Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2023, 12:36
Static task
static1
Behavioral task
behavioral1
Sample
INVOICE_.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
INVOICE_.exe
Resource
win10v2004-20230220-en
General
-
Target
INVOICE_.exe
-
Size
691KB
-
MD5
8127e66425f32e91d5f8c2a886ac7ba3
-
SHA1
1ecf360af1fec8126558c99b9ce57da037a948a6
-
SHA256
9c17a5f35030aefa2086fdf89a91d113d66f98ad3d6abdf2fdf8512d8514ad3b
-
SHA512
55ff6332db7f4b2056a82e6ff35087f7ba92077e563cc5cccc7ec10f83bd710de2894beded617765095b5d67d00c0ec631445f9d32204226b85ca63dcc8574bd
-
SSDEEP
12288:kwU+YPHr4rE/NZYAVM6Gw3F7NeiugicyPjDjPVRnR11qb:klB/YNpw17NNugihDDPRXqb
Malware Config
Extracted
remcos
1.7 Pro
Host
churchboy2.ddns.net:2404
churchboy9.ddns.net:2404
churchboy19.ddns.net:2404
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
jhgcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
peoyqijw
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/1244-134-0x00000000023D0000-0x0000000002402000-memory.dmp modiloader_stage2 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Qsmjpnoj = "C:\\Users\\Public\\Libraries\\jonpjmsQ.url" INVOICE_.exe -
Script User-Agent 3 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 41 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 37 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 39 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2660 1244 INVOICE_.exe 90 PID 1244 wrote to memory of 2660 1244 INVOICE_.exe 90 PID 1244 wrote to memory of 2660 1244 INVOICE_.exe 90 PID 1244 wrote to memory of 2660 1244 INVOICE_.exe 90 PID 1244 wrote to memory of 2660 1244 INVOICE_.exe 90 PID 1244 wrote to memory of 2660 1244 INVOICE_.exe 90 PID 1244 wrote to memory of 2660 1244 INVOICE_.exe 90 PID 1244 wrote to memory of 2660 1244 INVOICE_.exe 90 PID 1244 wrote to memory of 2660 1244 INVOICE_.exe 90 PID 1244 wrote to memory of 2660 1244 INVOICE_.exe 90 PID 1244 wrote to memory of 2660 1244 INVOICE_.exe 90 PID 1244 wrote to memory of 2660 1244 INVOICE_.exe 90 PID 1244 wrote to memory of 2660 1244 INVOICE_.exe 90 PID 1244 wrote to memory of 2660 1244 INVOICE_.exe 90 PID 1244 wrote to memory of 2660 1244 INVOICE_.exe 90 PID 1244 wrote to memory of 2660 1244 INVOICE_.exe 90 PID 1244 wrote to memory of 2660 1244 INVOICE_.exe 90