Analysis
-
max time kernel
133s -
max time network
134s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
12-01-2021 07:25
Static task
static1
Behavioral task
behavioral1
Sample
0000000000009000.exe
Resource
win7v20201028
General
-
Target
0000000000009000.exe
-
Size
164KB
-
MD5
e94c75f89c21caad5e32e29ef565a4ff
-
SHA1
4c95d00080d93d9df0360959db3c9f38a7e80a97
-
SHA256
a9b710f85ef86429b380e2a96153ea27a21ea201ce8bd81e316420f0c3a435c3
-
SHA512
3936e7c8692fe4821bd8fa32c8a98d468c855b2a8220d346e1b8d5b356c5540db2566d4949fae0e095b4febe71e52279cc671945ab29bb8ac490a342f793ef17
Malware Config
Extracted
remcos
45.137.22.52:8780
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 4 IoCs
Processes:
0000000000009000.exe0000000000009000.exedescription pid process target process PID 636 set thread context of 1020 636 0000000000009000.exe 0000000000009000.exe PID 1020 set thread context of 2316 1020 0000000000009000.exe 0000000000009000.exe PID 1020 set thread context of 3732 1020 0000000000009000.exe 0000000000009000.exe PID 1020 set thread context of 3068 1020 0000000000009000.exe 0000000000009000.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
0000000000009000.exe0000000000009000.exepid process 2316 0000000000009000.exe 2316 0000000000009000.exe 3732 0000000000009000.exe 3732 0000000000009000.exe 2316 0000000000009000.exe 2316 0000000000009000.exe 2316 0000000000009000.exe 2316 0000000000009000.exe 2316 0000000000009000.exe 2316 0000000000009000.exe 2316 0000000000009000.exe 2316 0000000000009000.exe 2316 0000000000009000.exe 2316 0000000000009000.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
0000000000009000.exepid process 636 0000000000009000.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
0000000000009000.exedescription pid process Token: SeDebugPrivilege 3732 0000000000009000.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
0000000000009000.exepid process 1020 0000000000009000.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
0000000000009000.execmd.exe0000000000009000.exedescription pid process target process PID 636 wrote to memory of 1904 636 0000000000009000.exe cmd.exe PID 636 wrote to memory of 1904 636 0000000000009000.exe cmd.exe PID 636 wrote to memory of 1904 636 0000000000009000.exe cmd.exe PID 636 wrote to memory of 1020 636 0000000000009000.exe 0000000000009000.exe PID 636 wrote to memory of 1020 636 0000000000009000.exe 0000000000009000.exe PID 636 wrote to memory of 1020 636 0000000000009000.exe 0000000000009000.exe PID 636 wrote to memory of 1020 636 0000000000009000.exe 0000000000009000.exe PID 1904 wrote to memory of 200 1904 cmd.exe schtasks.exe PID 1904 wrote to memory of 200 1904 cmd.exe schtasks.exe PID 1904 wrote to memory of 200 1904 cmd.exe schtasks.exe PID 1020 wrote to memory of 2316 1020 0000000000009000.exe 0000000000009000.exe PID 1020 wrote to memory of 2316 1020 0000000000009000.exe 0000000000009000.exe PID 1020 wrote to memory of 2316 1020 0000000000009000.exe 0000000000009000.exe PID 1020 wrote to memory of 2316 1020 0000000000009000.exe 0000000000009000.exe PID 1020 wrote to memory of 2316 1020 0000000000009000.exe 0000000000009000.exe PID 1020 wrote to memory of 2316 1020 0000000000009000.exe 0000000000009000.exe PID 1020 wrote to memory of 2316 1020 0000000000009000.exe 0000000000009000.exe PID 1020 wrote to memory of 2316 1020 0000000000009000.exe 0000000000009000.exe PID 1020 wrote to memory of 3732 1020 0000000000009000.exe 0000000000009000.exe PID 1020 wrote to memory of 3732 1020 0000000000009000.exe 0000000000009000.exe PID 1020 wrote to memory of 3732 1020 0000000000009000.exe 0000000000009000.exe PID 1020 wrote to memory of 3732 1020 0000000000009000.exe 0000000000009000.exe PID 1020 wrote to memory