Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2023, 01:28
Behavioral task
behavioral1
Sample
a2b750b127b533b54c4525eecfeb98f20a9923ed0e39cafbc60280dae6faec6c.exe
Resource
win7-20230712-en
General
-
Target
a2b750b127b533b54c4525eecfeb98f20a9923ed0e39cafbc60280dae6faec6c.exe
-
Size
232KB
-
MD5
4cc8305c3872eece74306734857cbe6c
-
SHA1
5a37e53e9b9848a08b9d141969f1479d7358845d
-
SHA256
a2b750b127b533b54c4525eecfeb98f20a9923ed0e39cafbc60280dae6faec6c
-
SHA512
90631422dc22099872f6b246b750c7a69256129ae29e6cb726c5a15ac189f045ff7d331ce80a2f0aa0b2c4a2aaf175f377ec8b3d45d0bc7d5fbdcddc23d6c0f9
-
SSDEEP
6144:avGSN9gWuLpcBKnVBYAsmrzpyDfOXXV1BYj:avbGWulcBKV3uOXKj
Malware Config
Extracted
remcos
wytAUgust
exbanebiec.duckdns.org:9596
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-SDMP35
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
NirSoft MailPassView 2 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/2040-145-0x0000000000400000-0x0000000000457000-memory.dmp MailPassView behavioral2/memory/2040-155-0x0000000000400000-0x0000000000457000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 2 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/4016-143-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView behavioral2/memory/4016-159-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Nirsoft 6 IoCs
resource yara_rule behavioral2/memory/4016-143-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral2/memory/2040-145-0x0000000000400000-0x0000000000457000-memory.dmp Nirsoft behavioral2/memory/4236-152-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/4236-156-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/2040-155-0x0000000000400000-0x0000000000457000-memory.dmp Nirsoft behavioral2/memory/4016-159-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/4704-133-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral2/memory/4704-166-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral2/memory/4704-168-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral2/memory/4704-172-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral2/memory/4704-175-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral2/memory/4704-179-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral2/memory/4704-182-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral2/memory/4704-185-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral2/memory/4704-188-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral2/memory/4704-191-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral2/memory/4704-193-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral2/memory/4704-196-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral2/memory/4704-199-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral2/memory/4704-205-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral2/memory/4704-208-0x0000000000400000-0x0000000000489000-memory.dmp upx -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4704 set thread context of 4016 4704 a2b750b127b533b54c4525eecfeb98f20a9923ed0e39cafbc60280dae6faec6c.exe 85 PID 4704 set thread context of 2040 4704 a2b750b127b533b54c4525eecfeb98f20a9923ed0e39cafbc60280dae6faec6c.exe 86 PID 4704 set thread context of 4236 4704 a2b750b127b533b54c4525eecfeb98f20a9923ed0e39cafbc60280dae6faec6c.exe 87 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4016 a2b750b127b533b54c4525eecfeb98f20a9923ed0e39cafbc60280dae6faec6c.exe 4016 a2b750b127b533b54c4525eecfeb98f20a9923ed0e39cafbc60280dae6faec6c.exe 4236 a2b750b127b533b54c4525eecfeb98f20a9923ed0e39cafbc60280dae6faec6c.exe 4236 a2b750b127b533b54c4525eecfeb98f20a9923ed0e39cafbc60280dae6faec6c.exe 4016 a2b750b127b533b54c4525eecfeb98f20a9923ed0e39cafbc60280dae6faec6c.exe 4016 a2b750b127b533b54c4525eecfeb98f20a9923ed0e39cafbc60280dae6faec6c.