Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
29-07-2022 06:53
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220718-en
General
-
Target
tmp.exe
-
Size
140KB
-
MD5
cde0aa36b80beafa74e258c5384ab684
-
SHA1
0678a1ca625aebb6e88d38e3dc0796be573b5c06
-
SHA256
a3eaed42c0457e69736b65abc55639deba7e6bfb94948dd3ed8b5f6ca968a979
-
SHA512
373d420c21dfff931396416781011930701544c5a241097044f402079f3dcd2a35b982fe3eac66899692071222f047fdf4bff0a5e0466fb2aa88244d6a20e4d7
Malware Config
Extracted
remcos
1.7 Pro
President
winam.ddns.net:2401
dropy2.ddns.net:2400
dropy1.ddns.net:2404
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
svchost.exe
-
copy_folder
updates
-
delete_file
true
-
hide_file
true
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
windows
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
remcos_bvmobmufbe
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
Logs
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
tmp.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" tmp.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 2 IoCs
Processes:
tmp.exesvchost.exepid process 2020 tmp.exe 1892 svchost.exe -
Loads dropped DLL 6 IoCs
Processes:
tmp.execmd.exepid process 1680 tmp.exe 1680 tmp.exe 1680 tmp.exe 2008 cmd.exe 2008 cmd.exe 1680 tmp.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
tmp.exedescription ioc process File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE tmp.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE tmp.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE tmp.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE tmp.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe tmp.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE tmp.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE tmp.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE tmp.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE tmp.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE tmp.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE tmp.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe tmp.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe tmp.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe tmp.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe tmp.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE tmp.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe tmp.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe tmp.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe tmp.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE tmp.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE tmp.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE tmp.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe tmp.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe tmp.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE tmp.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe tmp.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE tmp.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe tmp.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE tmp.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe tmp.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE tmp.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe tmp.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE tmp.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe tmp.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE tmp.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE tmp.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE tmp.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE tmp.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE tmp.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe tmp.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe tmp.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe tmp.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE tmp.exe -
Drops file in Windows directory 1 IoCs
Processes:
tmp.exedescription ioc process File opened for modification C:\Windows\svchost.com tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
tmp.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" tmp.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
svchost.exepid process 1892 svchost.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
