Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
13-01-2021 20:16
Static task
static1
Behavioral task
behavioral1
Sample
AS006-20211201.pdf.exe
Resource
win7v20201028
General
-
Target
AS006-20211201.pdf.exe
-
Size
843KB
-
MD5
5b58aebe0dd52b528d61475c704dd359
-
SHA1
2297d93e6223f8b03bccdb273ed0039ba8a77bd3
-
SHA256
43161c0778fd7277ad2d18d914e616e1ada7458ed92dff0d874fe5dd964c1975
-
SHA512
04e8595ea0b07861d9cbbe76ef67ea4199683a5cee080b7ecf11fcab485468bcf96280e21365a163aa105fc6e09c8ca23e0a06bf95e9d0fb1a422917e39acb21
Malware Config
Extracted
remcos
91.193.75.185:1989
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
system32.exesystem32.exepid process 2712 system32.exe 984 system32.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
AS006-20211201.pdf.exesystem32.exesystem32.exedescription pid process target process PID 756 set thread context of 4000 756 AS006-20211201.pdf.exe AS006-20211201.pdf.exe PID 2712 set thread context of 984 2712 system32.exe system32.exe PID 984 set thread context of 2172 984 system32.exe svchost.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1816 schtasks.exe 2348 schtasks.exe -
Modifies registry class 1 IoCs
Processes:
AS006-20211201.pdf.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings AS006-20211201.pdf.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
system32.exepid process 2712 system32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
system32.exedescription pid process Token: SeDebugPrivilege 2712 system32.exe -
Suspicious use of WriteProcessMemory 43 IoCs
Processes:
AS006-20211201.pdf.exeAS006-20211201.pdf.exeWScript.execmd.exesystem32.exesystem32.exedescription pid process target process PID 756 wrote to memory of 1816 756 AS006-20211201.pdf.exe schtasks.exe PID 756 wrote to memory of 1816 756 AS006-20211201.pdf.exe schtasks.exe PID 756 wrote to memory of 1816 756 AS006-20211201.pdf.exe schtasks.exe PID 756 wrote to memory of 4000 756 AS006-20211201.pdf.exe AS006-20211201.pdf.exe PID 756 wrote to memory of 4000 756 AS006-20211201.pdf.exe AS006-20211201.pdf.exe PID 756 wrote to memory of 4000 756 AS006-20211201.pdf.exe AS006-20211201.pdf.exe PID 756 wrote to memory of 4000 756 AS006-20211201.pdf.exe AS006-20211201.pdf.exe PID 756 wrote to memory of 4000 756 AS006-20211201.pdf.exe AS006-20211201.pdf.exe PID 756 wrote to memory of 4000 756 AS006-20211201.pdf.exe AS006-20211201.pdf.exe PID 756 wrote to memory of 4000 756 AS006-20211201.pdf.exe AS006-20211201.pdf.exe PID 756 wrote to memory of 4000 756 AS006-20211201.pdf.exe AS006-20211201.pdf.exe PID 756 wrote to memory of 4000 756 AS006-20211201.pdf.exe AS006-20211201.pdf.exe PID 756 wrote to memory of 4000 756 AS006-20211201.pdf.exe AS006-20211201.pdf.exe PID 4000 wrote to memory of 3892 4000 AS006-20211201.pdf.exe WScript.exe PID 4000 wrote to memory of 3892 4000 AS006-20211201.pdf.exe WScript.exe PID 4000 wrote to memory of 3892 4000 AS006-20211201.pdf.exe WScript.exe PID 3892 wrote to memory of 2020 3892 WScript.exe cmd.exe PID 3892 wrote to memory of 2020 3892 WScript.exe cmd.exe PID 3892 wrote to memory of 2020 3892 WScript.exe cmd.exe PID 2020 wrote to memory of 2712 2020 cmd.exe system32.exe PID 2020 wrote to memory of 2712 2020 cmd.exe system32.exe PID 2020 wrote to memory of 2712 2020 cmd.exe system32.exe PID 2712 wrote to memory of 2348 2712 system32.exe schtasks.exe PID 2712 wrote to memory of 2348 2712 system32.exe schtasks.exe PID 2712 wrote to memory of 2348 2712 system32.exe schtasks.exe PID 2712 wrote to memory of 984 2712 system32.exe system32.exe PID 2712 wrote to memory of 984 2712 system32.exe system32.exe PID 2712 wrote to memory of 984 2712 system32.exe system32.exe PID 2712 wrote to memory of 984 2712 system32.exe system32.exe PID 2712 wrote to memory of 984 2712 system32.exe system32.exe PID 2712 wrote to memory of 984 2712 system32.exe system32.exe PID 2712 wrote to memory of 984 2712 system32.exe system32.exe PID 2712 wrote to memory of 984 2712 system32.exe system32.exe PID 2712 wrote to memory of 984 2712 system32.exe system32.exe PID 2712 wrote to memory of 984 2712 system32.exe system32.exe PID 984 wrote to memory of 2172 984 system32.exe svchost.exe PID 984 wrote to memory of 2172 984 system32.exe svchost.exe PID 984 wrote to memory of 2172 984 system32.exe svchost.exe PID 984 wrote to memory of 2172 984 system32.exe svchost.exe PID 984 wrote to memory of 2172 984 system32.exe svchost.exe PID 984 wrote to memory of 2172 984 system32.exe svchost.exe PID 984 wrote to memory of 2172 984 system32.exe svchost.exe PID 984 wrote to memory of 2172 984 system32.