Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows7_x64 -
resource
win7 -
submitted
07-07-2020 15:22
Static task
static1
Behavioral task
behavioral1
Sample
8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe
Resource
win7
General
-
Target
8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe
-
Size
363KB
-
MD5
8b6be0ea00b0d6a83236ca3884b6b4e7
-
SHA1
f6567ce57e9ab3bedf98456e1cac5cb9eceeddd0
-
SHA256
8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7
-
SHA512
2feb48679b1a2b7ea17144c2825cdfee1a3cdbc0e2d79496bca5842ff479b416a2c3e4e9954bce62246780d2de991b58c66bcab8f548ed7f8f008324171cacf9
Malware Config
Extracted
remcos
79.134.225.112:1774
Signatures
-
Suspicious use of SetThreadContext 7 IoCs
Processes:
8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exebin.exeWindows Essential.exeiexplore.exesvchost.exedescription pid process target process PID 1516 set thread context of 1292 1516 8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe 8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe PID 1388 set thread context of 1212 1388 bin.exe Explorer.EXE PID 1996 set thread context of 2024 1996 Windows Essential.exe iexplore.exe PID 2024 set thread context of 1832 2024 iexplore.exe svchost.exe PID 1388 set thread context of 1212 1388 bin.exe Explorer.EXE PID 1740 set thread context of 1212 1740 svchost.exe Explorer.EXE PID 1740 set thread context of 2024 1740 svchost.exe iexplore.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
bin.exesvchost.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 1388 bin.exe Token: SeDebugPrivilege 1740 svchost.exe Token: SeShutdownPrivilege 1212 Explorer.EXE -
Suspicious behavior: MapViewOfSection 10 IoCs
Processes:
bin.exesvchost.exepid process 1388 bin.exe 1388 bin.exe 1388 bin.exe 1388 bin.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe -
Adds Run entry to start application 2 TTPs 6 IoCs
Processes:
remcos_agent.exeWindows Essential.exeiexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\ remcos_agent.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Essential = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Essential\\Windows Essential.exe\"" remcos_agent.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\ Windows Essential.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Essential = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Essential\\Windows Essential.exe\"" Windows Essential.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Essential = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Essential\\Windows Essential.exe\"" iexplore.exe -
Loads dropped DLL 6 IoCs
Processes:
8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.execmd.exepid process 1292 8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe 1292 8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe 1292 8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe 1292 8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe 1972 cmd.exe 1972 cmd.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
bin.exesvchost.exepid process 1388 bin.exe 1388 bin.exe 1388 bin.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
Processes:
Explorer.EXEpid process 1212 Explorer.EXE 1212 Explorer.EXE 1212 Explorer.EXE 1212 Explorer.EXE 1212 Explorer.EXE 1212 Explorer.EXE 1212 Explorer.EXE -
Processes:
Explorer.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Explorer.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 1 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Program Files (x86)\M5jt\updatekpx4.exe svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exeiexplore.exepid process 1292 8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe 2024 iexplore.exe -
Suspicious use of SendNotifyMessage 6 IoCs
Processes:
Explorer.EXEpid process 1212 Explorer.EXE 1212 Explorer.EXE 1212 Explorer.EXE 1212 Explorer.EXE 1212 Explorer.EXE 1212 Explorer.EXE -
Processes:
svchost.exedescription ioc process Key created \Registry\User\S-1-5-21-1131729243-447456001-3632642222-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 svchost.exe -
Adds Run entry to policy start application 2 TTPs 2 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\UR_XNHA82T = "C:\\Program Files (x86)\\M5jt\\updatekpx4.exe" svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exeremcos_agent.exeWScript.execmd.exeWindows Essential.exeiexplore.exeExplorer.EXEsvchost.exedescription pid process target process PID 1516 wrote to memory of 1292 1516 8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe 8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe PID 1516 wrote to memory of 1292 1516 8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe 8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe PID 1516 wrote to memory of 1292 1516 8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe 8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe PID 1516 wrote to memory of 1292 1516 8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe 8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe PID 1516 wrote to memory of 1292 1516 8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe 8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe PID 1516 wrote to memory of 1292 1516 8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe 8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe PID 1516 wrote to memory of 1292 1516 8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe 8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe PID 1516 wrote to memory of 1292 1516 8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe 8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe PID 1516 wrote to memory of 1292 1516 8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe 8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe PID 1292 wrote to memory of 1388 1292 8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe bin.exe