Analysis
-
max time kernel
153s -
max time network
158s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
07-05-2021 13:02
Static task
static1
Behavioral task
behavioral1
Sample
Statement of Account April-2021.exe
Resource
win7v20210408
General
-
Target
Statement of Account April-2021.exe
-
Size
1.4MB
-
MD5
384e5af70000fb658251d79ddf8e8878
-
SHA1
a2bafce0284f457eafd3dcbed73adeb84ed762df
-
SHA256
98e5d25243d03b80cc83c955796c42b39f308f55102a9ec01d0f308e06b4cfa9
-
SHA512
28ebd09467fa0781dc3c8a33ea24cb642ecfbcd56fd859c74590773147a45861752446501afc83e441d90507509de4b2b707a5e9b96531ae3a0358ed1ec76e9a
Malware Config
Extracted
remcos
45.137.22.107:5888
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
svchost.exepid process 1712 svchost.exe -
Loads dropped DLL 1 IoCs
Processes:
Statement of Account April-2021.exepid process 1304 Statement of Account April-2021.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/1304-64-0x0000000001380000-0x00000000013A1000-memory.dmp agile_net -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Statement of Account April-2021.exedescription pid process target process PID 1304 set thread context of 1712 1304 Statement of Account April-2021.exe svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Statement of Account April-2021.exepid process 1304 Statement of Account April-2021.exe 1304 Statement of Account April-2021.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Statement of Account April-2021.exedescription pid process Token: SeDebugPrivilege 1304 Statement of Account April-2021.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
Statement of Account April-2021.exedescription pid process target process PID 1304 wrote to memory of 1712 1304 Statement of Account April-2021.exe svchost.exe PID 1304 wrote to memory of 1712 1304 Statement of Account April-2021.exe svchost.exe PID 1304 wrote to memory of 1712 1304 Statement of Account April-2021.exe svchost.exe PID 1304 wrote to memory of 1712 1304 Statement of Account April-2021.exe svchost.exe PID 1304 wrote to memory of 1712 1304 Statement of Account April-2021.exe svchost.exe PID 1304 wrote to memory of 1712 1304 Statement of Account April-2021.exe svchost.exe PID 1304 wrote to memory of 1712 1304 Statement of Account April-2021.exe svchost.exe PID 1304 wrote to memory of 1712 1304 Statement of Account April-2021.exe svchost.exe PID 1304 wrote to memory of 1712 1304 Statement of Account April-2021.exe svchost.exe PID 1304 wrote to memory of 1712 1304 Statement of Account April-2021.exe svchost.exe PID 1304 wrote to memory of 1712 1304 Statement of Account April-2021.exe svchost.exe PID 1304 wrote to memory of 1712 1304 Statement of Account April-2021.exe svchost.exe PID 1304 wrote to memory of 1712 1304 Statement of Account April-2021.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Statement of Account April-2021.exe"C:\Users\Admin\AppData\Local\Temp\Statement of Account April-2021.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeMD5
54a47f6b5e09a77e61649109c6a08866
SHA14af001b3c3816b860660cf2de2c0fd3c1dfb4878
SHA256121118a0f5e0e8c933efd28c9901e54e42792619a8a3a6d11e1f0025a7324bc2
SHA51288ee0ef5af1b0b38c19ab4c307636352fc403ea74f3bfb17e246f7fd815ac042183086133cd9fe805bd47e15854776871bb7d384e419862c91503eeb82bfb419
-
\Users\Admin\AppData\Local\Temp\svchost.exeMD5
54a47f6b5e09a77e61649109c6a08866
SHA14af001b3c3816b860660cf2de2c0fd3c1dfb4878
SHA256121118a0f5e0e8c933efd28c9901e54e42792619a8a3a6d11e1f0025a7324bc2
SHA51288ee0ef5af1b0b38c19ab4c307636352fc403ea74f3bfb17e246f7fd815ac042183086133cd9fe805bd47e15854776871bb7d384e419862c91503eeb82bfb419
-
memory/1304-60-0x00000000013C0000-0x00000000013C1000-memory.dmpFilesize
4KB
-
memory/1304-62-0x0000000004BD0000-0x0000000004BD1000-memory.dmpFilesize
4KB
-
memory/1304-64-0x0000000001380000-0x00000000013A1000-memory.dmpFilesize
132KB
-
memory/1304-65-0x0000000004BD1000-0x0000000004BD2000-memory.dmpFilesize
4KB
-
memory/1304-66-0x0000000000A70000-0x0000000000A7B000-memory.dmpFilesize
44KB
-
memory/1304-67-0x0000000000C00000-0x0000000000C01000-memory.dmpFilesize
4KB
-
memory/1712-69-0x0000000000400000-0x0000000000478000-memory.dmpFilesize
480KB
-
memory/1712-70-0x000000000042EEEF-mapping.dmp
-
memory/1712-72-0x0000000075AD1000-0x0000000075AD3000-memory.dmpFilesize
8KB
-
memory/1712-73-0x0000000000400000-0x0000000000478000-memory.dmpFilesize
480KB