Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
13-01-2021 07:40
Static task
static1
Behavioral task
behavioral1
Sample
Shipping Document.exe
Resource
win7v20201028
General
-
Target
Shipping Document.exe
-
Size
993KB
-
MD5
522b6a9b012ad32cf9a5f8c5bd9503eb
-
SHA1
b1262d137fa69bd2a1961577cd1deb2d7b748bde
-
SHA256
0b69258626ece584131b49ae0aa317153d7b4ae602e7f936be7f462905cd9d8a
-
SHA512
e148b7bdb43e619282b56d4e3202ac57c65b77812e4f6e7a830d6bb0de6e20d6f6e13f6d10420937e4274297737435ffb800d342b3270fd8069409b83d708c1a
Malware Config
Extracted
remcos
79.134.225.34:20210
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
avg.exeavg.exepid process 1460 avg.exe 952 avg.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 1012 cmd.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
Shipping Document.exeavg.exedescription pid process target process PID 1640 set thread context of 1668 1640 Shipping Document.exe Shipping Document.exe PID 1460 set thread context of 952 1460 avg.exe avg.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
Shipping Document.exeShipping Document.exeWScript.execmd.exeavg.exedescription pid process target process PID 1640 wrote to memory of 1668 1640 Shipping Document.exe Shipping Document.exe PID 1640 wrote to memory of 1668 1640 Shipping Document.exe Shipping Document.exe PID 1640 wrote to memory of 1668 1640 Shipping Document.exe Shipping Document.exe PID 1640 wrote to memory of 1668 1640 Shipping Document.exe Shipping Document.exe PID 1640 wrote to memory of 1668 1640 Shipping Document.exe Shipping Document.exe PID 1640 wrote to memory of 1668 1640 Shipping Document.exe Shipping Document.exe PID 1640 wrote to memory of 1668 1640 Shipping Document.exe Shipping Document.exe PID 1640 wrote to memory of 1668 1640 Shipping Document.exe Shipping Document.exe PID 1640 wrote to memory of 1668 1640 Shipping Document.exe Shipping Document.exe PID 1640 wrote to memory of 1668 1640 Shipping Document.exe Shipping Document.exe PID 1640 wrote to memory of 1668 1640 Shipping Document.exe Shipping Document.exe PID 1668 wrote to memory of 1092 1668 Shipping Document.exe WScript.exe PID 1668 wrote to memory of 1092 1668 Shipping Document.exe WScript.exe PID 1668 wrote to memory of 1092 1668 Shipping Document.exe WScript.exe PID 1668 wrote to memory of 1092 1668 Shipping Document.exe WScript.exe PID 1092 wrote to memory of 1012 1092 WScript.exe cmd.exe PID 1092 wrote to memory of 1012 1092 WScript.exe cmd.exe PID 1092 wrote to memory of 1012 1092 WScript.exe cmd.exe PID 1092 wrote to memory of 1012 1092 WScript.exe cmd.exe PID 1012 wrote to memory of 1460 1012 cmd.exe avg.exe PID 1012 wrote to memory of 1460 1012 cmd.exe avg.exe PID 1012 wrote to memory of 1460 1012 cmd.exe avg.exe PID 1012 wrote to memory of 1460 1012 cmd.exe avg.exe PID 1460 wrote to memory of 952 1460 avg.exe avg.exe PID 1460 wrote to memory of 952 1460 avg.exe avg.exe PID 1460 wrote to memory of 952 1460 avg.exe avg.exe PID 1460 wrote to memory of 952 1460 avg.exe avg.exe PID 1460 wrote to memory of 952 1460 avg.exe avg.exe PID 1460 wrote to memory of 952 1460 avg.exe avg.exe PID 1460 wrote to memory of 952 1460 avg.exe avg.exe PID 1460 wrote to memory of 952 1460 avg.exe avg.exe PID 1460 wrote to memory of 952 1460 avg.exe avg.exe PID 1460 wrote to memory of 952 1460 avg.exe avg.exe PID 1460 wrote to memory of 952 1460 avg.exe avg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Shipping Document.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Document.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Shipping Document.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Document.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Remcos\avg.exe"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Remcos\avg.exeC:\Users\Admin\AppData\Roaming\Remcos\avg.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Remcos\avg.exe"C:\Users\Admin\AppData\Roaming\Remcos\avg.exe"6⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\install.vbsMD5
222ff72d08a383519879fd6fe2dfc7bb
SHA15a76b3a8f29a37d16190b7977a28db32b57819d3
SHA25654f4ed95899f8a81583e6ec482052b89924ccdf9049198d931bb2283e4132fe7
SHA512b02e6af89fa61f6cf455fac444fa3bc8639d8d9d26db483be5f038d639dd074fcb052707d5458fbea67a94c424d146ab2239f4fc6cb70d710277c990d17aa926
-
C:\Users\Admin\AppData\Roaming\Remcos\avg.exeMD5
522b6a9b012ad32cf9a5f8c5bd9503eb
SHA1b1262d137fa69bd2a1961577cd1deb2d7b748bde
SHA2560b69258626ece584131b49ae0aa317153d7b4ae602e7f936be7f462905cd9d8a
SHA512e148b7bdb43e619282b56d4e3202ac57c65b77812e4f6e7a830d6bb0de6e20d6f6e13f6d10420937e4274297737435ffb800d342b3270fd8069409b83d708c1a
-
C:\Users\Admin\AppData\Roaming\Remcos\avg.exeMD5
522b6a9b012ad32cf9a5f8c5bd9503eb
SHA1b1262d137fa69bd2a1961577cd1deb2d7b748bde
SHA2560b69258626ece584131b49ae0aa317153d7b4ae602e7f936be7f462905cd9d8a
SHA512e148b7bdb43e619282b56d4e3202ac57c65b77812e4f6e7a830d6bb0de6e20d6f6e13f6d10420937e4274297737435ffb800d342b3270fd8069409b83d708c1a
-
C:\Users\Admin\AppData\Roaming\Remcos\avg.exeMD5
522b6a9b012ad32cf9a5f8c5bd9503eb
SHA1b1262d137fa69bd2a1961577cd1deb2d7b748bde
SHA2560b69258626ece584131b49ae0aa317153d7b4ae602e7f936be7f462905cd9d8a
SHA512e148b7bdb43e619282b56d4e3202ac57c65b77812e4f6e7a830d6bb0de6e20d6f6e13f6d10420937e4274297737435ffb800d342b3270fd8069409b83d708c1a
-
\Users\Admin\AppData\Roaming\Remcos\avg.exeMD5
522b6a9b012ad32cf9a5f8c5bd9503eb
SHA1b1262d137fa69bd2a1961577cd1deb2d7b748bde
SHA2560b69258626ece584131b49ae0aa317153d7b4ae602e7f936be7f462905cd9d8a
SHA512e148b7bdb43e619282b56d4e3202ac57c65b77812e4f6e7a830d6bb0de6e20d6f6e13f6d10420937e4274297737435ffb800d342b3270fd8069409b83d708c1a
-
memory/952-16-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/952-14-0x0000000000413FA4-mapping.dmp
-
memory/1012-7-0x0000000000000000-mapping.dmp
-
memory/1092-8-0x0000000002780000-0x0000000002784000-memory.dmpFilesize
16KB
-
memory/1092-5-0x0000000000000000-mapping.dmp
-
memory/1460-11-0x0000000000000000-mapping.dmp
-
memory/1668-2-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/1668-4-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/1668-3-0x0000000000413FA4-mapping.dmp