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 4704 a2b750b127b533b54c4525eecfeb98f20a9923ed0e39cafbc60280dae6faec6c.exe 4704 a2b750b127b533b54c4525eecfeb98f20a9923ed0e39cafbc60280dae6faec6c.exe 4704 a2b750b127b533b54c4525eecfeb98f20a9923ed0e39cafbc60280dae6faec6c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4236 a2b750b127b533b54c4525eecfeb98f20a9923ed0e39cafbc60280dae6faec6c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4704 a2b750b127b533b54c4525eecfeb98f20a9923ed0e39cafbc60280dae6faec6c.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4704 wrote to memory of 4016 4704 a2b750b127b533b54c4525eecfeb98f20a9923ed0e39cafbc60280dae6faec6c.exe 85 PID 4704 wrote to memory of 4016 4704 a2b750b127b533b54c4525eecfeb98f20a9923ed0e39cafbc60280dae6faec6c.exe 85 PID 4704 wrote to memory of 4016 4704 a2b750b127b533b54c4525eecfeb98f20a9923ed0e39cafbc60280dae6faec6c.exe 85 PID 4704 wrote to memory of 2040 4704 a2b750b127b533b54c4525eecfeb98f20a9923ed0e39cafbc60280dae6faec6c.exe 86 PID 4704 wrote to memory of 2040 4704 a2b750b127b533b54c4525eecfeb98f20a9923ed0e39cafbc60280dae6faec6c.exe 86 PID 4704 wrote to memory of 2040 4704 a2b750b127b533b54c4525eecfeb98f20a9923ed0e39cafbc60280dae6faec6c.exe 86 PID 4704 wrote to memory of 4236 4704 a2b750b127b533b54c4525eecfeb98f20a9923ed0e39cafbc60280dae6faec6c.exe 87 PID 4704 wrote to memory of 4236 4704 a2b750b127b533b54c4525eecfeb98f20a9923ed0e39cafbc60280dae6faec6c.exe 87 PID 4704 wrote to memory of 4236 4704 a2b750b127b533b54c4525eecfeb98f20a9923ed0e39cafbc60280dae6faec6c.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2b750b127b533b54c4525eecfeb98f20a9923ed0e39cafbc60280dae6faec6c.exe"C:\Users\Admin\AppData\Local\Temp\a2b750b127b533b54c4525eecfeb98f20a9923ed0e39cafbc60280dae6faec6c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\a2b750b127b533b54c4525eecfeb98f20a9923ed0e39cafbc60280dae6faec6c.exeC:\Users\Admin\AppData\Local\Temp\a2b750b127b533b54c4525eecfeb98f20a9923ed0e39cafbc60280dae6faec6c.exe /stext "C:\Users\Admin\AppData\Local\Temp\becbqejjkc"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4016
-
-
C:\Users\Admin\AppData\Local\Temp\a2b750b127b533b54c4525eecfeb98f20a9923ed0e39cafbc60280dae6faec6c.exeC:\Users\Admin\AppData\Local\Temp\a2b750b127b533b54c4525eecfeb98f20a9923ed0e39cafbc60280dae6faec6c.exe /stext "C:\Users\Admin\AppData\Local\Temp\dgpujwudykpdf"2⤵PID:2040
-
-
C:\Users\Admin\AppData\Local\Temp\a2b750b127b533b54c4525eecfeb98f20a9923ed0e39cafbc60280dae6faec6c.exeC:\Users\Admin\AppData\Local\Temp\a2b750b127b533b54c4525eecfeb98f20a9923ed0e39cafbc60280dae6faec6c.exe /stext "C:\Users\Admin\AppData\Local\Temp\obunjpffmshipyql"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD552061a75d20c0829a0bc5adf1dc2f19d
SHA19646d76068c0c8a1281eccb76e27b7f835d40481
SHA25641ac485cfcedc8d8aa3bc51b7e768dab291f740d390e586ecb07a56a577e45e9
SHA512c7254475b6b6a0b85ce64ae1ac5fa3fbbf15538b9123031429cd2d1ddf2d976360e3a8297a2fe591037210b5c14ade19763baf084fd256e65614add2174d2164
-
Filesize
4KB
MD53a76b7ef67ef3e8e1f6224d8d1dfd6f6
SHA191ab70d5235504d9382187d324d105e0ec9f18b6
SHA256b4e6c48d47450b4a7860837a4af913ea8d8080ae0f34b8328388c209181592cf
SHA5126040e0c4cb75632c8b131e6d130e8a5b8e265502500648bcd0af2919c1cbcafe0d0967e0141ab3768f8e1d6b3579914a20374139cd51065214da93753f07e0c3