Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
29-07-2022 14:45
Behavioral task
behavioral1
Sample
cde0aa36b80beafa74e258c5384ab684.exe
Resource
win7-20220718-en
General
-
Target
cde0aa36b80beafa74e258c5384ab684.exe
-
Size
140KB
-
MD5
cde0aa36b80beafa74e258c5384ab684
-
SHA1
0678a1ca625aebb6e88d38e3dc0796be573b5c06
-
SHA256
a3eaed42c0457e69736b65abc55639deba7e6bfb94948dd3ed8b5f6ca968a979
-
SHA512
373d420c21dfff931396416781011930701544c5a241097044f402079f3dcd2a35b982fe3eac66899692071222f047fdf4bff0a5e0466fb2aa88244d6a20e4d7
Malware Config
Extracted
remcos
1.7 Pro
President
winam.ddns.net:2401
dropy2.ddns.net:2400
dropy1.ddns.net:2404
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
svchost.exe
-
copy_folder
updates
-
delete_file
true
-
hide_file
true
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
windows
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
remcos_bvmobmufbe
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
Logs
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
cde0aa36b80beafa74e258c5384ab684.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" cde0aa36b80beafa74e258c5384ab684.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 2 IoCs
Processes:
cde0aa36b80beafa74e258c5384ab684.exesvchost.exepid process 1440 cde0aa36b80beafa74e258c5384ab684.exe 1760 svchost.exe -
Loads dropped DLL 6 IoCs
Processes:
cde0aa36b80beafa74e258c5384ab684.execmd.exepid process 1124 cde0aa36b80beafa74e258c5384ab684.exe 1124 cde0aa36b80beafa74e258c5384ab684.exe 1124 cde0aa36b80beafa74e258c5384ab684.exe 2020 cmd.exe 2020 cmd.exe 1124 cde0aa36b80beafa74e258c5384ab684.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
cde0aa36b80beafa74e258c5384ab684.exedescription ioc process File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE cde0aa36b80beafa74e258c5384ab684.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe cde0aa36b80beafa74e258c5384ab684.exe -
Drops file in Windows directory 1 IoCs
Processes:
cde0aa36b80beafa74e258c5384ab684.exedescription ioc process File opened for modification C:\Windows\svchost.com cde0aa36b80beafa74e258c5384ab684.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
cde0aa36b80beafa74e258c5384ab684.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" cde0aa36b80beafa74e258c5384ab684.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
svchost.exepid process 1760 svchost.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
cde0aa36b80beafa74e258c5384ab684.execde0aa36b80beafa74e258c5384ab684.execmd.exedescription pid process target process PID 1124 wrote to memory of 1440 1124 cde0aa36b80beafa74e258c5384ab684.exe cde0aa36b80beafa74e258c5384ab684.exe PID 1124 wrote to memory of 1440 1124 cde0aa36b80beafa74e258c5384ab684.exe cde0aa36b80beafa74e258c5384ab684.exe PID 1124 wrote to memory of 1440 1124 cde0aa36b80beafa74e258c5384ab684.exe cde0aa36b80beafa74e258c5384ab684.exe PID 1124 wrote to memory of 1440 1124 cde0aa36b80beafa74e258c5384ab684.exe cde0aa36b80beafa74e258c5384ab684.exe PID 1440 wrote to memory of 2020 1440 cde0aa36b80beafa74e258c5384ab684.exe cmd.exe PID 1440 wrote to memory of 2020 1440 cde0aa36b80beafa74e258c5384ab684.exe cmd.exe PID 1440 wrote to memory of 2020 1440 cde0aa36b80beafa74e258c5384ab684.exe cmd.exe PID 1440 wrote to memory of 2020 1440 cde0aa36b80beafa74e258c5384ab684.exe cmd.exe PID 1440 wrote to memory of 2020 1440 cde0aa36b80beafa74e258c5384ab684.exe cmd.exe PID 1440 wrote to memory of 2020 1440 cde0aa36b80beafa74e258c5384ab684.exe cmd.exe PID 1440 wrote to memory of 2020 1440 cde0aa36b80beafa74e258c5384ab684.exe cmd.exe PID 2020 wrote to memory of 1904 2020 cmd.exe PING.EXE PID 2020 wrote to memory of 1904 2020 cmd.exe PING.EXE PID 2020 wrote to memory of 1904 2020 cmd.exe PING.EXE PID 2020 wrote to memory of 1904 2020 cmd.exe PING.EXE PID 2020 wrote to memory of 1760 2020 cmd.exe svchost.exe PID 2020 wrote to memory of 1760 2020 cmd.exe svchost.exe PID 2020 wrote to memory of 1760 2020 cmd.exe svchost.exe PID 2020 wrote to memory of 1760 2020 cmd.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cde0aa36b80beafa74e258c5384ab684.exe"C:\Users\Admin\AppData\Local\Temp\cde0aa36b80beafa74e258c5384ab684.exe"1⤵