tmp.exetmp.execmd.exedescription pid process target process PID 1680 wrote to memory of 2020 1680 tmp.exe tmp.exe PID 1680 wrote to memory of 2020 1680 tmp.exe tmp.exe PID 1680 wrote to memory of 2020 1680 tmp.exe tmp.exe PID 1680 wrote to memory of 2020 1680 tmp.exe tmp.exe PID 2020 wrote to memory of 2008 2020 tmp.exe cmd.exe PID 2020 wrote to memory of 2008 2020 tmp.exe cmd.exe PID 2020 wrote to memory of 2008 2020 tmp.exe cmd.exe PID 2020 wrote to memory of 2008 2020 tmp.exe cmd.exe PID 2020 wrote to memory of 2008 2020 tmp.exe cmd.exe PID 2020 wrote to memory of 2008 2020 tmp.exe cmd.exe PID 2020 wrote to memory of 2008 2020 tmp.exe cmd.exe PID 2008 wrote to memory of 1968 2008 cmd.exe PING.EXE PID 2008 wrote to memory of 1968 2008 cmd.exe PING.EXE PID 2008 wrote to memory of 1968 2008 cmd.exe PING.EXE PID 2008 wrote to memory of 1968 2008 cmd.exe PING.EXE PID 2008 wrote to memory of 1892 2008 cmd.exe svchost.exe PID 2008 wrote to memory of 1892 2008 cmd.exe svchost.exe PID 2008 wrote to memory of 1892 2008 cmd.exe svchost.exe PID 2008 wrote to memory of 1892 2008 cmd.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Modifies system executable filetype association
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\3582-490\tmp.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\tmp.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\PING.EXEPING 127.0.0.1 -n 24⤵
- Runs ping.exe
PID:1968
-
-
C:\Users\Admin\AppData\Roaming\updates\svchost.exe"C:\Users\Admin\AppData\Roaming\updates\svchost.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1892
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5a693cb1e220a688311032a45f34e42cc
SHA18f99519487ee96ef05c4d5f94a06080173b05d9c
SHA25629eeb8781216adf0c1a47bedab9f2eb5315a9888ceae6ba1525e7d5ecce1eeee
SHA51250c2c6f62912a4c965d3dad4e4ebb9c18b00028a0763dbecc15e2f5da46f7d63dd83b9c21f76f3029530b3feb59a28fa4b95b30438fefb14a5341338ca604a7c
-
Filesize
100KB
MD5a693cb1e220a688311032a45f34e42cc
SHA18f99519487ee96ef05c4d5f94a06080173b05d9c
SHA25629eeb8781216adf0c1a47bedab9f2eb5315a9888ceae6ba1525e7d5ecce1eeee
SHA51250c2c6f62912a4c965d3dad4e4ebb9c18b00028a0763dbecc15e2f5da46f7d63dd83b9c21f76f3029530b3feb59a28fa4b95b30438fefb14a5341338ca604a7c
-
Filesize
159B
MD567d9abd5d71999ec4a4ae9cef48e47b2
SHA1999a7e56845e367931252601787225153a0bc317
SHA256658dbf3d19288b9c64381c653f07425778692d343fb4abbf506676cbd6853e7f
SHA512c5f2e30fde814b73b1dd8d10b53eed4411b963e824a6df167f4dd5f6cb5b94b78032727940ad8a8e239a98d72fcc471dafd480632a30c42794220bfb307e4bc7
-
Filesize
100KB
MD5a693cb1e220a688311032a45f34e42cc
SHA18f99519487ee96ef05c4d5f94a06080173b05d9c
SHA25629eeb8781216adf0c1a47bedab9f2eb5315a9888ceae6ba1525e7d5ecce1eeee
SHA51250c2c6f62912a4c965d3dad4e4ebb9c18b00028a0763dbecc15e2f5da46f7d63dd83b9c21f76f3029530b3feb59a28fa4b95b30438fefb14a5341338ca604a7c
-
Filesize
100KB
MD5a693cb1e220a688311032a45f34e42cc
SHA18f99519487ee96ef05c4d5f94a06080173b05d9c
SHA25629eeb8781216adf0c1a47bedab9f2eb5315a9888ceae6ba1525e7d5ecce1eeee
SHA51250c2c6f62912a4c965d3dad4e4ebb9c18b00028a0763dbecc15e2f5da46f7d63dd83b9c21f76f3029530b3feb59a28fa4b95b30438fefb14a5341338ca604a7c
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
Filesize
100KB
MD5a693cb1e220a688311032a45f34e42cc
SHA18f99519487ee96ef05c4d5f94a06080173b05d9c
SHA25629eeb8781216adf0c1a47bedab9f2eb5315a9888ceae6ba1525e7d5ecce1eeee
SHA51250c2c6f62912a4c965d3dad4e4ebb9c18b00028a0763dbecc15e2f5da46f7d63dd83b9c21f76f3029530b3feb59a28fa4b95b30438fefb14a5341338ca604a7c
-
Filesize
100KB
MD5a693cb1e220a688311032a45f34e42cc
SHA18f99519487ee96ef05c4d5f94a06080173b05d9c
SHA25629eeb8781216adf0c1a47bedab9f2eb5315a9888ceae6ba1525e7d5ecce1eeee
SHA51250c2c6f62912a4c965d3dad4e4ebb9c18b00028a0763dbecc15e2f5da46f7d63dd83b9c21f76f3029530b3feb59a28fa4b95b30438fefb14a5341338ca604a7c
-
Filesize
100KB
MD5a693cb1e220a688311032a45f34e42cc
SHA18f99519487ee96ef05c4d5f94a06080173b05d9c
SHA25629eeb8781216adf0c1a47bedab9f2eb5315a9888ceae6ba1525e7d5ecce1eeee
SHA51250c2c6f62912a4c965d3dad4e4ebb9c18b00028a0763dbecc15e2f5da46f7d63dd83b9c21f76f3029530b3feb59a28fa4b95b30438fefb14a5341338ca604a7c
-
Filesize
100KB
MD5a693cb1e220a688311032a45f34e42cc
SHA18f99519487ee96ef05c4d5f94a06080173b05d9c
SHA25629eeb8781216adf0c1a47bedab9f2eb5315a9888ceae6ba1525e7d5ecce1eeee
SHA51250c2c6f62912a4c965d3dad4e4ebb9c18b00028a0763dbecc15e2f5da46f7d63dd83b9c21f76f3029530b3feb59a28fa4b95b30438fefb14a5341338ca604a7c
-
Filesize
100KB
MD5a693cb1e220a688311032a45f34e42cc
SHA18f99519487ee96ef05c4d5f94a06080173b05d9c
SHA25629eeb8781216adf0c1a47bedab9f2eb5315a9888ceae6ba1525e7d5ecce1eeee
SHA51250c2c6f62912a4c965d3dad4e4ebb9c18b00028a0763dbecc15e2f5da46f7d63dd83b9c21f76f3029530b3feb59a28fa4b95b30438fefb14a5341338ca604a7c