Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
19-01-2021 06:14
Static task
static1
Behavioral task
behavioral1
Sample
9d84e2e5d8e18157f7da91393112d8ad.exe
Resource
win7v20201028
General
-
Target
9d84e2e5d8e18157f7da91393112d8ad.exe
-
Size
762KB
-
MD5
9d84e2e5d8e18157f7da91393112d8ad
-
SHA1
77df25a58864a22c423d31644e635e2f075bbe87
-
SHA256
b9e467b94e968b2fb26ae2384d400eb37afd49b857644a754918d2d412eb74cc
-
SHA512
a62996b1981c87e897c0d25e14cc231c71347879024807314eb1a46d736fc1f39f9bd4220b7c8abbe35f35a3e6587659522ba6781091d4d9b0ba1c62e6159917
Malware Config
Extracted
remcos
megamoney2021.duckdns.org:26500
79.134.225.13:26500
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
update.exeupdate.exepid process 112 update.exe 1168 update.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exeupdate.exepid process 436 cmd.exe 112 update.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
9d84e2e5d8e18157f7da91393112d8ad.exeupdate.exedescription pid process target process PID 1076 set thread context of 1348 1076 9d84e2e5d8e18157f7da91393112d8ad.exe 9d84e2e5d8e18157f7da91393112d8ad.exe PID 112 set thread context of 1168 112 update.exe update.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 48 IoCs
Processes:
9d84e2e5d8e18157f7da91393112d8ad.exe9d84e2e5d8e18157f7da91393112d8ad.exeWScript.execmd.exeupdate.exedescription pid process target process PID 1076 wrote to memory of 536 1076 9d84e2e5d8e18157f7da91393112d8ad.exe schtasks.exe PID 1076 wrote to memory of 536 1076 9d84e2e5d8e18157f7da91393112d8ad.exe schtasks.exe PID 1076 wrote to memory of 536 1076 9d84e2e5d8e18157f7da91393112d8ad.exe schtasks.exe PID 1076 wrote to memory of 536 1076 9d84e2e5d8e18157f7da91393112d8ad.exe schtasks.exe PID 1076 wrote to memory of 1348 1076 9d84e2e5d8e18157f7da91393112d8ad.exe 9d84e2e5d8e18157f7da91393112d8ad.exe PID 1076 wrote to memory of 1348 1076 9d84e2e5d8e18157f7da91393112d8ad.exe 9d84e2e5d8e18157f7da91393112d8ad.exe PID 1076 wrote to memory of 1348 1076 9d84e2e5d8e18157f7da91393112d8ad.exe 9d84e2e5d8e18157f7da91393112d8ad.exe PID 1076 wrote to memory of 1348 1076 9d84e2e5d8e18157f7da91393112d8ad.exe 9d84e2e5d8e18157f7da91393112d8ad.exe PID 1076 wrote to memory of 1348 1076 9d84e2e5d8e18157f7da91393112d8ad.exe 9d84e2e5d8e18157f7da91393112d8ad.exe PID 1076 wrote to memory of 1348 1076 9d84e2e5d8e18157f7da91393112d8ad.exe 9d84e2e5d8e18157f7da91393112d8ad.exe PID 1076 wrote to memory of 1348 1076 9d84e2e5d8e18157f7da91393112d8ad.exe 9d84e2e5d8e18157f7da91393112d8ad.exe PID 1076 wrote to memory of 1348 1076 9d84e2e5d8e18157f7da91393112d8ad.exe 9d84e2e5d8e18157f7da91393112d8ad.exe PID 1076 wrote to memory of 1348 1076 9d84e2e5d8e18157f7da91393112d8ad.exe 9d84e2e5d8e18157f7da91393112d8ad.exe PID 1076 wrote to memory of 1348 1076 9d84e2e5d8e18157f7da91393112d8ad.exe 9d84e2e5d8e18157f7da91393112d8ad.exe PID 1076 wrote to memory of 1348 1076 9d84e2e5d8e18157f7da91393112d8ad.exe 9d84e2e5d8e18157f7da91393112d8ad.exe PID 1348 wrote to memory of 876 1348 9d84e2e5d8e18157f7da91393112d8ad.exe WScript.exe PID 1348 wrote to memory of 876 1348 9d84e2e5d8e18157f7da91393112d8ad.exe WScript.exe PID 1348 wrote to memory of 876 1348 9d84e2e5d8e18157f7da91393112d8ad.exe WScript.exe PID 1348 wrote to memory of 876 1348 9d84e2e5d8e18157f7da91393112d8ad.exe