Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 05:00
Static task
static1
Behavioral task
behavioral1
Sample
863037-Remittance Copy.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
863037-Remittance Copy.exe
Resource
win10v2004-20230915-en
General
-
Target
863037-Remittance Copy.exe
-
Size
565KB
-
MD5
5869b519a2ccb89f10567b53853a4d22
-
SHA1
c9e9d335d1a2413ed5aacfdc41ff1cfdbb0d899f
-
SHA256
9acb3802e7f15ac9c240749ff8c3ebe7a7cd660bedf4b6a6a1edef4de714aa43
-
SHA512
c5c3d25b7f13cc3659bf870c33529ade660defbfe856af336e808a6c583cd4bd700a0d7105c4f6567c1eb95dd38186c27840226dcb79fafdd99ca020402fc699
-
SSDEEP
12288:NHaiZscgfKciEpjetvBGtS1gIjVrKVXug+0lnX:+ViUub1RjVre+g+0l
Malware Config
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2572 set thread context of 2812 2572 863037-Remittance Copy.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2700 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2572 863037-Remittance Copy.exe 2812 863037-Remittance Copy.exe 2812 863037-Remittance Copy.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2572 863037-Remittance Copy.exe Token: SeDebugPrivilege 2812 863037-Remittance Copy.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2572 wrote to memory of 2700 2572 863037-Remittance Copy.exe 30 PID 2572 wrote to memory of 2700 2572 863037-Remittance Copy.exe 30 PID 2572 wrote to memory of 2700 2572 863037-Remittance Copy.exe 30 PID 2572 wrote to memory of 2700 2572 863037-Remittance Copy.exe 30 PID 2572 wrote to memory of 2812 2572 863037-Remittance Copy.exe 32 PID 2572 wrote to memory of 2812 2572 863037-Remittance Copy.exe 32 PID 2572 wrote to memory of 2812 2572 863037-Remittance Copy.exe 32 PID 2572 wrote to memory of 2812 2572 863037-Remittance Copy.exe 32 PID 2572 wrote to memory of 2812 2572 863037-Remittance Copy.exe 32 PID 2572 wrote to memory of 2812 2572 863037-Remittance Copy.exe 32 PID 2572 wrote to memory of 2812 2572 863037-Remittance Copy.exe 32 PID 2572 wrote to memory of 2812 2572 863037-Remittance Copy.exe 32 PID 2572 wrote to memory of 2812 2572 863037-Remittance Copy.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\863037-Remittance Copy.exe"C:\Users\Admin\AppData\Local\Temp\863037-Remittance Copy.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ekybpZarpIGq" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF8E0.tmp"2⤵
- Creates scheduled task(s)
PID:2700
-
-
C:\Users\Admin\AppData\Local\Temp\863037-Remittance Copy.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50cf5a624b38c22ad230394e2e101cd23
SHA1657b0cd6942926313570bb734884feab49d6a756
SHA2566f59b3b8c762381ae08343e807ab28f2a20e29cbd5860530bab9ff2bb2e907b3
SHA512eca0eea6484d2998c7266c4443b00ed1e3a2b74aefabc31209ca50939657ab85b39387376a20c92a463c54ecafb8655d55d10e35bd3494b20d3304e3ab7cedd3