Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    12-01-2021 18:14

General

  • Target

    1.5% commission.exe

  • Size

    370KB

  • MD5

    057232dd82dfcfa30b91feeda42d9444

  • SHA1

    6cb696d2e19686f3a3f7cf8e8682439d717c23bc

  • SHA256

    5fdecb2c511ec2b584766991bc2126ae802ed2618a80a227046df5379f12e745

  • SHA512

    a1de088888d1e60aacf79cd40c5bd7989cc3344c6d98c200757a7553b456c4a5a609bc1cb3c89cc0e54a6333c4e901795c41f7459e880f733bee807e6f231d31

Score
10/10

Malware Config

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1.5% commission.exe
    "C:\Users\Admin\AppData\Local\Temp\1.5% commission.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:508
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c schtasks /Create /TN file /XML "C:\Users\Admin\AppData\Local\Temp\35743f516c274f99953eeb2171036de1.xml"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3680
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /Create /TN file /XML "C:\Users\Admin\AppData\Local\Temp\35743f516c274f99953eeb2171036de1.xml"
        3⤵
        • Creates scheduled task(s)
        PID:3548

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\35743f516c274f99953eeb2171036de1.xml

    MD5

    d39e173257ca6d2fe2fbc69f4f92cecd

    SHA1

    d775d8f1f868ad3daeebea6bf9e6b6a76639cead

    SHA256

    6e8e778fe8e168431f40fa5ae31b8917839a7090963d512433b76b460ee75325

    SHA512

    6e16e0cc6ecb56191f846457ee38b12c1ea9a5d93a8566fd1c9b49373bfd81c087aa6cd5fb1b40964a10b40158f1c44f7a48a5b75222539cb2cab7299de41448

  • memory/3548-3-0x0000000000000000-mapping.dmp

  • memory/3680-2-0x0000000000000000-mapping.dmp