Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
18-01-2021 07:10
Static task
static1
Behavioral task
behavioral1
Sample
HSBC1A1B2988TT0180120_PDF.exe
Resource
win7v20201028
General
-
Target
HSBC1A1B2988TT0180120_PDF.exe
-
Size
332KB
-
MD5
ef6a60d48453d28ae1edf388b0c48354
-
SHA1
b3009ecdba328e1c87fc62f97dbb8896b6e8d966
-
SHA256
bf0e82358921791e16998b942e600a500a967f6e5c5b034a675af7e49663a34f
-
SHA512
32e952f00d1baab17be94db8df11f78457b39ff6d1f0f90b024836e4fe24d8a6e49124bea2e7726e1bc9c02c47c08c128e42150ce10a09707ad03c4f7c635542
Malware Config
Extracted
remcos
jackpiaau.duckdns.org:4902
ihechi.ddns.net:4902
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
HSBC1A1B2988TT0180120_PDF.exedescription pid process target process PID 68 set thread context of 3168 68 HSBC1A1B2988TT0180120_PDF.exe HSBC1A1B2988TT0180120_PDF.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
HSBC1A1B2988TT0180120_PDF.exeHSBC1A1B2988TT0180120_PDF.exeHSBC1A1B2988TT0180120_PDF.exeHSBC1A1B2988TT0180120_PDF.exeHSBC1A1B2988TT0180120_PDF.exepid process 4692 HSBC1A1B2988TT0180120_PDF.exe 2236 HSBC1A1B2988TT0180120_PDF.exe 3804 HSBC1A1B2988TT0180120_PDF.exe 3424 HSBC1A1B2988TT0180120_PDF.exe 68 HSBC1A1B2988TT0180120_PDF.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
HSBC1A1B2988TT0180120_PDF.execmd.exeHSBC1A1B2988TT0180120_PDF.exeHSBC1A1B2988TT0180120_PDF.exeHSBC1A1B2988TT0180120_PDF.exeHSBC1A1B2988TT0180120_PDF.exedescription pid process target process PID 4692 wrote to memory of 684 4692 HSBC1A1B2988TT0180120_PDF.exe cmd.exe PID 4692 wrote to memory of 684 4692 HSBC1A1B2988TT0180120_PDF.exe cmd.exe PID 4692 wrote to memory of 684 4692 HSBC1A1B2988TT0180120_PDF.exe cmd.exe PID 4692 wrote to memory of 760 4692 HSBC1A1B2988TT0180120_PDF.exe HSBC1A1B2988TT0180120_PDF.exe PID 4692 wrote to memory of 760 4692 HSBC1A1B2988TT0180120_PDF.exe HSBC1A1B2988TT0180120_PDF.exe PID 4692 wrote to memory of 760 4692 HSBC1A1B2988TT0180120_PDF.exe HSBC1A1B2988TT0180120_PDF.exe PID 4692 wrote to memory of 2236 4692 HSBC1A1B2988TT0180120_PDF.exe HSBC1A1B2988TT0180120_PDF.exe PID 4692 wrote to memory of 2236 4692 HSBC1A1B2988TT0180120_PDF.exe HSBC1A1B2988TT0180120_PDF.exe PID 4692 wrote to memory of 2236 4692 HSBC1A1B2988TT0180120_PDF.exe HSBC1A1B2988TT0180120_PDF.exe PID 684 wrote to memory of 3156 684 cmd.exe schtasks.exe PID 684 wrote to memory of 3156 684 cmd.exe schtasks.exe PID 684 wrote to memory of 3156 684 cmd.exe schtasks.exe PID 2236 wrote to memory of 3756 2236 HSBC1A1B2988TT0180120_PDF.exe HSBC1A1B2988TT0180120_PDF.exe PID 2236 wrote to memory of 3756 2236 HSBC1A1B2988TT0180120_PDF.exe HSBC1A1B2988TT0180120_PDF.exe PID 2236 wrote to memory of 3756 2236 HSBC1A1B2988TT0180120_PDF.exe HSBC1A1B2988TT0180120_PDF.exe PID 2236 wrote to memory of 3804 2236 HSBC1A1B2988TT0180120_PDF.exe HSBC1A1B2988TT0180120_PDF.exe PID 2236 wrote to memory of 3804 2236 HSBC1A1B2988TT0180120_PDF.exe HSBC1A1B2988TT0180120_PDF.exe PID 2236 wrote to memory of 3804 2236 HSBC1A1B2988TT0180120_PDF.exe HSBC1A1B2988TT0180120_PDF.exe PID 3804 wrote to memory of 4068 3804 HSBC1A1B2988TT0180120_PDF.exe HSBC1A1B2988TT0180120_PDF.exe PID 3804 wrote to memory of 4068 3804 HSBC1A1B2988TT0180120_PDF.exe HSBC1A1B2988TT0180120_PDF.exe PID 3804 wrote to memory of 4068 3804 HSBC1A1B2988TT0180120_PDF.exe HSBC1A1B2988TT0180120_PDF.exe PID 3804 wrote to memory of 3424 3804 HSBC1A1B2988TT0180120_PDF.exe HSBC1A1B2988TT0180120_PDF.exe PID 3804 wrote to memory of 3424 3804 HSBC1A1B2988TT0180120_PDF.exe HSBC1A1B2988TT0180120_PDF.exe PID 3804 wrote to