- Modifies system executable filetype association
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\3582-490\cde0aa36b80beafa74e258c5384ab684.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\cde0aa36b80beafa74e258c5384ab684.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\PING.EXEPING 127.0.0.1 -n 24⤵
- Runs ping.exe
PID:1904
-
-
C:\Users\Admin\AppData\Roaming\updates\svchost.exe"C:\Users\Admin\AppData\Roaming\updates\svchost.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1760
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5a693cb1e220a688311032a45f34e42cc
SHA18f99519487ee96ef05c4d5f94a06080173b05d9c
SHA25629eeb8781216adf0c1a47bedab9f2eb5315a9888ceae6ba1525e7d5ecce1eeee
SHA51250c2c6f62912a4c965d3dad4e4ebb9c18b00028a0763dbecc15e2f5da46f7d63dd83b9c21f76f3029530b3feb59a28fa4b95b30438fefb14a5341338ca604a7c
-
Filesize
100KB
MD5a693cb1e220a688311032a45f34e42cc
SHA18f99519487ee96ef05c4d5f94a06080173b05d9c
SHA25629eeb8781216adf0c1a47bedab9f2eb5315a9888ceae6ba1525e7d5ecce1eeee
SHA51250c2c6f62912a4c965d3dad4e4ebb9c18b00028a0763dbecc15e2f5da46f7d63dd83b9c21f76f3029530b3feb59a28fa4b95b30438fefb14a5341338ca604a7c
-
Filesize
188B
MD5f4a1542081e4960f27e3e790013f05aa
SHA181b256715055b9cb3beb5f834c59f1b5c6b84937
SHA25683b2bebe94fd411a7f6d8be9f170adc32eff0350bbeda624768c218a91851c30
SHA512a6edbb80bd028eb4e51551a4f84b512587af713becdd25be1839a68c8481403603f1fccdd13d39eca06d6f31e54425ba42d4da5586eb52a38e2db2207613c8d9
-
Filesize
100KB
MD5a693cb1e220a688311032a45f34e42cc
SHA18f99519487ee96ef05c4d5f94a06080173b05d9c
SHA25629eeb8781216adf0c1a47bedab9f2eb5315a9888ceae6ba1525e7d5ecce1eeee
SHA51250c2c6f62912a4c965d3dad4e4ebb9c18b00028a0763dbecc15e2f5da46f7d63dd83b9c21f76f3029530b3feb59a28fa4b95b30438fefb14a5341338ca604a7c
-
Filesize
100KB
MD5a693cb1e220a688311032a45f34e42cc
SHA18f99519487ee96ef05c4d5f94a06080173b05d9c
SHA25629eeb8781216adf0c1a47bedab9f2eb5315a9888ceae6ba1525e7d5ecce1eeee
SHA51250c2c6f62912a4c965d3dad4e4ebb9c18b00028a0763dbecc15e2f5da46f7d63dd83b9c21f76f3029530b3feb59a28fa4b95b30438fefb14a5341338ca604a7c
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
Filesize
100KB
MD5a693cb1e220a688311032a45f34e42cc
SHA18f99519487ee96ef05c4d5f94a06080173b05d9c
SHA25629eeb8781216adf0c1a47bedab9f2eb5315a9888ceae6ba1525e7d5ecce1eeee
SHA51250c2c6f62912a4c965d3dad4e4ebb9c18b00028a0763dbecc15e2f5da46f7d63dd83b9c21f76f3029530b3feb59a28fa4b95b30438fefb14a5341338ca604a7c
-
Filesize
100KB
MD5a693cb1e220a688311032a45f34e42cc
SHA18f99519487ee96ef05c4d5f94a06080173b05d9c
SHA25629eeb8781216adf0c1a47bedab9f2eb5315a9888ceae6ba1525e7d5ecce1eeee
SHA51250c2c6f62912a4c965d3dad4e4ebb9c18b00028a0763dbecc15e2f5da46f7d63dd83b9c21f76f3029530b3feb59a28fa4b95b30438fefb14a5341338ca604a7c
-
Filesize
100KB
MD5a693cb1e220a688311032a45f34e42cc
SHA18f99519487ee96ef05c4d5f94a06080173b05d9c
SHA25629eeb8781216adf0c1a47bedab9f2eb5315a9888ceae6ba1525e7d5ecce1eeee
SHA51250c2c6f62912a4c965d3dad4e4ebb9c18b00028a0763dbecc15e2f5da46f7d63dd83b9c21f76f3029530b3feb59a28fa4b95b30438fefb14a5341338ca604a7c
-
Filesize
100KB
MD5a693cb1e220a688311032a45f34e42cc
SHA18f99519487ee96ef05c4d5f94a06080173b05d9c
SHA25629eeb8781216adf0c1a47bedab9f2eb5315a9888ceae6ba1525e7d5ecce1eeee
SHA51250c2c6f62912a4c965d3dad4e4ebb9c18b00028a0763dbecc15e2f5da46f7d63dd83b9c21f76f3029530b3feb59a28fa4b95b30438fefb14a5341338ca604a7c
-
Filesize
100KB
MD5a693cb1e220a688311032a45f34e42cc
SHA18f99519487ee96ef05c4d5f94a06080173b05d9c
SHA25629eeb8781216adf0c1a47bedab9f2eb5315a9888ceae6ba1525e7d5ecce1eeee
SHA51250c2c6f62912a4c965d3dad4e4ebb9c18b00028a0763dbecc15e2f5da46f7d63dd83b9c21f76f3029530b3feb59a28fa4b95b30438fefb14a5341338ca604a7c