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\AS006-20211201.pdf.exe"C:\Users\Admin\AppData\Local\Temp\AS006-20211201.pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eWtjKWNXZtIZ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2338.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\AS006-20211201.pdf.exe"C:\Users\Admin\AppData\Local\Temp\AS006-20211201.pdf.exe"2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Programs\system32.exe"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Programs\system32.exeC:\Users\Admin\AppData\Roaming\Programs\system32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eWtjKWNXZtIZ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9EF.tmp"6⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Programs\system32.exe"C:\Users\Admin\AppData\Roaming\Programs\system32.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe7⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\install.vbsMD5
139d1ffe3f418f4794b6359f239089a2
SHA1579f8d9c97105a2a77566de7e802a26e4a27f4c8
SHA2567c71958fda4cff7e2ae1d9309cd4c0143057ca52732926f640252fd5a7a9a2ca
SHA5125b806812558c28ea195326cfe800a2a41377d5e1da1fb352c2aa3d5060237a5ba544dec6f52459a9ecf55b526280c7d9c6aa8a1b8544124b288a4235eb25c2d9
-
C:\Users\Admin\AppData\Local\Temp\tmp2338.tmpMD5
b32883f82d78f841f82c8b93fe11aec4
SHA1e314e956480d2162e9d67c23fe0577318f8ce939
SHA2568a6a31f2a172f65d5d69a86091900e36f9e57fe3adbe7ff2ca5dd05d1f72347a
SHA512babea0375aa8c4875928aece9a3efc5249c15821f29c999fa6ec99cf640e492e105c5582e816561d35e22f00b2a546eebed4a48fec05dd0ef5b35d10a7c33298
-
C:\Users\Admin\AppData\Local\Temp\tmp9EF.tmpMD5
b32883f82d78f841f82c8b93fe11aec4
SHA1e314e956480d2162e9d67c23fe0577318f8ce939
SHA2568a6a31f2a172f65d5d69a86091900e36f9e57fe3adbe7ff2ca5dd05d1f72347a
SHA512babea0375aa8c4875928aece9a3efc5249c15821f29c999fa6ec99cf640e492e105c5582e816561d35e22f00b2a546eebed4a48fec05dd0ef5b35d10a7c33298
-
C:\Users\Admin\AppData\Roaming\Programs\system32.exeMD5
5b58aebe0dd52b528d61475c704dd359
SHA12297d93e6223f8b03bccdb273ed0039ba8a77bd3
SHA25643161c0778fd7277ad2d18d914e616e1ada7458ed92dff0d874fe5dd964c1975
SHA51204e8595ea0b07861d9cbbe76ef67ea4199683a5cee080b7ecf11fcab485468bcf96280e21365a163aa105fc6e09c8ca23e0a06bf95e9d0fb1a422917e39acb21
-
C:\Users\Admin\AppData\Roaming\Programs\system32.exeMD5
5b58aebe0dd52b528d61475c704dd359
SHA12297d93e6223f8b03bccdb273ed0039ba8a77bd3
SHA25643161c0778fd7277ad2d18d914e616e1ada7458ed92dff0d874fe5dd964c1975
SHA51204e8595ea0b07861d9cbbe76ef67ea4199683a5cee080b7ecf11fcab485468bcf96280e21365a163aa105fc6e09c8ca23e0a06bf95e9d0fb1a422917e39acb21
-
C:\Users\Admin\AppData\Roaming\Programs\system32.exeMD5
5b58aebe0dd52b528d61475c704dd359
SHA12297d93e6223f8b03bccdb273ed0039ba8a77bd3
SHA25643161c0778fd7277ad2d18d914e616e1ada7458ed92dff0d874fe5dd964c1975
SHA51204e8595ea0b07861d9cbbe76ef67ea4199683a5cee080b7ecf11fcab485468bcf96280e21365a163aa105fc6e09c8ca23e0a06bf95e9d0fb1a422917e39acb21
-
memory/984-18-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/984-16-0x0000000000413FA4-mapping.dmp
-
memory/1816-2-0x0000000000000000-mapping.dmp
-
memory/2020-9-0x0000000000000000-mapping.dmp
-
memory/2172-19-0x0000000000400000-0x00000000004D8000-memory.dmpFilesize
864KB
-
memory/2172-20-0x00000000004B5036-mapping.dmp
-
memory/2348-13-0x0000000000000000-mapping.dmp
-
memory/2712-10-0x0000000000000000-mapping.dmp
-
memory/3892-7-0x0000000000000000-mapping.dmp
-
memory/4000-6-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/4000-5-0x0000000000413FA4-mapping.dmp
-
memory/4000-4-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB