Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7 -
submitted
29-06-2020 07:28
Static task
static1
Behavioral task
behavioral1
Sample
ca6d1749f9645475aa7ab0ca268e31ba00817a8c70467c4d6d88bb2ca54d596d.exe
Resource
win7
Behavioral task
behavioral2
Sample
ca6d1749f9645475aa7ab0ca268e31ba00817a8c70467c4d6d88bb2ca54d596d.exe
Resource
win10v200430
General
-
Target
ca6d1749f9645475aa7ab0ca268e31ba00817a8c70467c4d6d88bb2ca54d596d.exe
-
Size
335KB
-
MD5
a6be592fb62d3e95befa3d40fe603f10
-
SHA1
e2531f4fac0b8fcfdf87ab86b5d73a18229416c2
-
SHA256
ca6d1749f9645475aa7ab0ca268e31ba00817a8c70467c4d6d88bb2ca54d596d
-
SHA512
5428156b60a289d7c8009ebeb715d863f9bbd015ae834a4f213570595ca47cb4efb7ca0d16a317e7bb9cfc9123e416970064cf628f31c39ccc714181cb3893b8
Malware Config
Extracted
remcos
youngboss1994.ddns.net:1965
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ca6d1749f9645475aa7ab0ca268e31ba00817a8c70467c4d6d88bb2ca54d596d.exedescription pid process Token: SeDebugPrivilege 1460 ca6d1749f9645475aa7ab0ca268e31ba00817a8c70467c4d6d88bb2ca54d596d.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
ca6d1749f9645475aa7ab0ca268e31ba00817a8c70467c4d6d88bb2ca54d596d.exepid process 1460 ca6d1749f9645475aa7ab0ca268e31ba00817a8c70467c4d6d88bb2ca54d596d.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ca6d1749f9645475aa7ab0ca268e31ba00817a8c70467c4d6d88bb2ca54d596d.exedescription pid process target process PID 1460 set thread context of 1060 1460 ca6d1749f9645475aa7ab0ca268e31ba00817a8c70467c4d6d88bb2ca54d596d.exe vbc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
vbc.exepid process 1060 vbc.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
ca6d1749f9645475aa7ab0ca268e31ba00817a8c70467c4d6d88bb2ca54d596d.exedescription pid process target process PID 1460 wrote to memory of 1624 1460 ca6d1749f9645475aa7ab0ca268e31ba00817a8c70467c4d6d88bb2ca54d596d.exe schtasks.exe PID 1460 wrote to memory of 1624 1460 ca6d1749f9645475aa7ab0ca268e31ba00817a8c70467c4d6d88bb2ca54d596d.exe schtasks.exe PID 1460 wrote to memory of 1624 1460 ca6d1749f9645475aa7ab0ca268e31ba00817a8c70467c4d6d88bb2ca54d596d.exe schtasks.exe PID 1460 wrote to memory of 1624 1460 ca6d1749f9645475aa7ab0ca268e31ba00817a8c70467c4d6d88bb2ca54d596d.exe schtasks.exe PID 1460 wrote to memory of 1148 1460 ca6d1749f9645475aa7ab0ca268e31ba00817a8c70467c4d6d88bb2ca54d596d.exe vbc.exe PID 1460 wrote to memory of 1148 1460 ca6d1749f9645475aa7ab0ca268e31ba00817a8c70467c4d6d88bb2ca54d596d.exe vbc.exe PID 1460 wrote to memory of 1148 1460 ca6d1749f9645475aa7ab0ca268e31ba00817a8c70467c4d6d88bb2ca54d596d.exe vbc.exe PID 1460 wrote to memory of 1148 1460 ca6d1749f9645475aa7ab0ca268e31ba00817a8c70467c4d6d88bb2ca54d596d.exe vbc.exe PID 1460 wrote to memory of 1060 1460 ca6d1749f9645475aa7ab0ca268e31ba00817a8c70467c4d6d88bb2ca54d596d.exe vbc.exe PID 1460 wrote to memory of 1060 1460 ca6d1749f9645475aa7ab0ca268e31ba00817a8c70467c4d6d88bb2ca54d596d.exe vbc.exe PID 1460 wrote to memory of 1060 1460 ca6d1749f9645475aa7ab0ca268e31ba00817a8c70467c4d6d88bb2ca54d596d.exe vbc.exe PID 1460 wrote to memory of 1060 1460 ca6d1749f9645475aa7ab0ca268e31ba00817a8c70467c4d6d88bb2ca54d596d.exe vbc.exe PID 1460 wrote to memory of 1060 1460 ca6d1749f9645475aa7ab0ca268e31ba00817a8c70467c4d6d88bb2ca54d596d.exe vbc.exe PID 1460 wrote to memory of 1060 1460 ca6d1749f9645475aa7ab0ca268e31ba00817a8c70467c4d6d88bb2ca54d596d.exe vbc.exe PID 1460 wrote to memory of 1060 1460 ca6d1749f9645475aa7ab0ca268e31ba00817a8c70467c4d6d88bb2ca54d596d.exe vbc.exe PID 1460 wrote to memory of 1060 1460 ca6d1749f9645475aa7ab0ca268e31ba00817a8c70467c4d6d88bb2ca54d596d.exe vbc.exe PID 1460 wrote to memory of 1060 1460 ca6d1749f9645475aa7ab0ca268e31ba00817a8c70467c4d6d88bb2ca54d596d.exe vbc.exe PID 1460 wrote to memory of 1060 1460 ca6d1749f9645475aa7ab0ca268e31ba00817a8c70467c4d6d88bb2ca54d596d.exe vbc.exe PID 1460 wrote to memory of 1060 1460 ca6d1749f9645475aa7ab0ca268e31ba00817a8c70467c4d6d88bb2ca54d596d.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca6d1749f9645475aa7ab0ca268e31ba00817a8c70467c4d6d88bb2ca54d596d.exe"C:\Users\Admin\AppData\Local\Temp\ca6d1749f9645475aa7ab0ca268e31ba00817a8c70467c4d6d88bb2ca54d596d.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KCxDCJBgK" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3C15.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"{path}"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"{path}"2⤵
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp3C15.tmp
-
memory/1060-4-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1060-5-0x0000000000413A84-mapping.dmp
-
memory/1060-6-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1460-1-0x0000000000000000-0x0000000000000000-disk.dmp
-
memory/1624-2-0x0000000000000000-mapping.dmp