Analysis
-
max time kernel
142s -
max time network
129s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
20-04-2021 12:20
Static task
static1
Behavioral task
behavioral1
Sample
10a4a298243992f740dcdc8431daea3b.exe
Resource
win7v20210410
General
-
Target
10a4a298243992f740dcdc8431daea3b.exe
-
Size
739KB
-
MD5
10a4a298243992f740dcdc8431daea3b
-
SHA1
93fb528724a458ecd86edb8e6dd4413dec098caa
-
SHA256
84035c7dd4f195653fd4dec1538e98f9181c74b8eebf9d6415d5cee1616c400c
-
SHA512
2c055048c69be6ee9038566616600936fff3d5c72e97f0c53e3f5c928d63810f70ee966baa9f77c34e4da767336d0581f5e48a1261fd819da5a511a62c949bf0
Malware Config
Extracted
remcos
arttronova124.duckdns.org:3030
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 3 IoCs
Processes:
10a4a298243992f740dcdc8431daea3b.exe10a4a298243992f740dcdc8431daea3b.exedescription pid process target process PID 648 set thread context of 2184 648 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 2184 set thread context of 3560 2184 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 2184 set thread context of 3880 2184 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
10a4a298243992f740dcdc8431daea3b.exepid process 3560 10a4a298243992f740dcdc8431daea3b.exe 3560 10a4a298243992f740dcdc8431daea3b.exe 3560 10a4a298243992f740dcdc8431daea3b.exe 3560 10a4a298243992f740dcdc8431daea3b.exe 3560 10a4a298243992f740dcdc8431daea3b.exe 3560 10a4a298243992f740dcdc8431daea3b.exe 3560 10a4a298243992f740dcdc8431daea3b.exe 3560 10a4a298243992f740dcdc8431daea3b.exe 3560 10a4a298243992f740dcdc8431daea3b.exe 3560 10a4a298243992f740dcdc8431daea3b.exe 3560 10a4a298243992f740dcdc8431daea3b.exe 3560 10a4a298243992f740dcdc8431daea3b.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
10a4a298243992f740dcdc8431daea3b.exepid process 2184 10a4a298243992f740dcdc8431daea3b.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
10a4a298243992f740dcdc8431daea3b.exepid process 2184 10a4a298243992f740dcdc8431daea3b.exe -
Suspicious use of WriteProcessMemory 46 IoCs
Processes:
10a4a298243992f740dcdc8431daea3b.exe10a4a298243992f740dcdc8431daea3b.execmd.exedescription pid process target process PID 648 wrote to memory of 2184 648 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 648 wrote to memory of 2184 648 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 648 wrote to memory of 2184 648 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 648 wrote to memory of 2184 648 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 648 wrote to memory of 2184 648 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 648 wrote to memory of 2184 648 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 648 wrote to memory of 2184 648 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 648 wrote to memory of 2184 648 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 648 wrote to memory of 2184 648 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 2184 wrote to memory of 1332 2184 10a4a298243992f740dcdc8431daea3b.exe cmd.exe PID 2184 wrote to memory of 1332 2184 10a4a298243992f740dcdc8431daea3b.exe cmd.exe PID 2184 wrote to memory of 1332 2184 10a4a298243992f740dcdc8431daea3b.exe cmd.exe PID 2184 wrote to memory of 3296 2184 10a4a298243992f740dcdc8431daea3b.exe iexplore.exe PID 2184 wrote to memory of 3296 2184 10a4a298243992f740dcdc8431daea3b.exe iexplore.exe PID 2184 wrote to memory of 3296 2184 10a4a298243992f740dcdc8431daea3b.exe iexplore.exe PID 1332 wrote to memory of 1336 1332 cmd.exe reg.exe PID 1332 wrote to memory of 1336 1332 cmd.exe reg.exe PID 1332 wrote to memory of 1336 1332 cmd.exe reg.exe PID 2184 wrote to memory of 3560 2184 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 2184 wrote to memory of 3560 2184 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 2184 wrote to memory of 3560 2184 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 2184 wrote to memory of 3560 2184 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 2184 wrote to memory of 3560 2184 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 2184 wrote to memory of 3560 2184 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 2184 wrote to memory of 3560 2184 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 2184 wrote to memory of 3560 2184 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 2184 wrote to memory of 3692 2184 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 2184 wrote to memory of 3692 2184 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 2184 wrote to memory of 3692 2184 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 2184 wrote to memory of 3880 2184 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 2184 wrote to memory of 3880 2184 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 