memory of 3424 3804 HSBC1A1B2988TT0180120_PDF.exe HSBC1A1B2988TT0180120_PDF.exe PID 3424 wrote to memory of 4240 3424 HSBC1A1B2988TT0180120_PDF.exe HSBC1A1B2988TT0180120_PDF.exe PID 3424 wrote to memory of 4240 3424 HSBC1A1B2988TT0180120_PDF.exe HSBC1A1B2988TT0180120_PDF.exe PID 3424 wrote to memory of 4240 3424 HSBC1A1B2988TT0180120_PDF.exe HSBC1A1B2988TT0180120_PDF.exe PID 3424 wrote to memory of 68 3424 HSBC1A1B2988TT0180120_PDF.exe HSBC1A1B2988TT0180120_PDF.exe PID 3424 wrote to memory of 68 3424 HSBC1A1B2988TT0180120_PDF.exe HSBC1A1B2988TT0180120_PDF.exe PID 3424 wrote to memory of 68 3424 HSBC1A1B2988TT0180120_PDF.exe HSBC1A1B2988TT0180120_PDF.exe PID 68 wrote to memory of 3168 68 HSBC1A1B2988TT0180120_PDF.exe HSBC1A1B2988TT0180120_PDF.exe PID 68 wrote to memory of 3168 68 HSBC1A1B2988TT0180120_PDF.exe HSBC1A1B2988TT0180120_PDF.exe PID 68 wrote to memory of 3168 68 HSBC1A1B2988TT0180120_PDF.exe HSBC1A1B2988TT0180120_PDF.exe PID 68 wrote to memory of 3168 68 HSBC1A1B2988TT0180120_PDF.exe HSBC1A1B2988TT0180120_PDF.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\HSBC1A1B2988TT0180120_PDF.exe"C:\Users\Admin\AppData\Local\Temp\HSBC1A1B2988TT0180120_PDF.exe"1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /Create /TN name /XML "C:\Users\Admin\AppData\Local\Temp\1d4d18b3478b47539f9cc0e994589380.xml"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /TN name /XML "C:\Users\Admin\AppData\Local\Temp\1d4d18b3478b47539f9cc0e994589380.xml"3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\HSBC1A1B2988TT0180120_PDF.exe"C:\Users\Admin\AppData\Local\Temp\HSBC1A1B2988TT0180120_PDF.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\HSBC1A1B2988TT0180120_PDF.exe"C:\Users\Admin\AppData\Local\Temp\HSBC1A1B2988TT0180120_PDF.exe"2⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\HSBC1A1B2988TT0180120_PDF.exe"C:\Users\Admin\AppData\Local\Temp\HSBC1A1B2988TT0180120_PDF.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\HSBC1A1B2988TT0180120_PDF.exe"C:\Users\Admin\AppData\Local\Temp\HSBC1A1B2988TT0180120_PDF.exe"3⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\HSBC1A1B2988TT0180120_PDF.exe"C:\Users\Admin\AppData\Local\Temp\HSBC1A1B2988TT0180120_PDF.exe"4⤵
-
C:\Users\Admin\AppData\Local\Temp\HSBC1A1B2988TT0180120_PDF.exe"C:\Users\Admin\AppData\Local\Temp\HSBC1A1B2988TT0180120_PDF.exe"4⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\HSBC1A1B2988TT0180120_PDF.exe"C:\Users\Admin\AppData\Local\Temp\HSBC1A1B2988TT0180120_PDF.exe"5⤵
-
C:\Users\Admin\AppData\Local\Temp\HSBC1A1B2988TT0180120_PDF.exe"C:\Users\Admin\AppData\Local\Temp\HSBC1A1B2988TT0180120_PDF.exe"5⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\HSBC1A1B2988TT0180120_PDF.exe"C:\Users\Admin\AppData\Local\Temp\HSBC1A1B2988TT0180120_PDF.exe"6⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1d4d18b3478b47539f9cc0e994589380.xmlMD5
a36564afc14b3eb0849c01a3afdb9944
SHA14dcee9fae3fde4e46b08529bc0ba067150686f07
SHA2569d4342f763c5d62a06f69aa6fdcb1caa376ff2f2c0972f36b487f73b4d221996
SHA512782082aa36ae056734e90fc079c813dfef59420571a1b70cde4cf15eb6c870f85b2bfe0748ef4db9df3d010c08671bff744d78178ba75bf2ba02b665f044ae89
-
memory/68-8-0x0000000000000000-mapping.dmp
-
memory/684-2-0x0000000000000000-mapping.dmp
-
memory/2236-3-0x0000000000000000-mapping.dmp
-
memory/3156-4-0x0000000000000000-mapping.dmp
-
memory/3168-9-0x0000000000413FA4-mapping.dmp
-
memory/3168-10-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/3424-7-0x0000000000000000-mapping.dmp
-
memory/3804-6-0x0000000000000000-mapping.dmp