Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
21-11-2022 06:43
Static task
static1
Behavioral task
behavioral1
Sample
ORDER ENQUIRY 22.11.21.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ORDER ENQUIRY 22.11.21.exe
Resource
win10v2004-20221111-en
General
-
Target
ORDER ENQUIRY 22.11.21.exe
-
Size
965KB
-
MD5
0f30923fef1943c6444512e4da3987d4
-
SHA1
b1cfa49c4ac292f26cd04c1442eb2d7bcffc3e0a
-
SHA256
7666415f1d2f03e6a14e4f058b012ec6ed4a77cd3ecd1398817b2ac97b25cbc5
-
SHA512
ced07b8a11bdc5ebbe1396262efc937946f150c9cbfa2e5d812012cdc9e974f501a70b687f4b0debef0ca9da00d72748f217693cf02da0c4c7ab4518f584407e
-
SSDEEP
24576:0pn3wdfEYxdAXYVWYc0Lsz33ygpjbh4+L74mBfNUstzo:yn2fbdAXY8Y9L43yg
Malware Config
Extracted
remcos
NEW REM STUB
valvesco.duckdns.org:5050
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-48V73L
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Extracted
warzonerat
valvesco.duckdns.org:5353
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
NirSoft MailPassView 2 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral1/memory/556-93-0x0000000000400000-0x0000000000457000-memory.dmp MailPassView behavioral1/memory/556-96-0x0000000000400000-0x0000000000457000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 2 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule behavioral1/memory/1356-92-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView behavioral1/memory/1356-94-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Nirsoft 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1612-84-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral1/memory/1356-92-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral1/memory/556-93-0x0000000000400000-0x0000000000457000-memory.dmp Nirsoft behavioral1/memory/1356-94-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral1/memory/556-96-0x0000000000400000-0x0000000000457000-memory.dmp Nirsoft -
Warzone RAT payload 9 IoCs
Processes:
resource yara_rule behavioral1/memory/932-106-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/932-107-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/932-109-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/932-110-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/932-111-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/932-112-0x0000000000405CE2-mapping.dmp warzonerat behavioral1/memory/932-116-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/932-117-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/932-118-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat -
Executes dropped EXE 2 IoCs
Processes:
dwn.exedwn.exepid process 1216 dwn.exe 932 dwn.exe -
Loads dropped DLL 3 IoCs
Processes:
ORDER ENQUIRY 22.11.21.exedwn.exepid process 628 ORDER ENQUIRY 22.11.21.exe 628 ORDER ENQUIRY 22.11.21.exe 1216 dwn.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
ORDER ENQUIRY 22.11.21.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts ORDER ENQUIRY 22.11.21.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
ORDER ENQUIRY 22.11.21.exeORDER ENQUIRY 22.11.21.exedwn.exedescription pid process target process PID 2000 set thread context of 628 2000 ORDER ENQUIRY 22.11.21.exe ORDER ENQUIRY 22.11.21.exe PID 628 set thread context of 1356 628 ORDER ENQUIRY 22.11.21.exe ORDER ENQUIRY 22.11.21.exe PID 628 set thread context of 556 628 ORDER ENQUIRY 22.11.21.exe ORDER ENQUIRY 22.11.21.exe PID 628 set thread context of 1612 628 ORDER ENQUIRY 22.11.21.exe ORDER ENQUIRY 22.11.21.exe PID 1216 set thread context of 932 1216 dwn.exe dwn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
ORDER ENQUIRY 22.11.21.exepid process 1356 ORDER ENQUIRY 22.11.21.exe 1356 ORDER ENQUIRY 22.11.21.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
