Analysis
-
max time kernel
592s -
max time network
595s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2023, 13:41
Static task
static1
Behavioral task
behavioral1
Sample
INVOICE_.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
INVOICE_.exe
Resource
win10v2004-20230220-en
General
-
Target
INVOICE_.exe
-
Size
640KB
-
MD5
e312cfa4795acc6dec1d0891bdf8eb9f
-
SHA1
da376a18505b3cd7efca74468b39d9d47936bbde
-
SHA256
6ffecca0f0a3e6d020410a78a16e6e1dcb6dd11b898960e06ca3a64e2fa58e5c
-
SHA512
12a4243109692ef0b7fae5b53f4234d81ab8e0b5f75ce5b26b31c08b851e3078d897bed73cd9b2a54981091445aa17059049d806459b1a6df71e3d462dcf99e6
-
SSDEEP
12288:QHoqtbCdS9yJ2G6wkR009PzDVPSOKBxn:QINdS9m6rR009PNPrKv
Malware Config
Extracted
remcos
1.7 Pro
Host
churchboy2.ddns.net:2404
churchboy9.ddns.net:2404
churchboy19.ddns.net:2404
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
jhgcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
peoyqijw
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/4668-133-0x00000000027C0000-0x00000000027F2000-memory.dmp modiloader_stage2 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tviztuhi = "C:\\Users\\Public\\Libraries\\ihutzivT.url" INVOICE_.exe -
Script User-Agent 3 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 19 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 21 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 18 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4668 wrote to memory of 740 4668 INVOICE_.exe 89 PID 4668 wrote to memory of 740 4668 INVOICE_.exe 89 PID 4668 wrote to memory of 740 4668 INVOICE_.exe 89 PID 4668 wrote to memory of 740 4668 INVOICE_.exe 89 PID 4668 wrote to memory of 740 4668 INVOICE_.exe 89 PID 4668 wrote to memory of 740 4668 INVOICE_.exe 89 PID 4668 wrote to memory of 740 4668 INVOICE_.exe 89 PID 4668 wrote to memory of 740 4668 INVOICE_.exe 89 PID 4668 wrote to memory of 740 4668 INVOICE_.exe 89 PID 4668 wrote to memory of 740 4668 INVOICE_.exe 89 PID 4668 wrote to memory of 740 4668 INVOICE_.exe 89 PID 4668 wrote to memory of 740 4668 INVOICE_.exe 89 PID 4668 wrote to memory of 740 4668 INVOICE_.exe 89 PID 4668 wrote to memory of 740 4668 INVOICE_.exe 89 PID 4668 wrote to memory of 740 4668 INVOICE_.exe 89 PID 4668 wrote to memory of 740 4668 INVOICE_.exe 89 PID 4668 wrote to memory of 740 4668 INVOICE_.exe 89