Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
13-04-2021 18:23
Static task
static1
Behavioral task
behavioral1
Sample
ShippingDoc.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
ShippingDoc.exe
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
ShippingDoc.exe
-
Size
831KB
-
MD5
ff5098c6521717d54914919b3ccfa844
-
SHA1
24a79eaf402211e3fa16588b14d8ee10482e13e0
-
SHA256
2fde996ea514f77000c3c0b10b5587866e644346030c4535e122d93b5cf940da
-
SHA512
1e31e107fe588507392e5e79263ff5d922429dcc38ab571aef33eadcc2500ea44a03ac5bb35eaaceb6ec0847c82e89f5f1a84ff61df0f108bdb2bd048a487300
Score
10/10
Malware Config
Extracted
Family
remcos
C2
79.134.225.19:2555
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
ShippingDoc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\Biwmcd = "C:\\Users\\Public\\Libraries\\dcmwiB.url" ShippingDoc.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
ShippingDoc.exedescription ioc process File opened (read-only) \??\R: ShippingDoc.exe File opened (read-only) \??\S: ShippingDoc.exe File opened (read-only) \??\U: ShippingDoc.exe File opened (read-only) \??\Z: ShippingDoc.exe File opened (read-only) \??\F: ShippingDoc.exe File opened (read-only) \??\G: ShippingDoc.exe File opened (read-only) \??\K: ShippingDoc.exe File opened (read-only) \??\L: ShippingDoc.exe File opened (read-only) \??\X: ShippingDoc.exe File opened (read-only) \??\A: ShippingDoc.exe File opened (read-only) \??\E: ShippingDoc.exe File opened (read-only) \??\J: ShippingDoc.exe File opened (read-only) \??\V: ShippingDoc.exe File opened (read-only) \??\Y: ShippingDoc.exe File opened (read-only) \??\H: ShippingDoc.exe File opened (read-only) \??\P: ShippingDoc.exe File opened (read-only) \??\T: ShippingDoc.exe File opened (read-only) \??\W: ShippingDoc.exe File opened (read-only) \??\O: ShippingDoc.exe File opened (read-only) \??\Q: ShippingDoc.exe File opened (read-only) \??\B: ShippingDoc.exe File opened (read-only) \??\I: ShippingDoc.exe File opened (read-only) \??\M: ShippingDoc.exe File opened (read-only) \??\N: ShippingDoc.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
ShippingDoc.exedescription pid process target process PID 3876 wrote to memory of 3288 3876 ShippingDoc.exe DpiScaling.exe PID 3876 wrote to memory of 3288 3876 ShippingDoc.exe DpiScaling.exe PID 3876 wrote to memory of 3288 3876 ShippingDoc.exe DpiScaling.exe PID 3876 wrote to memory of 3288 3876 ShippingDoc.exe DpiScaling.exe PID 3876 wrote to memory of 3288 3876 ShippingDoc.exe DpiScaling.exe PID 3876 wrote to memory of 3288 3876 ShippingDoc.exe DpiScaling.exe PID 3876 wrote to memory of 3288 3876 ShippingDoc.exe DpiScaling.exe PID 3876 wrote to memory of 3288 3876 ShippingDoc.exe DpiScaling.exe PID 3876 wrote to memory of 3288 3876 ShippingDoc.exe DpiScaling.exe PID 3876 wrote to memory of 3288 3876 ShippingDoc.exe DpiScaling.exe PID 3876 wrote to memory of 3288 3876 ShippingDoc.exe DpiScaling.exe PID 3876 wrote to memory of 3288 3876 ShippingDoc.exe DpiScaling.exe PID 3876 wrote to memory of 3288 3876 ShippingDoc.exe DpiScaling.exe PID 3876 wrote to memory of 3288 3876 ShippingDoc.exe DpiScaling.exe PID 3876 wrote to memory of 3288 3876 ShippingDoc.exe DpiScaling.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ShippingDoc.exe"C:\Users\Admin\AppData\Local\Temp\ShippingDoc.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\DpiScaling.exeC:\Windows\System32\DpiScaling.exe2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3288-119-0x0000000000000000-mapping.dmp
-
memory/3288-121-0x0000000003350000-0x0000000003351000-memory.dmpFilesize
4KB
-
memory/3288-120-0x0000000003290000-0x0000000003291000-memory.dmpFilesize
4KB
-
memory/3288-123-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/3288-125-0x0000000000400000-0x0000000000479000-memory.dmpFilesize
484KB
-
memory/3288-124-0x0000000010590000-0x000000001060C000-memory.dmpFilesize
496KB
-
memory/3876-114-0x0000000000640000-0x0000000000641000-memory.dmpFilesize
4KB
-
memory/3876-116-0x0000000002420000-0x000000000243A000-memory.dmpFilesize
104KB