Analysis
-
max time kernel
168s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
25-03-2022 13:44
Static task
static1
Behavioral task
behavioral1
Sample
WAYBILL.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
WAYBILL.exe
Resource
win10v2004-20220310-en
General
-
Target
WAYBILL.exe
-
Size
1.0MB
-
MD5
a7c29d968ed68f24747b39f1bcec2705
-
SHA1
0a30a96b8a155f03516812df1e4bffebeadca698
-
SHA256
db5a12184d9b6acdf484a88b3e65aa9435f8a9d7eda48418aef2d028b98913d4
-
SHA512
9b6a70d28e4ab26e7b0c4ae79b4a1211da45af13aaf5eb27d0eb6080f520e47dea134a2d45f6ab3caef4e04c363e4bafbc9589404a146e478c9e68b4d36d6729
Malware Config
Extracted
remcos
RemoteHost
flexyval01.hopto.org:2404
flexyval02.hopto.org:2404
flexyval03.hopto.org:2404
flexyval04.hopto.org:2404
flexyval06.hopto.org:2404
flexyval05.hopto.org:2404
flexyval07.hopto.org:2404
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Gallery-STMAJU
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
notepad;solitaire;
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Yjuheuz = "C:\\Users\\Public\\zuehujY.url" WAYBILL.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1072 wrote to memory of 2784 1072 WAYBILL.exe 91 PID 1072 wrote to memory of 2784 1072 WAYBILL.exe 91 PID 1072 wrote to memory of 2784 1072 WAYBILL.exe 91 PID 1072 wrote to memory of 2784 1072 WAYBILL.exe 91 PID 1072 wrote to memory of 2784 1072 WAYBILL.exe 91 PID 1072 wrote to memory of 2784 1072 WAYBILL.exe 91 PID 1072 wrote to memory of 2784 1072 WAYBILL.exe 91 PID 1072 wrote to memory of 2784 1072 WAYBILL.exe 91 PID 1072 wrote to memory of 2784 1072 WAYBILL.exe 91 PID 1072 wrote to memory of 2784 1072 WAYBILL.exe 91 PID 1072 wrote to memory of 2784 1072 WAYBILL.exe 91 PID 1072 wrote to memory of 2784 1072 WAYBILL.exe 91 PID 1072 wrote to memory of 2784 1072 WAYBILL.exe 91 PID 1072 wrote to memory of 2784 1072 WAYBILL.exe 91 PID 1072 wrote to memory of 2784 1072 WAYBILL.exe 91 PID 2784 wrote to memory of 768 2784 DpiScaling.exe 92 PID 2784 wrote to memory of 768 2784 DpiScaling.exe 92 PID 2784 wrote to memory of 768 2784 DpiScaling.exe 92 PID 2784 wrote to memory of 2140 2784 DpiScaling.exe 93 PID 2784 wrote to memory of 2140 2784 DpiScaling.exe 93 PID 2784 wrote to memory of 2140 2784 DpiScaling.exe 93 PID 2784 wrote to memory of 1204 2784 DpiScaling.exe 94 PID 2784 wrote to memory of 1204 2784 DpiScaling.exe 94 PID 2784 wrote to memory of 1204 2784 DpiScaling.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\WAYBILL.exe"C:\Users\Admin\AppData\Local\Temp\WAYBILL.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\DpiScaling.exeC:\Windows\System32\DpiScaling.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\DpiScaling.exeC:\Windows\SysWOW64\DpiScaling.exe /stext "C:\Users\Admin\AppData\Local\Temp\obnllts"3⤵PID:768
-
-
C:\Windows\SysWOW64\DpiScaling.exeC:\Windows\SysWOW64\DpiScaling.exe /stext "C:\Users\Admin\AppData\Local\Temp\zvaeemddfmt"3⤵PID:2140
-
-
C:\Windows\SysWOW64\DpiScaling.exeC:\Windows\SysWOW64\DpiScaling.exe /stext "C:\Users\Admin\AppData\Local\Temp\jpgofwnftulaan"3⤵PID:1204
-
-