of 3732 1020 0000000000009000.exe 0000000000009000.exe PID 1020 wrote to memory of 3732 1020 0000000000009000.exe 0000000000009000.exe PID 1020 wrote to memory of 3732 1020 0000000000009000.exe 0000000000009000.exe PID 1020 wrote to memory of 3732 1020 0000000000009000.exe 0000000000009000.exe PID 1020 wrote to memory of 3068 1020 0000000000009000.exe 0000000000009000.exe PID 1020 wrote to memory of 3068 1020 0000000000009000.exe 0000000000009000.exe PID 1020 wrote to memory of 3068 1020 0000000000009000.exe 0000000000009000.exe PID 1020 wrote to memory of 3068 1020 0000000000009000.exe 0000000000009000.exe PID 1020 wrote to memory of 3068 1020 0000000000009000.exe 0000000000009000.exe PID 1020 wrote to memory of 3068 1020 0000000000009000.exe 0000000000009000.exe PID 1020 wrote to memory of 3068 1020 0000000000009000.exe 0000000000009000.exe PID 1020 wrote to memory of 3068 1020 0000000000009000.exe 0000000000009000.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0000000000009000.exe"C:\Users\Admin\AppData\Local\Temp\0000000000009000.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /Create /TN name /XML "C:\Users\Admin\AppData\Local\Temp\d62d57f76a8540fab826e8cc40a72ae0.xml"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /TN name /XML "C:\Users\Admin\AppData\Local\Temp\d62d57f76a8540fab826e8cc40a72ae0.xml"3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\0000000000009000.exe"C:\Users\Admin\AppData\Local\Temp\0000000000009000.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\0000000000009000.exeC:\Users\Admin\AppData\Local\Temp\0000000000009000.exe /stext "C:\Users\Admin\AppData\Local\Temp\rjcly"3⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\0000000000009000.exeC:\Users\Admin\AppData\Local\Temp\0000000000009000.exe /stext "C:\Users\Admin\AppData\Local\Temp\bmhvygga"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\0000000000009000.exeC:\Users\Admin\AppData\Local\Temp\0000000000009000.exe /stext "C:\Users\Admin\AppData\Local\Temp\egmozyrtund"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\d62d57f76a8540fab826e8cc40a72ae0.xmlMD5
a36564afc14b3eb0849c01a3afdb9944
SHA14dcee9fae3fde4e46b08529bc0ba067150686f07
SHA2569d4342f763c5d62a06f69aa6fdcb1caa376ff2f2c0972f36b487f73b4d221996
SHA512782082aa36ae056734e90fc079c813dfef59420571a1b70cde4cf15eb6c870f85b2bfe0748ef4db9df3d010c08671bff744d78178ba75bf2ba02b665f044ae89
-
C:\Users\Admin\AppData\Local\Temp\rjclyMD5
74a47b17f3a3ef2bc5e4f2661210d7a1
SHA16199a479afcedce924c19ee86a2df3e4b9ea3ca4
SHA256213bb635eb0518993f6628f436301ec966109d5f77fa937ddc0149204bb1e687
SHA512829bb52f0c75fb021db780a17817bfdf6a4dfcb2dbe2240923e97f0b575bdd3bb55e41e82070055eb2df4bf45a41cc38f083360c93979352e7a81b5d74715179
-
memory/200-7-0x0000000000000000-mapping.dmp
-
memory/1020-3-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1020-4-0x000000000040FD88-mapping.dmp
-
memory/1020-6-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1904-2-0x0000000000000000-mapping.dmp
-
memory/2316-9-0x0000000000400000-0x0000000000457000-memory.dmpFilesize
348KB
-
memory/2316-10-0x0000000000455274-mapping.dmp
-
memory/2316-12-0x0000000000400000-0x0000000000457000-memory.dmpFilesize
348KB
-
memory/2316-15-0x0000000000400000-0x0000000000457000-memory.dmpFilesize
348KB
-
memory/3068-17-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3068-18-0x000000000041C238-mapping.dmp
-
memory/3068-19-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3068-20-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3732-16-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/3732-14-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/3732-11-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/3732-13-0x0000000000422206-mapping.dmp