Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
22-07-2021 09:06
Static task
static1
Behavioral task
behavioral1
Sample
Shipping_Document.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
Shipping_Document.exe
-
Size
736KB
-
MD5
8809c7cab903669b1da338f39327a7c3
-
SHA1
7b19e931f2ab478e1189431a216f1cc2c9b43d8d
-
SHA256
86fffe8373d8bbcc79e4105465a3775bb9a2b4d35fb47961ab6173558bfeda14
-
SHA512
33bfbfd4729fb6ed94e27f323c668c92e7c1394e4628e236e16fff0bee0df0644ca29e666679e7a8b92cf077267aeff43bbf5c35e57d68ee80d11956cb246cac
Malware Config
Extracted
Family
remcos
Botnet
Young
C2
june248.ddns.net:3759
Attributes
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-4GJ3Q1
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
notepad;solitaire;
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2124 508 WerFault.exe Shipping_Document.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
Processes:
WerFault.exepid process 2124 WerFault.exe 2124 WerFault.exe 2124 WerFault.exe 2124 WerFault.exe 2124 WerFault.exe 2124 WerFault.exe 2124 WerFault.exe 2124 WerFault.exe 2124 WerFault.exe 2124 WerFault.exe 2124 WerFault.exe 2124 WerFault.exe 2124 WerFault.exe 2124 WerFault.exe 2124 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 2124 WerFault.exe Token: SeBackupPrivilege 2124 WerFault.exe Token: SeDebugPrivilege 2124 WerFault.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Shipping_Document.exedescription pid process target process PID 508 wrote to memory of 1032 508 Shipping_Document.exe logagent.exe PID 508 wrote to memory of 1032 508 Shipping_Document.exe logagent.exe PID 508 wrote to memory of 1032 508 Shipping_Document.exe logagent.exe PID 508 wrote to memory of 1032 508 Shipping_Document.exe logagent.exe PID 508 wrote to memory of 1032 508 Shipping_Document.exe logagent.exe PID 508 wrote to memory of 1032 508 Shipping_Document.exe logagent.exe PID 508 wrote to memory of 1032 508 Shipping_Document.exe logagent.exe PID 508 wrote to memory of 1032 508 Shipping_Document.exe logagent.exe PID 508 wrote to memory of 1032 508 Shipping_Document.exe logagent.exe PID 508 wrote to memory of 1032 508 Shipping_Document.exe logagent.exe PID 508 wrote to memory of 1032 508 Shipping_Document.exe logagent.exe PID 508 wrote to memory of 1032 508 Shipping_Document.exe logagent.exe PID 508 wrote to memory of 1032 508 Shipping_Document.exe logagent.exe PID 508 wrote to memory of 1032 508 Shipping_Document.exe logagent.exe PID 508 wrote to memory of 1032 508 Shipping_Document.exe logagent.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Shipping_Document.exe"C:\Users\Admin\AppData\Local\Temp\Shipping_Document.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 12642⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2124
-
-
C:\Windows\SysWOW64\logagent.exeC:\Windows\System32\logagent.exe2⤵PID:1032
-