ORDER ENQUIRY 22.11.21.exepid process 628 ORDER ENQUIRY 22.11.21.exe 628 ORDER ENQUIRY 22.11.21.exe 628 ORDER ENQUIRY 22.11.21.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ORDER ENQUIRY 22.11.21.exedescription pid process Token: SeDebugPrivilege 1612 ORDER ENQUIRY 22.11.21.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
ORDER ENQUIRY 22.11.21.exedwn.exepid process 628 ORDER ENQUIRY 22.11.21.exe 932 dwn.exe -
Suspicious use of WriteProcessMemory 50 IoCs
Processes:
ORDER ENQUIRY 22.11.21.exeORDER ENQUIRY 22.11.21.exedwn.exedwn.exedescription pid process target process PID 2000 wrote to memory of 628 2000 ORDER ENQUIRY 22.11.21.exe ORDER ENQUIRY 22.11.21.exe PID 2000 wrote to memory of 628 2000 ORDER ENQUIRY 22.11.21.exe ORDER ENQUIRY 22.11.21.exe PID 2000 wrote to memory of 628 2000 ORDER ENQUIRY 22.11.21.exe ORDER ENQUIRY 22.11.21.exe PID 2000 wrote to memory of 628 2000 ORDER ENQUIRY 22.11.21.exe ORDER ENQUIRY 22.11.21.exe PID 2000 wrote to memory of 628 2000 ORDER ENQUIRY 22.11.21.exe ORDER ENQUIRY 22.11.21.exe PID 2000 wrote to memory of 628 2000 ORDER ENQUIRY 22.11.21.exe ORDER ENQUIRY 22.11.21.exe PID 2000 wrote to memory of 628 2000 ORDER ENQUIRY 22.11.21.exe ORDER ENQUIRY 22.11.21.exe PID 2000 wrote to memory of 628 2000 ORDER ENQUIRY 22.11.21.exe ORDER ENQUIRY 22.11.21.exe PID 2000 wrote to memory of 628 2000 ORDER ENQUIRY 22.11.21.exe ORDER ENQUIRY 22.11.21.exe PID 2000 wrote to memory of 628 2000 ORDER ENQUIRY 22.11.21.exe ORDER ENQUIRY 22.11.21.exe PID 2000 wrote to memory of 628 2000 ORDER ENQUIRY 22.11.21.exe ORDER ENQUIRY 22.11.21.exe PID 2000 wrote to memory of 628 2000 ORDER ENQUIRY 22.11.21.exe ORDER ENQUIRY 22.11.21.exe PID 2000 wrote to memory of 628 2000 ORDER ENQUIRY 22.11.21.exe ORDER ENQUIRY 22.11.21.exe PID 628 wrote to memory of 1356 628 ORDER ENQUIRY 22.11.21.exe ORDER ENQUIRY 22.11.21.exe PID 628 wrote to memory of 1356 628 ORDER ENQUIRY 22.11.21.exe ORDER ENQUIRY 22.11.21.exe PID 628 wrote to memory of 1356 628 ORDER ENQUIRY 22.11.21.exe ORDER ENQUIRY 22.11.21.exe PID 628 wrote to memory of 1356 628 ORDER ENQUIRY 22.11.21.exe ORDER ENQUIRY 22.11.21.exe PID 628 wrote to memory of 1356 628 ORDER ENQUIRY 22.11.21.exe ORDER ENQUIRY 22.11.21.exe PID 628 wrote to memory of 556 628 ORDER ENQUIRY 22.11.21.exe ORDER ENQUIRY 22.11.21.exe PID 628 wrote to memory of 556 628 ORDER ENQUIRY 22.11.21.exe ORDER ENQUIRY 22.11.21.exe PID 628 wrote to memory of 556 628 ORDER ENQUIRY 22.11.21.exe ORDER ENQUIRY 22.11.21.exe PID 628 wrote to memory of 556 628 ORDER ENQUIRY 22.11.21.exe ORDER ENQUIRY 22.11.21.exe PID 628 wrote to memory of 556 628 ORDER ENQUIRY 22.11.21.exe ORDER ENQUIRY 22.11.21.exe PID 628 wrote to memory of 1612 628 ORDER ENQUIRY 22.11.21.exe ORDER ENQUIRY 22.11.21.exe PID 628 wrote to memory of 1612 628 ORDER ENQUIRY 22.11.21.exe ORDER ENQUIRY 22.11.21.exe PID 628 wrote to memory of 1612 628 ORDER ENQUIRY 22.11.21.exe ORDER ENQUIRY 22.11.21.exe PID 628 wrote to memory of 1612 628 ORDER ENQUIRY 22.11.21.exe ORDER ENQUIRY 22.11.21.exe PID 628 wrote to memory of 1612 628 ORDER ENQUIRY 22.11.21.exe ORDER ENQUIRY 22.11.21.exe PID 628 wrote to memory of 1216 628 ORDER ENQUIRY 22.11.21.exe dwn.exe PID 628 wrote to memory of 1216 628 ORDER ENQUIRY 22.11.21.exe dwn.exe PID 628 wrote to memory of 1216 628 ORDER ENQUIRY 22.11.21.exe dwn.exe PID 628 wrote to memory of 1216 628 ORDER ENQUIRY 22.11.21.exe dwn.exe PID 1216 wrote to memory of 932 1216 dwn.exe dwn.exe PID 1216 wrote to memory of 932 1216 dwn.exe dwn.exe PID 1216 wrote to memory of 932 1216 dwn.exe dwn.exe PID 1216 wrote to memory of 932 1216 dwn.exe dwn.exe PID 1216 wrote to memory of 932 1216 dwn.exe dwn.exe PID 1216 wrote to memory of 932 1216 dwn.exe dwn.exe PID 1216 wrote to memory of 