WScript.exe PID 876 wrote to memory of 436 876 WScript.exe cmd.exe PID 876 wrote to memory of 436 876 WScript.exe cmd.exe PID 876 wrote to memory of 436 876 WScript.exe cmd.exe PID 876 wrote to memory of 436 876 WScript.exe cmd.exe PID 436 wrote to memory of 112 436 cmd.exe update.exe PID 436 wrote to memory of 112 436 cmd.exe update.exe PID 436 wrote to memory of 112 436 cmd.exe update.exe PID 436 wrote to memory of 112 436 cmd.exe update.exe PID 436 wrote to memory of 112 436 cmd.exe update.exe PID 436 wrote to memory of 112 436 cmd.exe update.exe PID 436 wrote to memory of 112 436 cmd.exe update.exe PID 112 wrote to memory of 1332 112 update.exe schtasks.exe PID 112 wrote to memory of 1332 112 update.exe schtasks.exe PID 112 wrote to memory of 1332 112 update.exe schtasks.exe PID 112 wrote to memory of 1332 112 update.exe schtasks.exe PID 112 wrote to memory of 1168 112 update.exe update.exe PID 112 wrote to memory of 1168 112 update.exe update.exe PID 112 wrote to memory of 1168 112 update.exe update.exe PID 112 wrote to memory of 1168 112 update.exe update.exe PID 112 wrote to memory of 1168 112 update.exe update.exe PID 112 wrote to memory of 1168 112 update.exe update.exe PID 112 wrote to memory of 1168 112 update.exe update.exe PID 112 wrote to memory of 1168 112 update.exe update.exe PID 112 wrote to memory of 1168 112 update.exe update.exe PID 112 wrote to memory of 1168 112 update.exe update.exe PID 112 wrote to memory of 1168 112 update.exe update.exe PID 112 wrote to memory of 1168 112 update.exe update.exe PID 112 wrote to memory of 1168 112 update.exe update.exe PID 112 wrote to memory of 1168 112 update.exe update.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d84e2e5d8e18157f7da91393112d8ad.exe"C:\Users\Admin\AppData\Local\Temp\9d84e2e5d8e18157f7da91393112d8ad.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NGFtet" /XML "C:\Users\Admin\AppData\Local\Temp\tmp22CC.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\9d84e2e5d8e18157f7da91393112d8ad.exe"C:\Users\Admin\AppData\Local\Temp\9d84e2e5d8e18157f7da91393112d8ad.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\windows\update.exe"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\windows\update.exeC:\Users\Admin\AppData\Roaming\windows\update.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NGFtet" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3218.tmp"6⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\windows\update.exe"C:\Users\Admin\AppData\Roaming\windows\update.exe"6⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\install.vbsMD5
8316548aa6ceaadc4f077d47d9391c61
SHA116c2a0ce8400c559db5873566056fb2f39a76a94
SHA256b020536ab98017ec5f284bdf59d2c39e1731af44960dc89eb72223556a41885a
SHA51275ec0760b8af5cd0b75e2d7147abc32b329a82d395712173def311d14d7d3f8caef8eba50e807357c54b93c86f4c24c999950f0bbce13b1bcb71854ecf2a09ed
-
C:\Users\Admin\AppData\Local\Temp\tmp22CC.tmpMD5
f4a99a881c0bbe2e84ed7aeb4b821a46
SHA186cc06baadb65d5094cea4caac107e9f4679ae8f
SHA25644b4eeb608cd4eb7fdf98f64f2e03fe0f20d6f56b1a84aadfc2e0686f316a5c4
SHA512ff5b0db7f63edba2d95bf159437a7eaf308bab75efc0bb9b22dbfda321927c65234a2cea48ccc2b8b657c8d9fdce41a033a05e8608315ffe883996ba773a5f99
-
C:\Users\Admin\AppData\Local\Temp\tmp3218.tmpMD5
