Analysis
-
max time kernel
115s -
max time network
52s -
platform
windows7_x64 -
resource
win7 -
submitted
08-07-2020 12:51
Static task
static1
Behavioral task
behavioral1
Sample
Remit.Advice.exe
Resource
win7
Behavioral task
behavioral2
Sample
Remit.Advice.exe
Resource
win10v200430
General
-
Target
Remit.Advice.exe
-
Size
406KB
-
MD5
eee0330f850eeb8d07aeb8e180afc051
-
SHA1
0a64e31ae85096b82c8d36b497eb1fab9bc8fc10
-
SHA256
cdebb39b2a4f203a8c0be1ce06cbeed1396321d8871d3cc46d4c6639ae7d25a2
-
SHA512
66a0fc4a1eefb21a31297a4350084b6a8ce4b25af3bbf224c9b387ed7736c7f5465ca97c40454f6c5506d4f3d390f3271fb709de1a3094170aa057004d597fda
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1100 wrote to memory of 1316 1100 Remit.Advice.exe 26 PID 1100 wrote to memory of 1316 1100 Remit.Advice.exe 26 PID 1100 wrote to memory of 1316 1100 Remit.Advice.exe 26 PID 1100 wrote to memory of 1316 1100 Remit.Advice.exe 26 PID 1100 wrote to memory of 1832 1100 Remit.Advice.exe 28 PID 1100 wrote to memory of 1832 1100 Remit.Advice.exe 28 PID 1100 wrote to memory of 1832 1100 Remit.Advice.exe 28 PID 1100 wrote to memory of 1832 1100 Remit.Advice.exe 28 PID 1100 wrote to memory of 1832 1100 Remit.Advice.exe 28 PID 1100 wrote to memory of 1832 1100 Remit.Advice.exe 28 PID 1100 wrote to memory of 1832 1100 Remit.Advice.exe 28 PID 1100 wrote to memory of 1832 1100 Remit.Advice.exe 28 PID 1100 wrote to memory of 1832 1100 Remit.Advice.exe 28 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1100 set thread context of 1832 1100 Remit.Advice.exe 28 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1832 Remit.Advice.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1832 Remit.Advice.exe 1832 Remit.Advice.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1316 schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Remit.Advice.exe"C:\Users\Admin\AppData\Local\Temp\Remit.Advice.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:1100 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WiAEpdKhZ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1FEE.tmp"2⤵
- Creates scheduled task(s)
PID:1316
-
-
C:\Users\Admin\AppData\Local\Temp\Remit.Advice.exe"C:\Users\Admin\AppData\Local\Temp\Remit.Advice.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:1832
-