Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
01-01-2021 18:48
Static task
static1
Behavioral task
behavioral1
Sample
drivers_check.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
drivers_check.exe
-
Size
1.4MB
-
MD5
46580314ad41ee9c33eea70fd336f9d1
-
SHA1
0f27e8e24c40de4df8d6f50634c7aba117679f7a
-
SHA256
46f9b3a73b2ef17c7ace714e6b69b02e444096fb395d85e3b3220ed13d060a48
-
SHA512
f160f04a9104eff461122393c62a9a3f963eea47e50b7464787db6212db2ec06ba295e122ac085653b95d224dd23504de98a05733b2d5b97e44fc36d4b5a3c27
Malware Config
Extracted
Family
remcos
C2
5.61.56.10:9003
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
cmd.exeflow pid process 19 4160 cmd.exe -
Drops file in Windows directory 1 IoCs
Processes:
cmd.exedescription ioc process File created C:\Windows\Tasks\ads.job cmd.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
drivers_check.exenotepad.exepid process 4636 drivers_check.exe 3572 notepad.exe 3572 notepad.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
notepad.exepid process 3572 notepad.exe 3572 notepad.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
cmd.exepid process 4160 cmd.exe -
Suspicious use of WriteProcessMemory 174 IoCs
Processes:
drivers_check.exedescription pid process target process PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe PID 4636 wrote to memory of 3572 4636 drivers_check.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\drivers_check.exe"C:\Users\Admin\AppData\Local\Temp\drivers_check.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3572 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵PID:3176
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Blocklisted process makes network request
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:4160