHA256

        a6cc856405546af76f769ae3148e782571675af436ae9701c17d081266d6c835

        SHA512

        12982c56cf7b9864b60829336b4c33a1caee4061fccf434fa9809f71b3259c3823cb6786656d639bc0fabe0a683793df4a6ba34d9f35b47801688b3f28bb5521

      • C:\Users\Admin\Sugaryse\benzinforh.exe
        MD5

        43927d58e211d5a2d2670bf46b1d9884

        SHA1

        89dba75b13a506ee5042b5636c06555baf85050c

        SHA256

        a6cc856405546af76f769ae3148e782571675af436ae9701c17d081266d6c835

        SHA512

        12982c56cf7b9864b60829336b4c33a1caee4061fccf434fa9809f71b3259c3823cb6786656d639bc0fabe0a683793df4a6ba34d9f35b47801688b3f28bb5521

      • C:\Users\Admin\Sugaryse\dwn.exe
        MD5

        daeefcc7e346e447891d46b6611aa5be

        SHA1

        9dfc5d1e7f5276eb125a2d551ff1738ffd61802d

        SHA256

        14591bdae3b5e9cf9988efa782bf96425851dad41c83d4644732b73e02d8d3b1

        SHA512

        5cf5ecd8282d0c3e4b584bb1e695a344180d9c9c05613c1f47b51bfc16fdd15461bfbe28869cd8a1b49ab81a0e142a0dda27d8197fcaad640c9d5f9575788565

      • C:\Users\Admin\Sugaryse\dwn.exe
        MD5

        daeefcc7e346e447891d46b6611aa5be

        SHA1

        9dfc5d1e7f5276eb125a2d551ff1738ffd61802d

        SHA256

        14591bdae3b5e9cf9988efa782bf96425851dad41c83d4644732b73e02d8d3b1

        SHA512

        5cf5ecd8282d0c3e4b584bb1e695a344180d9c9c05613c1f47b51bfc16fdd15461bfbe28869cd8a1b49ab81a0e142a0dda27d8197fcaad640c9d5f9575788565

      • C:\Users\Admin\Sugaryse\dwn.exe
        MD5

        daeefcc7e346e447891d46b6611aa5be

        SHA1

        9dfc5d1e7f5276eb125a2d551ff1738ffd61802d

        SHA256

        14591bdae3b5e9cf9988efa782bf96425851dad41c83d4644732b73e02d8d3b1

        SHA512

        5cf5ecd8282d0c3e4b584bb1e695a344180d9c9c05613c1f47b51bfc16fdd15461bfbe28869cd8a1b49ab81a0e142a0dda27d8197fcaad640c9d5f9575788565

      • memory/508-21-0x0000000000400000-0x000000000041E000-memory.dmp
        Filesize

        120KB

      • memory/508-20-0x0000000000400000-0x000000000041E000-memory.dmp
        Filesize

        120KB

      • memory/508-17-0x0000000000400000-0x000000000041E000-memory.dmp
        Filesize

        120KB

      • memory/3416-16-0x0000000000400000-0x0000000000424000-memory.dmp
        Filesize

        144KB

      • memory/3416-13-0x0000000000400000-0x0000000000424000-memory.dmp
        Filesize

        144KB

      • memory/3416-18-0x0000000000400000-0x0000000000424000-memory.dmp
        Filesize

        144KB

      • memory/3832-14-0x0000000000400000-0x0000000000457000-memory.dmp
        Filesize

        348KB

      • memory/3832-11-0x0000000000400000-0x0000000000457000-memory.dmp
        Filesize

        348KB