932 1216 dwn.exe dwn.exe PID 1216 wrote to memory of 932 1216 dwn.exe dwn.exe PID 1216 wrote to memory of 932 1216 dwn.exe dwn.exe PID 1216 wrote to memory of 932 1216 dwn.exe dwn.exe PID 1216 wrote to memory of 932 1216 dwn.exe dwn.exe PID 1216 wrote to memory of 932 1216 dwn.exe dwn.exe PID 932 wrote to memory of 1312 932 dwn.exe cmd.exe PID 932 wrote to memory of 1312 932 dwn.exe cmd.exe PID 932 wrote to memory of 1312 932 dwn.exe cmd.exe PID 932 wrote to memory of 1312 932 dwn.exe cmd.exe PID 932 wrote to memory of 1312 932 dwn.exe cmd.exe PID 932 wrote to memory of 1312 932 dwn.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ORDER ENQUIRY 22.11.21.exe"C:\Users\Admin\AppData\Local\Temp\ORDER ENQUIRY 22.11.21.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\ORDER ENQUIRY 22.11.21.exe"C:\Users\Admin\AppData\Local\Temp\ORDER ENQUIRY 22.11.21.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\ORDER ENQUIRY 22.11.21.exe"C:\Users\Admin\AppData\Local\Temp\ORDER ENQUIRY 22.11.21.exe" /stext "C:\Users\Admin\AppData\Local\Temp\vtqqhrh"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1356
-
-
C:\Users\Admin\AppData\Local\Temp\ORDER ENQUIRY 22.11.21.exe"C:\Users\Admin\AppData\Local\Temp\ORDER ENQUIRY 22.11.21.exe" /stext "C:\Users\Admin\AppData\Local\Temp\xwwbikrqurc"3⤵
- Accesses Microsoft Outlook accounts
PID:556
-
-
C:\Users\Admin\AppData\Local\Temp\ORDER ENQUIRY 22.11.21.exe"C:\Users\Admin\AppData\Local\Temp\ORDER ENQUIRY 22.11.21.exe" /stext "C:\Users\Admin\AppData\Local\Temp\iqbtjcckizucip"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
-
C:\Users\Admin\AppData\Local\Temp\dwn.exe"C:\Users\Admin\AppData\Local\Temp\dwn.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\dwn.exe"C:\Users\Admin\AppData\Local\Temp\dwn.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"5⤵PID:1312
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
613KB
MD5eff616818b69ebbbf35c3147f6728920
SHA1de38e874fbdcdd0146e95acff653d553a4221a0f
SHA256be6cf44f8757472e0cd404392086f7f94352fa22e512d66b8420c51ab4a6b566
SHA512056f246a8dc68fcb25bb8cd65e09bad69449dd826395d069f93b081462c86e4980674414dcc6467e4dce4db7e2a73a793101e9320ff6df1db24ab297a00650f2
-
Filesize
613KB
MD5eff616818b69ebbbf35c3147f6728920
SHA1de38e874fbdcdd0146e95acff653d553a4221a0f
SHA256be6cf44f8757472e0cd404392086f7f94352fa22e512d66b8420c51ab4a6b566
SHA512056f246a8dc68fcb25bb8cd65e09bad69449dd826395d069f93b081462c86e4980674414dcc6467e4dce4db7e2a73a793101e9320ff6df1db24ab297a00650f2
-
Filesize
613KB
MD5eff616818b69ebbbf35c3147f6728920
SHA1de38e874fbdcdd0146e95acff653d553a4221a0f
SHA256be6cf44f8757472e0cd404392086f7f94352fa22e512d66b8420c51ab4a6b566
SHA512056f246a8dc68fcb25bb8cd65e09bad69449dd826395d069f93b081462c86e4980674414dcc6467e4dce4db7e2a73a793101e9320ff6df1db24ab297a00650f2
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
613KB
MD5eff616818b69ebbbf35c3147f6728920
SHA1de38e874fbdcdd0146e95acff653d553a4221a0f
SHA256be6cf44f8757472e0cd404392086f7f94352fa22e512d66b8420c51ab4a6b566
SHA512056f246a8dc68fcb25bb8cd65e09bad69449dd826395d069f93b081462c86e4980674414dcc6467e4dce4db7e2a73a793101e9320ff6df1db24ab297a00650f2
-
Filesize
613KB
MD5eff616818b69ebbbf35c3147f6728920
SHA1de38e874fbdcdd0146e95acff653d553a4221a0f
SHA256be6cf44f8757472e0cd404392086f7f94352fa22e512d66b8420c51ab4a6b566
SHA512056f246a8dc68fcb25bb8cd65e09bad69449dd826395d069f93b081462c86e4980674414dcc6467e4dce4db7e2a73a793101e9320ff6df1db24ab297a00650f2
-
Filesize
613KB
MD5eff616818b69ebbbf35c3147f6728920
SHA1de38e874fbdcdd0146e95acff653d553a4221a0f
SHA256be6cf44f8757472e0cd404392086f7f94352fa22e512d66b8420c51ab4a6b566
SHA512056f246a8dc68fcb25bb8cd65e09bad69449dd826395d069f93b081462c86e4980674414dcc6467e4dce4db7e2a73a793101e9320ff6df1db24ab297a00650f2