Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2023, 16:14
Static task
static1
Behavioral task
behavioral1
Sample
1015SO9421INVPL7245577630screxe_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1015SO9421INVPL7245577630screxe_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
1015SO9421INVPL7245577630screxe_JC.exe
-
Size
919KB
-
MD5
5dd0bedc7f6f9096ca5abf564a7901d9
-
SHA1
f170d704ec220a6ef1fe6f2c2f0f755909004c00
-
SHA256
483d7f7379d43c9fb3effb226cb58a443f48105bda3a9a6310a76729d7c1b3bd
-
SHA512
d231e9247e9e72b0051f15ac7a19da10fe5fb18a6522a49d5da1a3d1ef72e41a0ade3d704e574b57ee6a451c56de7990f25f9e926fa3086298e619c5262b6bcf
-
SSDEEP
12288:4iM2/jjKqOW4hKAQc8MrmzwiysldDE0Igu95Pecpfj5hsLBpYCptgVkKnNAMYG:lLD40At88EysldD1Igu9xV5hyVtunNS
Malware Config
Extracted
remcos
RemoteHost
104.250.180.178:7902
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
MVPL-D815F2
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
NirSoft MailPassView 3 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/4892-38-0x0000000000400000-0x0000000000457000-memory.dmp MailPassView behavioral2/memory/4892-41-0x0000000000400000-0x0000000000457000-memory.dmp MailPassView behavioral2/memory/4892-45-0x0000000000400000-0x0000000000457000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 3 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/4704-36-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView behavioral2/memory/4704-39-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView behavioral2/memory/4704-48-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Nirsoft 9 IoCs
resource yara_rule behavioral2/memory/4704-36-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral2/memory/4892-38-0x0000000000400000-0x0000000000457000-memory.dmp Nirsoft behavioral2/memory/4704-39-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral2/memory/4204-40-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/4892-41-0x0000000000400000-0x0000000000457000-memory.dmp Nirsoft behavioral2/memory/4204-35-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/4892-45-0x0000000000400000-0x0000000000457000-memory.dmp Nirsoft behavioral2/memory/4204-46-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/4704-48-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts 1015SO9421INVPL7245577630screxe_JC.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3456 set thread context of 2080 3456 1015SO9421INVPL7245577630screxe_JC.exe 97 PID 2080 set thread context of 4704 2080 1015SO9421INVPL7245577630screxe_JC.exe 98 PID 2080 set thread context of 4892 2080 1015SO9421INVPL7245577630screxe_JC.exe 99 PID 2080 set thread context of 4204 2080 1015SO9421INVPL7245577630screxe_JC.exe 100 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4704 1015SO9421INVPL7245577630screxe_JC.exe 4704 1015SO9421INVPL7245577630screxe_JC.exe 4204 1015SO9421INVPL7245577630screxe_JC.exe 4204 1015SO9421INVPL7245577630screxe_JC.exe 4704 1015SO9421INVPL7245577630screxe_JC.exe 4704 1015SO9421INVPL7245577630screxe_JC.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2080 1015SO9421INVPL7245577630screxe_JC.exe 2080 1015SO9421INVPL7245577630screxe_JC.exe 2080 1015SO9421INVPL7245577630screxe_JC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4204 1015SO9421INVPL7245577630screxe_JC.