PID 1292 wrote to memory of 1388 1292 8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe bin.exe PID 1292 wrote to memory of 1388 1292 8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe bin.exe PID 1292 wrote to memory of 1388 1292 8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe bin.exe PID 1292 wrote to memory of 1876 1292 8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe remcos_agent.exe PID 1292 wrote to memory of 1876 1292 8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe remcos_agent.exe PID 1292 wrote to memory of 1876 1292 8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe remcos_agent.exe PID 1292 wrote to memory of 1876 1292 8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe remcos_agent.exe PID 1876 wrote to memory of 1904 1876 remcos_agent.exe WScript.exe PID 1876 wrote to memory of 1904 1876 remcos_agent.exe WScript.exe PID 1876 wrote to memory of 1904 1876 remcos_agent.exe WScript.exe PID 1876 wrote to memory of 1904 1876 remcos_agent.exe WScript.exe PID 1904 wrote to memory of 1972 1904 WScript.exe cmd.exe PID 1904 wrote to memory of 1972 1904 WScript.exe cmd.exe PID 1904 wrote to memory of 1972 1904 WScript.exe cmd.exe PID 1904 wrote to memory of 1972 1904 WScript.exe cmd.exe PID 1972 wrote to memory of 1996 1972 cmd.exe Windows Essential.exe PID 1972 wrote to memory of 1996 1972 cmd.exe Windows Essential.exe PID 1972 wrote to memory of 1996 1972 cmd.exe Windows Essential.exe PID 1972 wrote to memory of 1996 1972 cmd.exe Windows Essential.exe PID 1996 wrote to memory of 2024 1996 Windows Essential.exe iexplore.exe PID 1996 wrote to memory of 2024 1996 Windows Essential.exe iexplore.exe PID 1996 wrote to memory of 2024 1996 Windows Essential.exe iexplore.exe PID 1996 wrote to memory of 2024 1996 Windows Essential.exe iexplore.exe PID 1996 wrote to memory of 2024 1996 Windows Essential.exe iexplore.exe PID 1996 wrote to memory of 2024 1996 Windows Essential.exe iexplore.exe PID 1996 wrote to memory of 2024 1996 Windows Essential.exe iexplore.exe PID 1996 wrote to memory of 2024 1996 Windows Essential.exe iexplore.exe PID 1996 wrote to memory of 2024 1996 Windows Essential.exe iexplore.exe PID 1996 wrote to memory of 2024 1996 Windows Essential.exe iexplore.exe PID 1996 wrote to memory of 2024 1996 Windows Essential.exe iexplore.exe PID 2024 wrote to memory of 1832 2024 iexplore.exe svchost.exe PID 2024 wrote to memory of 1832 2024 iexplore.exe svchost.exe PID 2024 wrote to memory of 1832 2024 iexplore.exe svchost.exe PID 2024 wrote to memory of 1832 2024 iexplore.exe svchost.exe PID 2024 wrote to memory of 1832 2024 iexplore.exe svchost.exe PID 2024 wrote to memory of 1832 2024 iexplore.exe svchost.exe PID 2024 wrote to memory of 1832 2024 iexplore.exe svchost.exe PID 2024 wrote to memory of 1832 2024 iexplore.exe svchost.exe PID 2024 wrote to memory of 1832 2024 iexplore.exe svchost.exe PID 2024 wrote to memory of 1832 2024 iexplore.exe svchost.exe PID 2024 wrote to memory of 1832 2024 iexplore.exe svchost.exe PID 1212 wrote to memory of 1740 1212 Explorer.EXE svchost.exe PID 1212 wrote to memory of 1740 1212 Explorer.EXE svchost.exe PID 1212 wrote to memory of 1740 1212 Explorer.EXE svchost.exe PID 1212 wrote to memory of 1740 1212 Explorer.EXE svchost.exe PID 1740 wrote to memory of 1572 1740 svchost.exe cmd.exe PID 1740 wrote to memory of 1572 1740 svchost.exe cmd.exe PID 1740 wrote to memory of 1572 1740 svchost.exe cmd.exe PID 1740 wrote to memory of 1572 1740 svchost.exe cmd.exe PID 1740 wrote to memory of 1868 1740 svchost.exe Firefox.exe PID 1740 wrote to memory of 1868 1740 svchost.exe Firefox.exe PID 1740 wrote to memory of 1868 1740 svchost.exe Firefox.exe PID 1740 wrote to memory of 1868 1740 svchost.exe Firefox.exe PID 1740 wrote to memory of 1868 1740 svchost.exe Firefox.exe -
Executes dropped EXE 3 IoCs
Processes:
bin.exeremcos_agent.exeWindows Essential.exepid process 1388 bin.exe 1876 remcos_agent.exe 1996 Windows Essential.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer svchost.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Checks whether UAC is enabled
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe"C:\Users\Admin\AppData\Local\Temp\8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe"C:\Users\Admin\AppData\Local\Temp\8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe"3⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\bin.exe"C:\Users\Admin\AppData\Local\Temp\bin.exe" 04⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: MapViewOfSection
- Suspicious behavior: EnumeratesProcesses
- Executes dropped EXE
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\remcos_agent.exe"C:\Users\Admin\AppData\Local\Temp\remcos_agent.exe" 04⤵
- Adds Run entry to start application
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
PID:1876 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"5⤵
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Windows Essential\Windows Essential.exe"6⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Roaming\Windows Essential\Windows Essential.exe"C:\Users\Admin\AppData\Roaming\Windows Essential\Windows Essential.exe"7⤵
- Suspicious use of SetThreadContext
- Adds Run entry to start application
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
PID:1996 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"8⤵
- Suspicious use of SetThreadContext
- Adds Run entry to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe9⤵PID:1832
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: MapViewOfSection
- Suspicious behavior: EnumeratesProcesses
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Adds Run entry to policy start application
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1740 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\bin.exe"3⤵PID:1572
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1868