Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11-04-2023 06:57
Static task
static1
Behavioral task
behavioral1
Sample
91489557012035DraftBLFmKNNBRecd07Apr23CFM.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
91489557012035DraftBLFmKNNBRecd07Apr23CFM.exe
Resource
win10v2004-20230220-en
General
-
Target
91489557012035DraftBLFmKNNBRecd07Apr23CFM.exe
-
Size
673KB
-
MD5
7a22c075e6bb86f3a537fd592925d0f8
-
SHA1
657dde8c6b11a14aa398481768079f3286e37360
-
SHA256
37503c7646071d22653b6be7fdb8ec8d9abbfe8cbfca39650255c131b01f4fd2
-
SHA512
9f1025ab193b0bfd7dfa38f59d2071f2f0293856fe6e1604e0667f93f0f15f241f7458d96c7992d382f7eb1ea6030b8156721dc0de95ad562a319544db655226
-
SSDEEP
12288:KD+aLrg9LSA91a6XQYOg5f46XzsOpj2pMFr0sbOTWE:Ki08wU1a6Xv1B4oKMEW
Malware Config
Extracted
remcos
Razor
20.251.10.189:2349
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
oldosos.dat
-
keylog_flag
false
-
keylog_path
%UserProfile%
-
mouse_option
false
-
mutex
razorsoso-K5DGEB
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule behavioral2/memory/5088-133-0x0000000002260000-0x000000000228C000-memory.dmp modiloader_stage2 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
91489557012035DraftBLFmKNNBRecd07Apr23CFM.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Xnuecpqr = "C:\\Users\\Public\\Libraries\\rqpceunX.url" 91489557012035DraftBLFmKNNBRecd07Apr23CFM.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
91489557012035DraftBLFmKNNBRecd07Apr23CFM.exepid process 5088 91489557012035DraftBLFmKNNBRecd07Apr23CFM.exe 5088 91489557012035DraftBLFmKNNBRecd07Apr23CFM.exe 5088 91489557012035DraftBLFmKNNBRecd07Apr23CFM.exe 5088 91489557012035DraftBLFmKNNBRecd07Apr23CFM.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
91489557012035DraftBLFmKNNBRecd07Apr23CFM.exedescription pid process target process PID 5088 wrote to memory of 4100 5088 91489557012035DraftBLFmKNNBRecd07Apr23CFM.exe colorcpl.exe PID 5088 wrote to memory of 4100 5088 91489557012035DraftBLFmKNNBRecd07Apr23CFM.exe colorcpl.exe PID 5088 wrote to memory of 4100 5088 91489557012035DraftBLFmKNNBRecd07Apr23CFM.exe colorcpl.exe PID 5088 wrote to memory of 4100 5088 91489557012035DraftBLFmKNNBRecd07Apr23CFM.exe colorcpl.exe PID 5088 wrote to memory of 4100 5088 91489557012035DraftBLFmKNNBRecd07Apr23CFM.exe colorcpl.exe PID 5088 wrote to memory of 4100 5088 91489557012035DraftBLFmKNNBRecd07Apr23CFM.exe colorcpl.exe PID 5088 wrote to memory of 4100 5088 91489557012035DraftBLFmKNNBRecd07Apr23CFM.exe colorcpl.exe PID 5088 wrote to memory of 4100 5088 91489557012035DraftBLFmKNNBRecd07Apr23CFM.exe colorcpl.exe PID 5088 wrote to memory of 4100 5088 91489557012035DraftBLFmKNNBRecd07Apr23CFM.exe colorcpl.exe PID 5088 wrote to memory of 4100 5088 91489557012035DraftBLFmKNNBRecd07Apr23CFM.exe colorcpl.exe PID 5088 wrote to memory of 4100 5088 91489557012035DraftBLFmKNNBRecd07Apr23CFM.exe colorcpl.exe PID 5088 wrote to memory of 4100 5088 91489557012035DraftBLFmKNNBRecd07Apr23CFM.exe colorcpl.exe PID 5088 wrote to memory of 4100 5088 91489557012035DraftBLFmKNNBRecd07Apr23CFM.exe colorcpl.exe PID 5088 wrote to memory of 4100 5088 91489557012035DraftBLFmKNNBRecd07Apr23CFM.exe colorcpl.exe PID 5088 wrote to memory of 4100 5088 91489557012035DraftBLFmKNNBRecd07Apr23CFM.exe colorcpl.exe PID 5088 wrote to memory of 4100 5088 91489557012035DraftBLFmKNNBRecd07Apr23CFM.exe colorcpl.exe PID 5088 wrote to memory of 4100 5088 91489557012035DraftBLFmKNNBRecd07Apr23CFM.exe colorcpl.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\91489557012035DraftBLFmKNNBRecd07Apr23CFM.exe"C:\Users\Admin\AppData\Local\Temp\91489557012035DraftBLFmKNNBRecd07Apr23CFM.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\colorcpl.exeC:\Windows\System32\colorcpl.exe2⤵PID:4100