Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
18-01-2021 15:13
Static task
static1
Behavioral task
behavioral1
Sample
originalcopy2021_pdf.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
originalcopy2021_pdf.exe
-
Size
845KB
-
MD5
96038a49c8581a2e6c32b9f87c781c68
-
SHA1
3a9a2ceceafd02a16c5e76674007973b8d34a71a
-
SHA256
2a451883bcabf318c2d3acc4b2259716c744a76cda9a68b5798dfc157f94e8cb
-
SHA512
ce2eaa5f871ab0ce7f72493e9df1c4feccd994bca46fef3b6fdfd7e34531a729e64e725159de905854414eaa739dafce10355abbfd2b3bf3266cedd824e731bc
Malware Config
Extracted
Family
remcos
C2
96.9.246.149:2024
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
originalcopy2021_pdf.exedescription pid process target process PID 860 set thread context of 2984 860 originalcopy2021_pdf.exe originalcopy2021_pdf.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
originalcopy2021_pdf.exepid process 860 originalcopy2021_pdf.exe 860 originalcopy2021_pdf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
originalcopy2021_pdf.exedescription pid process Token: SeDebugPrivilege 860 originalcopy2021_pdf.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
originalcopy2021_pdf.exedescription pid process target process PID 860 wrote to memory of 3856 860 originalcopy2021_pdf.exe originalcopy2021_pdf.exe PID 860 wrote to memory of 3856 860 originalcopy2021_pdf.exe originalcopy2021_pdf.exe PID 860 wrote to memory of 3856 860 originalcopy2021_pdf.exe originalcopy2021_pdf.exe PID 860 wrote to memory of 2984 860 originalcopy2021_pdf.exe originalcopy2021_pdf.exe PID 860 wrote to memory of 2984 860 originalcopy2021_pdf.exe originalcopy2021_pdf.exe PID 860 wrote to memory of 2984 860 originalcopy2021_pdf.exe originalcopy2021_pdf.exe PID 860 wrote to memory of 2984 860 originalcopy2021_pdf.exe originalcopy2021_pdf.exe PID 860 wrote to memory of 2984 860 originalcopy2021_pdf.exe originalcopy2021_pdf.exe PID 860 wrote to memory of 2984 860 originalcopy2021_pdf.exe originalcopy2021_pdf.exe PID 860 wrote to memory of 2984 860 originalcopy2021_pdf.exe originalcopy2021_pdf.exe PID 860 wrote to memory of 2984 860 originalcopy2021_pdf.exe originalcopy2021_pdf.exe PID 860 wrote to memory of 2984 860 originalcopy2021_pdf.exe originalcopy2021_pdf.exe PID 860 wrote to memory of 2984 860 originalcopy2021_pdf.exe originalcopy2021_pdf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\originalcopy2021_pdf.exe"C:\Users\Admin\AppData\Local\Temp\originalcopy2021_pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\originalcopy2021_pdf.exe"C:\Users\Admin\AppData\Local\Temp\originalcopy2021_pdf.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\originalcopy2021_pdf.exe"C:\Users\Admin\AppData\Local\Temp\originalcopy2021_pdf.exe"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/860-2-0x0000000074070000-0x000000007475E000-memory.dmpFilesize
6.9MB
-
memory/860-3-0x0000000000D10000-0x0000000000D11000-memory.dmpFilesize
4KB
-
memory/860-5-0x0000000005770000-0x0000000005771000-memory.dmpFilesize
4KB
-
memory/860-6-0x0000000005D10000-0x0000000005D11000-memory.dmpFilesize
4KB
-
memory/860-7-0x00000000058B0000-0x00000000058B1000-memory.dmpFilesize
4KB
-
memory/860-8-0x0000000005740000-0x0000000005741000-memory.dmpFilesize
4KB
-
memory/860-9-0x0000000005A10000-0x0000000005A11000-memory.dmpFilesize
4KB
-
memory/860-10-0x0000000005720000-0x0000000005721000-memory.dmpFilesize
4KB
-
memory/860-11-0x0000000005850000-0x0000000005862000-memory.dmpFilesize
72KB
-
memory/860-12-0x0000000005C50000-0x0000000005CA8000-memory.dmpFilesize
352KB
-
memory/2984-13-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/2984-14-0x0000000000413FA4-mapping.dmp
-
memory/2984-15-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB