Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
13-01-2021 07:38
Static task
static1
Behavioral task
behavioral1
Sample
SC30003983763.exe
Resource
win7v20201028
General
-
Target
SC30003983763.exe
-
Size
492KB
-
MD5
ed0657c7ee885752cc36859ac8c4f7f9
-
SHA1
9fd613617dd96e689472575dae56c5497dbf3348
-
SHA256
aea8b826c919840c0757bde7e31b915fda0439bd28b10418479aa17c53f91e12
-
SHA512
69eae75cd1463ca50fc434843ba3558c014b57394de813f1993b418af349c9769ba23d29dfa7877f615495f525ba242beb8ea0f2faaf0cf4afc35db5dc550827
Malware Config
Extracted
remcos
79.134.225.72:32765
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
SC30003983763.exedescription pid process target process PID 508 set thread context of 3824 508 SC30003983763.exe SC30003983763.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
SC30003983763.exepid process 508 SC30003983763.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
SC30003983763.exepid process 3824 SC30003983763.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
SC30003983763.execmd.exeSC30003983763.exedescription pid process target process PID 508 wrote to memory of 1528 508 SC30003983763.exe cmd.exe PID 508 wrote to memory of 1528 508 SC30003983763.exe cmd.exe PID 508 wrote to memory of 1528 508 SC30003983763.exe cmd.exe PID 508 wrote to memory of 3824 508 SC30003983763.exe SC30003983763.exe PID 508 wrote to memory of 3824 508 SC30003983763.exe SC30003983763.exe PID 508 wrote to memory of 3824 508 SC30003983763.exe SC30003983763.exe PID 508 wrote to memory of 3824 508 SC30003983763.exe SC30003983763.exe PID 1528 wrote to memory of 3212 1528 cmd.exe schtasks.exe PID 1528 wrote to memory of 3212 1528 cmd.exe schtasks.exe PID 1528 wrote to memory of 3212 1528 cmd.exe schtasks.exe PID 3824 wrote to memory of 208 3824 SC30003983763.exe svchost.exe PID 3824 wrote to memory of 208 3824 SC30003983763.exe svchost.exe PID 3824 wrote to memory of 208 3824 SC30003983763.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SC30003983763.exe"C:\Users\Admin\AppData\Local\Temp\SC30003983763.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:508 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /Create /TN rembyname /XML "C:\Users\Admin\AppData\Local\Temp\be66102cee3d44508fbecb04dfa1cfea.xml"2⤵
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /TN rembyname /XML "C:\Users\Admin\AppData\Local\Temp\be66102cee3d44508fbecb04dfa1cfea.xml"3⤵
- Creates scheduled task(s)
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\SC30003983763.exe"C:\Users\Admin\AppData\Local\Temp\SC30003983763.exe"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:208
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\be66102cee3d44508fbecb04dfa1cfea.xmlMD5
ca5298a98c2b74380f1319953211713b
SHA199990aa98f57c7c6ece90ae741ae1dc53486d6e5
SHA256fa4c13ec864f24a5aacd6d462e9d6ed3838920eb6cc9eda2a212b5b27d8ee946
SHA512377a2b0d8476b4b1a20f8f656d969232f2308338ff4f440ca3faad00029d74cbfbca56df427b539de3c3aa7e29ac9caffbdb9ad01404a881f107342fa4be5e19
-
memory/1528-2-0x0000000000000000-mapping.dmp
-
memory/3212-7-0x0000000000000000-mapping.dmp
-
memory/3824-3-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/3824-4-0x0000000000413FA4-mapping.dmp
-
memory/3824-6-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB