Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 12:00
Behavioral task
behavioral1
Sample
CONFIRMACION DEL PEDIDO CVE6535,PDF.exe
Resource
win7-20220414-en
General
-
Target
CONFIRMACION DEL PEDIDO CVE6535,PDF.exe
-
Size
372KB
-
MD5
a962399ee6a55b52ad2432702a800597
-
SHA1
2ae09b6b627b86bb4a6e2e7b2d33fdc6f8e1579f
-
SHA256
329886b8af71b45a41f94d0d9a69761b6b6fe80d36b7f7a6201fd97dc33234d5
-
SHA512
7914d464cbba0de5392a19d9bd986be7246fca19d15cad5303cf81f1a9dd56cbf94729bd5d1f7f2b2b3e0cb545bb689cc6114b8ee08a8c508c4f8d1eeb86b8a6
Malware Config
Extracted
remcos
2.5.0 Pro
GRACED
thankyoulord.ddns.net:5050
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-0S5XD9
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Signatures
-
CoreEntity .NET Packer 1 IoCs
A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.
Processes:
resource yara_rule behavioral1/memory/2032-56-0x0000000000260000-0x0000000000268000-memory.dmp coreentity -
SnakeBOT
SnakeBOT is a heavily obfuscated .NET downloader.
-
Contains SnakeBOT related strings 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2032-54-0x0000000000DE0000-0x0000000000E46000-memory.dmp snakebot_strings -
ReZer0 packer 1 IoCs
Detects ReZer0, a packer with multiple versions used in various campaigns.
Processes:
resource yara_rule behavioral1/memory/2032-57-0x0000000004250000-0x000000000427C000-memory.dmp rezer0 -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
CONFIRMACION DEL PEDIDO CVE6535,PDF.exedescription pid process target process PID 2032 set thread context of 1508 2032 CONFIRMACION DEL PEDIDO CVE6535,PDF.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
CONFIRMACION DEL PEDIDO CVE6535,PDF.exepid process 2032 CONFIRMACION DEL PEDIDO CVE6535,PDF.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
CONFIRMACION DEL PEDIDO CVE6535,PDF.exedescription pid process Token: SeDebugPrivilege 2032 CONFIRMACION DEL PEDIDO CVE6535,PDF.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
CONFIRMACION DEL PEDIDO CVE6535,PDF.exepid process 2032 CONFIRMACION DEL PEDIDO CVE6535,PDF.exe 2032 CONFIRMACION DEL PEDIDO CVE6535,PDF.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
CONFIRMACION DEL PEDIDO CVE6535,PDF.exedescription pid process target process PID 2032 wrote to memory of 956 2032 CONFIRMACION DEL PEDIDO CVE6535,PDF.exe schtasks.exe PID 2032 wrote to memory of 956 2032 CONFIRMACION DEL PEDIDO CVE6535,PDF.exe schtasks.exe PID 2032 wrote to memory of 956 2032 CONFIRMACION DEL PEDIDO CVE6535,PDF.exe schtasks.exe PID 2032 wrote to memory of 956 2032 CONFIRMACION DEL PEDIDO CVE6535,PDF.exe schtasks.exe PID 2032 wrote to memory of 1508 2032 CONFIRMACION DEL PEDIDO CVE6535,PDF.exe vbc.exe PID 2032 wrote to memory of 1508 2032 CONFIRMACION DEL PEDIDO CVE6535,PDF.exe vbc.exe PID 2032 wrote to memory of 1508 2032 CONFIRMACION DEL PEDIDO CVE6535,PDF.exe vbc.exe PID 2032 wrote to memory of 1508 2032 CONFIRMACION DEL PEDIDO CVE6535,PDF.exe vbc.exe PID 2032 wrote to memory of 1508 2032 CONFIRMACION DEL PEDIDO CVE6535,PDF.exe vbc.exe PID 2032 wrote to memory of 1508 2032 CONFIRMACION DEL PEDIDO CVE6535,PDF.exe vbc.exe PID 2032 wrote to memory of 1508 2032 CONFIRMACION DEL PEDIDO CVE6535,PDF.exe vbc.exe PID 2032 wrote to memory of 1508 2032 CONFIRMACION DEL PEDIDO CVE6535,PDF.exe vbc.exe PID 2032 wrote to memory of 1508 2032 CONFIRMACION DEL PEDIDO CVE6535,PDF.exe vbc.exe PID 2032 wrote to memory of 1508 2032 CONFIRMACION DEL PEDIDO CVE6535,PDF.exe vbc.exe PID 2032 wrote to memory of 1508 2032 CONFIRMACION DEL PEDIDO CVE6535,PDF.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\CONFIRMACION DEL PEDIDO CVE6535,PDF.exe"C:\Users\Admin\AppData\Local\Temp\CONFIRMACION DEL PEDIDO CVE6535,PDF.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CfGuVGvIV" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB4C2.tmp"2⤵
- Creates scheduled task(s)
PID:956
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"{path}"2⤵PID:1508
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ee1ed86147dde107904d30a585a6b50d
SHA183c33b93fdcbc8d4790faba9fb17bd41a5316d49
SHA2568c7ee9c485f2fe1f45fcde438f94b694c206ffbea412ca9cb8e3fb7279b9f4c3
SHA51261cecb49215e8a8e3c4a84628df30a154e49a807ce0703c5b6fb5bedb368c6ab5b3af5a9ac831cdcacb3c9fcafda69116843f9d07712256763a8ac9fcee6e3b4