Analysis
-
max time kernel
191s -
max time network
175s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
04-02-2022 08:21
Static task
static1
Behavioral task
behavioral1
Sample
PancakeSwap-dApp-2.2.5-installer.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
PancakeSwap-dApp-2.2.5-installer.exe
Resource
win10v2004-en-20220113
General
-
Target
PancakeSwap-dApp-2.2.5-installer.exe
-
Size
118.7MB
-
MD5
28a9f33f966af6696de57d9958cabde6
-
SHA1
bd95f99f1466b9102a5d25fabc585de603ad0808
-
SHA256
05f15a90fcfca1d556a05f9425082d57bc0fa86fef3726545de6c96094aa9312
-
SHA512
7b8b0bc593fd1424c22965a32bbfa30d92d43a76c7a3853687e501d1c2115ce4f1ad4b2ed1b411e1bbe3c46718074525715ee6a7459d0cfbca202bda4d6c091d
Malware Config
Extracted
remcos
Sys32
157.90.1.54:4783
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
Logs
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Sys-PVUZ63
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
notepad;solitaire;
Signatures
-
Babadeda Crypter 2 IoCs
resource yara_rule behavioral1/files/0x000600000001389a-108.dat family_babadeda behavioral1/memory/1072-109-0x0000000004DE0000-0x0000000008DE0000-memory.dmp family_babadeda -
Executes dropped EXE 3 IoCs
pid Process 1320 PancakeSwap-dApp-2.2.5-installer.tmp 776 makecat.exe 1072 link.exe -
Loads dropped DLL 23 IoCs
pid Process 1444 PancakeSwap-dApp-2.2.5-installer.exe 1320 PancakeSwap-dApp-2.2.5-installer.tmp 1320 PancakeSwap-dApp-2.2.5-installer.tmp 1320 PancakeSwap-dApp-2.2.5-installer.tmp 1072 link.exe 1072 link.exe 1072 link.exe 1072 link.exe 1072 link.exe 1072 link.exe 1072 link.exe 1072 link.exe 1072 link.exe 1072 link.exe 1072 link.exe 1072 link.exe 1072 link.exe 1072 link.exe 1072 link.exe 1072 link.exe 1072 link.exe 1072 link.exe 1072 link.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1320 PancakeSwap-dApp-2.2.5-installer.tmp 1320 PancakeSwap-dApp-2.2.5-installer.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1320 PancakeSwap-dApp-2.2.5-installer.tmp -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1072 link.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1444 wrote to memory of 1320 1444 PancakeSwap-dApp-2.2.5-installer.exe 27 PID 1444 wrote to memory of 1320 1444 PancakeSwap-dApp-2.2.5-installer.exe 27 PID 1444 wrote to memory of 1320 1444 PancakeSwap-dApp-2.2.5-installer.exe 27 PID 1444 wrote to memory of 1320 1444 PancakeSwap-dApp-2.2.5-installer.exe 27 PID 1444 wrote to memory of 1320 1444 PancakeSwap-dApp-2.2.5-installer.exe 27 PID 1444 wrote to memory of 1320 1444 PancakeSwap-dApp-2.2.5-installer.exe 27 PID 1444 wrote to memory of 1320 1444 PancakeSwap-dApp-2.2.5-installer.exe 27 PID 1320 wrote to memory of 776 1320 PancakeSwap-dApp-2.2.5-installer.tmp 30 PID 1320 wrote to memory of 776 1320 PancakeSwap-dApp-2.2.5-installer.tmp 30 PID 1320 wrote to memory of 776 1320 PancakeSwap-dApp-2.2.5-installer.tmp 30 PID 1320 wrote to memory of 776 1320 PancakeSwap-dApp-2.2.5-installer.tmp 30 PID 1320 wrote to memory of 1072 1320 PancakeSwap-dApp-2.2.5-installer.tmp 32 PID 1320 wrote to memory of 1072 1320 PancakeSwap-dApp-2.2.5-installer.tmp 32 PID 1320 wrote to memory of 1072 1320 PancakeSwap-dApp-2.2.5-installer.tmp 32 PID 1320 wrote to memory of 1072 1320 PancakeSwap-dApp-2.2.5-installer.tmp 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\PancakeSwap-dApp-2.2.5-installer.exe"C:\Users\Admin\AppData\Local\Temp\PancakeSwap-dApp-2.2.5-installer.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\is-9TIV7.tmp\PancakeSwap-dApp-2.2.5-installer.tmp"C:\Users\Admin\AppData\Local\Temp\is-9TIV7.tmp\PancakeSwap-dApp-2.2.5-installer.tmp" /SL5="$C014E,123590384,907264,C:\Users\Admin\AppData\Local\Temp\PancakeSwap-dApp-2.2.5-installer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Roaming\MiPony Installer\makecat.exe"C:\Users\Admin\AppData\Roaming\MiPony Installer\makecat.exe"3⤵
- Executes dropped EXE
PID:776
-
-
C:\Users\Admin\AppData\Roaming\MiPony Installer\link.exe"C:\Users\Admin\AppData\Roaming\MiPony Installer\link.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1072
-
-