Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
06-08-2022 07:33
Static task
static1
Behavioral task
behavioral1
Sample
2c423d03a39192e874aab20c14d1883b.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
2c423d03a39192e874aab20c14d1883b.exe
Resource
win10v2004-20220721-en
General
-
Target
2c423d03a39192e874aab20c14d1883b.exe
-
Size
914KB
-
MD5
2c423d03a39192e874aab20c14d1883b
-
SHA1
023cf31791a48de9cc1ac9e2b98e47393f1d0e3b
-
SHA256
6e4597db411c7c93428ddc24f95c2d4a16c91263c12344923c04aceae016834d
-
SHA512
479d80a09d6792340f1999b51d02e59a5a578734ae6af1102dc54a0fa79040f43d6878fbd8acfd1fd57cb3751077b65c4ac1bd64a04e8f39c9dc213166cc1b5c
Malware Config
Extracted
remcos
1.7 Pro
ceo_nasco
194.5.98.28:7006
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
remcos_zxeqqeixcisywfn
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 61 IoCs
Processes:
resource yara_rule behavioral2/memory/4372-145-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-161-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-162-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-163-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-164-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-165-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-166-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-167-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-168-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-169-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-170-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-171-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-172-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-173-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-174-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-175-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-176-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-177-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-178-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-179-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-180-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-181-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-182-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-183-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-184-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-185-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-186-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-187-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-188-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-189-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-190-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-191-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-192-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-193-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-194-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-195-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-196-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-197-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-198-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-199-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-200-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-202-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-203-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-204-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-201-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-210-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-209-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-211-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-212-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-213-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-214-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-215-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-216-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-217-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-219-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-218-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-221-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-220-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-223-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-224-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 behavioral2/memory/4372-222-0x0000000003EA0000-0x0000000003F35000-memory.dmp modiloader_stage2 -
Blocklisted process makes network request 16 IoCs
Processes:
cmd.exeflow pid process 34 1940 cmd.exe 35 1940 cmd.exe 44 1940 cmd.exe 45 1940 cmd.exe 46 1940 cmd.exe 51 1940 cmd.exe 55 1940 cmd.exe 56 1940 cmd.exe 57 1940 cmd.exe 58 1940 cmd.exe 59 1940 cmd.exe 71 1940 cmd.exe 72 1940 cmd.exe 73 1940 cmd.exe 74 1940 cmd.exe 75 1940 cmd.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
2c423d03a39192e874aab20c14d1883b.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Control Panel\International\Geo\Nation 2c423d03a39192e874aab20c14d1883b.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
2c423d03a39192e874aab20c14d1883b.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Zhcexw = "C:\\Users\\Public\\Libraries\\wxechZ.url" 2c423d03a39192e874aab20c14d1883b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
2c423d03a39192e874aab20c14d1883b.exepid process 4372 2c423d03a39192e874aab20c14d1883b.exe 4372 2c423d03a39192e874aab20c14d1883b.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
cmd.exepid process 1940 cmd.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
cmd.exepid process 1940 cmd.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
2c423d03a39192e874aab20c14d1883b.exedescription pid process target process PID 4372 wrote to memory of 1940 4372 2c423d03a39192e874aab20c14d1883b.exe cmd.exe PID 4372 wrote to memory of 1940 4372 2c423d03a39192e874aab20c14d1883b.exe cmd.exe PID 4372 wrote to memory of 1940 4372 2c423d03a39192e874aab20c14d1883b.exe cmd.exe PID 4372 wrote to memory of 1940 4372 2c423d03a39192e874aab20c14d1883b.exe cmd.exe PID 4372 wrote to memory of 1940 4372 2c423d03a39192e874aab20c14d1883b.exe cmd.exe PID 4372 wrote to memory of 1940 4372 2c423d03a39192e874aab20c14d1883b.exe cmd.exe PID 4372 wrote to memory of 1940 4372 2c423d03a39192e874aab20c14d1883b.exe cmd.exe PID 4372 wrote to memory of 1940 4372 2c423d03a39192e874aab20c14d1883b.exe cmd.exe PID 4372 wrote to memory of 1940 4372 2c423d03a39192e874aab20c14d1883b.exe cmd.exe PID 4372 wrote to memory of 1940 4372 2c423d03a39192e874aab20c14d1883b.exe cmd.exe PID 4372 wrote to memory of 1940 4372 2c423d03a39192e874aab20c14d1883b.exe cmd.exe PID 4372 wrote to memory of 1940 4372 2c423d03a39192e874aab20c14d1883b.exe cmd.exe PID 4372 wrote to memory of 1940 4372 2c423d03a39192e874aab20c14d1883b.exe cmd.exe PID 4372 wrote to memory of 1940 4372 2c423d03a39192e874aab20c14d1883b.exe cmd.exe PID 4372 wrote to memory of 1940 4372 2c423d03a39192e874aab20c14d1883b.exe cmd.exe PID 4372 wrote to memory of 1940 4372 2c423d03a39192e874aab20c14d1883b.exe cmd.exe PID 4372 wrote to memory of 1940 4372 2c423d03a39192e874aab20c14d1883b.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c423d03a39192e874aab20c14d1883b.exe"C:\Users\Admin\AppData\Local\Temp\2c423d03a39192e874aab20c14d1883b.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"2⤵
- Blocklisted process makes network request
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1940
-