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3456 wrote to memory of 2080 3456 1015SO9421INVPL7245577630screxe_JC.exe 97 PID 3456 wrote to memory of 2080 3456 1015SO9421INVPL7245577630screxe_JC.exe 97 PID 3456 wrote to memory of 2080 3456 1015SO9421INVPL7245577630screxe_JC.exe 97 PID 3456 wrote to memory of 2080 3456 1015SO9421INVPL7245577630screxe_JC.exe 97 PID 3456 wrote to memory of 2080 3456 1015SO9421INVPL7245577630screxe_JC.exe 97 PID 3456 wrote to memory of 2080 3456 1015SO9421INVPL7245577630screxe_JC.exe 97 PID 3456 wrote to memory of 2080 3456 1015SO9421INVPL7245577630screxe_JC.exe 97 PID 3456 wrote to memory of 2080 3456 1015SO9421INVPL7245577630screxe_JC.exe 97 PID 3456 wrote to memory of 2080 3456 1015SO9421INVPL7245577630screxe_JC.exe 97 PID 3456 wrote to memory of 2080 3456 1015SO9421INVPL7245577630screxe_JC.exe 97 PID 3456 wrote to memory of 2080 3456 1015SO9421INVPL7245577630screxe_JC.exe 97 PID 3456 wrote to memory of 2080 3456 1015SO9421INVPL7245577630screxe_JC.exe 97 PID 2080 wrote to memory of 4704 2080 1015SO9421INVPL7245577630screxe_JC.exe 98 PID 2080 wrote to memory of 4704 2080 1015SO9421INVPL7245577630screxe_JC.exe 98 PID 2080 wrote to memory of 4704 2080 1015SO9421INVPL7245577630screxe_JC.exe 98 PID 2080 wrote to memory of 4704 2080 1015SO9421INVPL7245577630screxe_JC.exe 98 PID 2080 wrote to memory of 4892 2080 1015SO9421INVPL7245577630screxe_JC.exe 99 PID 2080 wrote to memory of 4892 2080 1015SO9421INVPL7245577630screxe_JC.exe 99 PID 2080 wrote to memory of 4892 2080 1015SO9421INVPL7245577630screxe_JC.exe 99 PID 2080 wrote to memory of 4892 2080 1015SO9421INVPL7245577630screxe_JC.exe 99 PID 2080 wrote to memory of 4204 2080 1015SO9421INVPL7245577630screxe_JC.exe 100 PID 2080 wrote to memory of 4204 2080 1015SO9421INVPL7245577630screxe_JC.exe 100 PID 2080 wrote to memory of 4204 2080 1015SO9421INVPL7245577630screxe_JC.exe 100 PID 2080 wrote to memory of 4204 2080 1015SO9421INVPL7245577630screxe_JC.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\1015SO9421INVPL7245577630screxe_JC.exe"C:\Users\Admin\AppData\Local\Temp\1015SO9421INVPL7245577630screxe_JC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\1015SO9421INVPL7245577630screxe_JC.exe"C:\Users\Admin\AppData\Local\Temp\1015SO9421INVPL7245577630screxe_JC.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\1015SO9421INVPL7245577630screxe_JC.exeC:\Users\Admin\AppData\Local\Temp\1015SO9421INVPL7245577630screxe_JC.exe /stext "C:\Users\Admin\AppData\Local\Temp\dbpxddzzoqplngnjniolnxqelkq"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4704
-
-
C:\Users\Admin\AppData\Local\Temp\1015SO9421INVPL7245577630screxe_JC.exeC:\Users\Admin\AppData\Local\Temp\1015SO9421INVPL7245577630screxe_JC.exe /stext "C:\Users\Admin\AppData\Local\Temp\ovvhwvstkyhqxmjnwtjmybdvuzivye"3⤵
- Accesses Microsoft Outlook accounts
PID:4892
-
-
C:\Users\Admin\AppData\Local\Temp\1015SO9421INVPL7245577630screxe_JC.exeC:\Users\Admin\AppData\Local\Temp\1015SO9421INVPL7245577630screxe_JC.exe /stext "C:\Users\Admin\AppData\Local\Temp\qxaaxoduygzvatxrowwgboxmdgrwzpdsee"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4204
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD528cfa3f332aaea0dbc2c6b239ae55629
SHA169508ce857a1b4d2643967fa5438330fc5a919c3
SHA256f53cfdd9e5697f08e83d67f2b7436f116fa6fea044d3a7ac09e9f4257a148e85
SHA5122fdbb194c93111dc5c26df24a7e2d5a0994d05286b4541e09180a2fceb653f86cc6e7a8ed5ad1d1d461a280ab5c015aadbfb4e6c0f98aea6cb78828ffe288e54