2184 wrote to memory of 3880 2184 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 2184 wrote to memory of 3880 2184 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 2184 wrote to memory of 3880 2184 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 2184 wrote to memory of 3880 2184 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 2184 wrote to memory of 3880 2184 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 2184 wrote to memory of 3880 2184 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 2184 wrote to memory of 2204 2184 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 2184 wrote to memory of 2204 2184 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 2184 wrote to memory of 2204 2184 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 2184 wrote to memory of 2156 2184 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 2184 wrote to memory of 2156 2184 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 2184 wrote to memory of 2156 2184 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 2184 wrote to memory of 2464 2184 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 2184 wrote to memory of 2464 2184 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 2184 wrote to memory of 2464 2184 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\10a4a298243992f740dcdc8431daea3b.exe"C:\Users\Admin\AppData\Local\Temp\10a4a298243992f740dcdc8431daea3b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\10a4a298243992f740dcdc8431daea3b.exe"{path}"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- Modifies registry key
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\10a4a298243992f740dcdc8431daea3b.exeC:\Users\Admin\AppData\Local\Temp\10a4a298243992f740dcdc8431daea3b.exe /stext "C:\Users\Admin\AppData\Local\Temp\iuqdwqckttzwntoqghgeayaqspq"3⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\10a4a298243992f740dcdc8431daea3b.exeC:\Users\Admin\AppData\Local\Temp\10a4a298243992f740dcdc8431daea3b.exe /stext "C:\Users\Admin\AppData\Local\Temp\lowwxjnmhbrbyzcupraflduztwamfk"3⤵
-
C:\Users\Admin\AppData\Local\Temp\10a4a298243992f740dcdc8431daea3b.exeC:\Users\Admin\AppData\Local\Temp\10a4a298243992f740dcdc8431daea3b.exe /stext "C:\Users\Admin\AppData\Local\Temp\vqbhxbyfvjjganqyzcnhoqpqccrnynpcgf"3⤵
-
C:\Users\Admin\AppData\Local\Temp\10a4a298243992f740dcdc8431daea3b.exeC:\Users\Admin\AppData\Local\Temp\10a4a298243992f740dcdc8431daea3b.exe /stext "C:\Users\Admin\AppData\Local\Temp\ugyirzpeklkfaw"3⤵
-
C:\Users\Admin\AppData\Local\Temp\10a4a298243992f740dcdc8431daea3b.exeC:\Users\Admin\AppData\Local\Temp\10a4a298243992f740dcdc8431daea3b.exe /stext "C:\Users\Admin\AppData\Local\Temp\xjebsjaygtcklcksc"3⤵
-
C:\Users\Admin\AppData\Local\Temp\10a4a298243992f740dcdc8431daea3b.exeC:\Users\Admin\AppData\Local\Temp\10a4a298243992f740dcdc8431daea3b.exe /stext "C:\Users\Admin\AppData\Local\Temp\hdjtsckzubupnigelzbhs"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\iuqdwqckttzwntoqghgeayaqspqMD5
b2a343ffbe155a567d2d4e189dabb9f7
SHA1c207b489395cdd2a9e4883ffef0447ea0390d194
SHA256b03395166926f6d79c2141ce91af03b2cadd28eb87c181573956a25ff6df45ad
SHA512306b357b6bb8ea7c71a50c681f199855d84ea1bf02e312841e5061d0b388d72620a102f3a545735bb9072c8697ae5bbd0a779a7e651886e6b6f8430127f17e50
-
memory/648-116-0x0000000007F10000-0x0000000007F11000-memory.dmpFilesize
4KB
-
memory/648-117-0x0000000007AB0000-0x0000000007AB1000-memory.dmpFilesize
4KB
-
memory/648-118-0x0000000007A10000-0x0000000007F0E000-memory.dmpFilesize
5.0MB
-
memory/648-119-0x0000000007A80000-0x0000000007A81000-memory.dmpFilesize
4KB
-
memory/648-120-0x0000000004FE0000-0x0000000004FE5000-memory.dmpFilesize
20KB
-
memory/648-121-0x000000000B150000-0x000000000B151000-memory.dmpFilesize
4KB
-
memory/648-122-0x000000000B0B0000-0x000000000B144000-memory.dmpFilesize
592KB
-
memory/648-123-0x0000000009830000-0x0000000009878000-memory.dmpFilesize
288KB
-
memory/648-114-0x0000000000B80000-0x0000000000B81000-memory.dmpFilesize
4KB
-
memory/1332-126-0x0000000000000000-mapping.dmp
-
memory/1336-127-0x0000000000000000-mapping.dmp
-
memory/2184-125-0x000000000040FD88-mapping.dmp
-
memory/2184-128-0x0000000000400000-0x0000000000418000-memory.dmpFilesize
96KB
-
memory/2184-124-0x0000000000400000-0x0000000000418000-memory.dmpFilesize
96KB
-
memory/3560-129-0x0000000000400000-0x0000000000457000-memory.dmpFilesize
348KB
-
memory/3560-130-0x0000000000455274-mapping.dmp
-
memory/3560-134-0x0000000000400000-0x0000000000457000-memory.dmpFilesize
348KB
-
memory/3880-131-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3880-132-0x000000000041C238-mapping.dmp
-
memory/3880-133-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB