Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    05-01-2021 09:34

General

  • Target

    Original BL_pdf.scr

  • Size

    136KB

  • MD5

    7fd79d1258fa8ed52e0d49bd780acd2e

  • SHA1

    ede2f547aae04f958172240dfd6cd0b76990e006

  • SHA256

    581bd1167bd9b40944de9a2d8842ed8aa841fdfc69d896c24520873095e0ac03

  • SHA512

    8b093424dccf6f879a792a6516536c8e02d771d0f7cd69eb706c553a0d75121a2cf9172c0f91de0c53189ce8eb6928e0b2a3ec4503024d63eb3090ec22c0feb0

Score
10/10

Malware Config

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Original BL_pdf.scr
    "C:\Users\Admin\AppData\Local\Temp\Original BL_pdf.scr" /S
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:500
    • C:\Program Files (x86)\internet explorer\ieinstal.exe
      "C:\Users\Admin\AppData\Local\Temp\Original BL_pdf.scr" /S
      2⤵
        PID:3164
      • C:\Program Files (x86)\internet explorer\ieinstal.exe
        "C:\Users\Admin\AppData\Local\Temp\Original BL_pdf.scr" /S
        2⤵
        • Adds Run key to start application
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetWindowsHookEx
        PID:2852

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2852-5-0x0000000003240000-mapping.dmp
    • memory/2852-4-0x0000000003240000-0x0000000003340000-memory.dmp
      Filesize

      1024KB