Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
23-04-2021 13:12
Static task
static1
Behavioral task
behavioral1
Sample
doc07621220210416113300.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
doc07621220210416113300.exe
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
doc07621220210416113300.exe
-
Size
611KB
-
MD5
86a60c76f4734d8e5e664d4296b05d23
-
SHA1
bbd8bfae7c2449915d071899300aeb3de5030464
-
SHA256
1dc132d54524bfd99e713b47052ec9fc2a59fcbb46d70c732426cf228446e17e
-
SHA512
8ac001844e94a5bac88d3abf6f5a1d6a904d0443e29e78c9b41ab7b2f06995ea2a4d78d9829f61467ec2217c2db51b8dc33abda4caab7712c0dbebbb022ffd68
Score
10/10
Malware Config
Extracted
Family
remcos
C2
www.pakchoob.me:2404
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
doc07621220210416113300.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\Gpnjtw = "C:\\Users\\Public\\Libraries\\wtjnpG.url" doc07621220210416113300.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
doc07621220210416113300.exedescription pid process target process PID 4048 set thread context of 2932 4048 doc07621220210416113300.exe doc07621220210416113300.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
doc07621220210416113300.exepid process 2932 doc07621220210416113300.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
doc07621220210416113300.exedescription pid process target process PID 4048 wrote to memory of 2932 4048 doc07621220210416113300.exe doc07621220210416113300.exe PID 4048 wrote to memory of 2932 4048 doc07621220210416113300.exe doc07621220210416113300.exe PID 4048 wrote to memory of 2932 4048 doc07621220210416113300.exe doc07621220210416113300.exe PID 4048 wrote to memory of 2932 4048 doc07621220210416113300.exe doc07621220210416113300.exe PID 4048 wrote to memory of 2932 4048 doc07621220210416113300.exe doc07621220210416113300.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\doc07621220210416113300.exe"C:\Users\Admin\AppData\Local\Temp\doc07621220210416113300.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\doc07621220210416113300.exeC:\Users\Admin\AppData\Local\Temp\doc07621220210416113300.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:2932