f4a99a881c0bbe2e84ed7aeb4b821a46
SHA186cc06baadb65d5094cea4caac107e9f4679ae8f
SHA25644b4eeb608cd4eb7fdf98f64f2e03fe0f20d6f56b1a84aadfc2e0686f316a5c4
SHA512ff5b0db7f63edba2d95bf159437a7eaf308bab75efc0bb9b22dbfda321927c65234a2cea48ccc2b8b657c8d9fdce41a033a05e8608315ffe883996ba773a5f99
-
C:\Users\Admin\AppData\Roaming\windows\update.exeMD5
9d84e2e5d8e18157f7da91393112d8ad
SHA177df25a58864a22c423d31644e635e2f075bbe87
SHA256b9e467b94e968b2fb26ae2384d400eb37afd49b857644a754918d2d412eb74cc
SHA512a62996b1981c87e897c0d25e14cc231c71347879024807314eb1a46d736fc1f39f9bd4220b7c8abbe35f35a3e6587659522ba6781091d4d9b0ba1c62e6159917
-
C:\Users\Admin\AppData\Roaming\windows\update.exeMD5
9d84e2e5d8e18157f7da91393112d8ad
SHA177df25a58864a22c423d31644e635e2f075bbe87
SHA256b9e467b94e968b2fb26ae2384d400eb37afd49b857644a754918d2d412eb74cc
SHA512a62996b1981c87e897c0d25e14cc231c71347879024807314eb1a46d736fc1f39f9bd4220b7c8abbe35f35a3e6587659522ba6781091d4d9b0ba1c62e6159917
-
C:\Users\Admin\AppData\Roaming\windows\update.exeMD5
9d84e2e5d8e18157f7da91393112d8ad
SHA177df25a58864a22c423d31644e635e2f075bbe87
SHA256b9e467b94e968b2fb26ae2384d400eb37afd49b857644a754918d2d412eb74cc
SHA512a62996b1981c87e897c0d25e14cc231c71347879024807314eb1a46d736fc1f39f9bd4220b7c8abbe35f35a3e6587659522ba6781091d4d9b0ba1c62e6159917
-
\Users\Admin\AppData\Roaming\windows\update.exeMD5
9d84e2e5d8e18157f7da91393112d8ad
SHA177df25a58864a22c423d31644e635e2f075bbe87
SHA256b9e467b94e968b2fb26ae2384d400eb37afd49b857644a754918d2d412eb74cc
SHA512a62996b1981c87e897c0d25e14cc231c71347879024807314eb1a46d736fc1f39f9bd4220b7c8abbe35f35a3e6587659522ba6781091d4d9b0ba1c62e6159917
-
\Users\Admin\AppData\Roaming\windows\update.exeMD5
9d84e2e5d8e18157f7da91393112d8ad
SHA177df25a58864a22c423d31644e635e2f075bbe87
SHA256b9e467b94e968b2fb26ae2384d400eb37afd49b857644a754918d2d412eb74cc
SHA512a62996b1981c87e897c0d25e14cc231c71347879024807314eb1a46d736fc1f39f9bd4220b7c8abbe35f35a3e6587659522ba6781091d4d9b0ba1c62e6159917
-
memory/112-26-0x0000000001360000-0x0000000001361000-memory.dmpFilesize
4KB
-
memory/112-24-0x00000000013C0000-0x00000000013C1000-memory.dmpFilesize
4KB
-
memory/112-23-0x0000000074C70000-0x000000007535E000-memory.dmpFilesize
6.9MB
-
memory/112-21-0x0000000000000000-mapping.dmp
-
memory/436-17-0x0000000000000000-mapping.dmp
-
memory/536-8-0x0000000000000000-mapping.dmp
-
memory/876-18-0x0000000002750000-0x0000000002754000-memory.dmpFilesize
16KB
-
memory/876-13-0x0000000000000000-mapping.dmp
-
memory/1076-5-0x0000000004EE0000-0x0000000004EE1000-memory.dmpFilesize
4KB
-
memory/1076-7-0x00000000050D0000-0x000000000512D000-memory.dmpFilesize
372KB
-
memory/1076-6-0x00000000003D0000-0x00000000003E2000-memory.dmpFilesize
72KB
-
memory/1076-2-0x0000000074CF0000-0x00000000753DE000-memory.dmpFilesize
6.9MB
-
memory/1076-3-0x00000000008E0000-0x00000000008E1000-memory.dmpFilesize
4KB
-
memory/1168-33-0x0000000000413FA4-mapping.dmp
-
memory/1168-36-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/1332-29-0x0000000000000000-mapping.dmp
-
memory/1348-15-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/1348-12-0x0000000075711000-0x0000000075713000-memory.dmpFilesize
8KB
-
memory/1348-11-0x0000000000413FA4-mapping.dmp
-
memory/1348-10-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB