Analysis
-
max time kernel
113s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
21/10/2023, 18:02
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.NEAS015de283d33b7b246204fad78eaede87ab7939aaa34f035d59569aec3606747dexeexe_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.NEAS015de283d33b7b246204fad78eaede87ab7939aaa34f035d59569aec3606747dexeexe_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.NEAS015de283d33b7b246204fad78eaede87ab7939aaa34f035d59569aec3606747dexeexe_JC.exe
-
Size
909KB
-
MD5
1471855e22fc3165fffc6e371bc01feb
-
SHA1
acd40870c767d6a4590b0ba5abe8cffad7651de5
-
SHA256
015de283d33b7b246204fad78eaede87ab7939aaa34f035d59569aec3606747d
-
SHA512
419f8b0cc930569d92bc7eb8150bb6d6503d290ade994f04ca2b24dbeec3cf13d0bf506fe123e7b03dd933cbb85864ba93a1535982e8fdbbe2edc8f00c467973
-
SSDEEP
12288:OyQaMFM0Mvxv9pb4wWCr5RUggLg3pZgPBARN3qQ:Oyjv9Mwd7bcO4
Malware Config
Extracted
remcos
1.7 Pro
Independence
ascoitaliasasummer.duckdns.org:3030
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
Windows Sessions Start.exe
-
copy_folder
Microsoft Media Session
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%WinDir%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
Windows Display
-
keylog_path
%WinDir%
-
mouse_option
false
-
mutex
Windows Audio
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
Windows Sounds EndPoints
-
take_screenshot_option
true
-
take_screenshot_time
5
-
take_screenshot_title
Username;password;proforma;invoice;notepad
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2552 Windows Sessions Start.exe 1316 Windows Sessions Start.exe -
Loads dropped DLL 1 IoCs
pid Process 2520 cmd.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Sounds EndPoints = "\"C:\\Windows\\Microsoft Media Session\\Windows Sessions Start.exe\"" NEAS.NEAS015de283d33b7b246204fad78eaede87ab7939aaa34f035d59569aec3606747dexeexe_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Sounds EndPoints = "\"C:\\Windows\\Microsoft Media Session\\Windows Sessions Start.exe\"" NEAS.NEAS015de283d33b7b246204fad78eaede87ab7939aaa34f035d59569aec3606747dexeexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Sounds EndPoints = "\"C:\\Windows\\Microsoft Media Session\\Windows Sessions Start.exe\"" Windows Sessions Start.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Sounds EndPoints = "\"C:\\Windows\\Microsoft Media Session\\Windows Sessions Start.exe\"" Windows Sessions Start.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2808 set thread context of 2624 2808 NEAS.NEAS015de283d33b7b246204fad78eaede87ab7939aaa34f035d59569aec3606747dexeexe_JC.exe 30 PID 2552 set thread context of 1316 2552 Windows Sessions Start.exe 35 PID 1316 set thread context of 2792 1316 Windows Sessions Start.exe 36 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft Media Session\Windows Sessions Start.exe NEAS.NEAS015de283d33b7b246204fad78eaede87ab7939aaa34f035d59569aec3606747dexeexe_JC.exe File opened for modification C:\Windows\Microsoft Media Session NEAS.NEAS015de283d33b7b246204fad78eaede87ab7939aaa34f035d59569aec3606747dexeexe_JC.exe File created C:\Windows\Microsoft Media Session\Windows Sessions Start.exe NEAS.NEAS015de283d33b7b246204fad78eaede87ab7939aaa34f035d59569aec3606747dexeexe_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{33827B51-703C-11EE-B4EE-5AE3C8A3AD14} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2428 PING.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2948 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2948 iexplore.exe 2948 iexplore.exe 1924 IEXPLORE.EXE 1924 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2808 wrote to memory of 2624 2808 NEAS.NEAS015de283d33b7b246204fad78eaede87ab7939aaa34f035d59569aec3606747dexeexe_JC.exe 30 PID 2808 wrote to memory of 2624 2808 NEAS.NEAS015de283d33b7b246204fad78eaede87ab7939aaa34f035d59569aec3606747dexeexe_JC.exe 30 PID 2808 wrote to memory of 2624 2808 NEAS.NEAS015de283d33b7b246204fad78eaede87ab7939aaa34f035d59569aec3606747dexeexe_JC.exe 30 PID 2808 wrote to memory of 2624 2808 NEAS.NEAS015de283d33b7b246204fad78eaede87ab7939aaa34f035d59569aec3606747dexeexe_JC.exe 30 PID 2808 wrote to memory of 2624 2808 NEAS.NEAS015de283d33b7b246204fad78eaede87ab7939aaa34f035d59569aec3606747dexeexe_JC.exe 30 PID 2808 wrote to memory of 2624 2808 NEAS.NEAS015de283d33b7b246204fad78eaede87ab7939aaa34f035d59569aec3606747dexeexe_JC.exe 30 PID 2808 wrote to memory of 2624 2808 NEAS.NEAS015de283d33b7b246204fad78eaede87ab7939aaa34f035d59569aec3606747dexeexe_JC.exe 30 PID 2808 wrote to memory of 2624 2808 NEAS.NEAS015de283d33b7b246204fad78eaede87ab7939aaa34f035d59569aec3606747dexeexe_JC.exe 30 PID 2808 wrote to memory of 2624 2808 NEAS.NEAS015de283d33b7b246204fad78eaede87ab7939aaa34f035d59569aec3606747dexeexe_JC.exe 30 PID 2808 wrote to memory of 2624 2808 NEAS.NEAS015de283d33b7b246204fad78eaede87ab7939aaa34f035d59569aec3606747dexeexe_JC.exe 30 PID 2624 wrote to memory of 2520 2624 NEAS.NEAS015de283d33b7b246204fad78eaede87ab7939aaa34f035d59569aec3606747dexeexe_JC.exe 32 PID 2624 wrote to memory of 2520 2624 NEAS.NEAS015de283d33b7b246204fad78eaede87ab7939aaa34f035d59569aec3606747dexeexe_JC.exe 32 PID 2624 wrote to memory of 2520 2624 NEAS.NEAS015de283d33b7b246204fad78eaede87ab7939aaa34f035d59569aec3606747dexeexe_JC.exe 32 PID 2624 wrote to memory of 2520 2624 NEAS.NEAS015de283d33b7b246204fad78eaede87ab7939aaa34f035d59569aec3606747dexeexe_JC.exe 32 PID 2624 wrote to memory of 2520 2624 NEAS.NEAS015de283d33b7b246204fad78eaede87ab7939aaa34f035d59569aec3606747dexeexe_JC.exe 32 PID 2624 wrote to memory of 2520 2624 NEAS.NEAS015de283d33b7b246204fad78eaede87ab7939aaa34f035d59569aec3606747dexeexe_JC.exe 32 PID 2624 wrote to memory of 2520 2624 NEAS.NEAS015de283d33b7b246204fad78eaede87ab7939aaa34f035d59569aec3606747dexeexe_JC.exe 32 PID 2520 wrote to memory of 2428 2520 cmd.exe 33 PID 2520 wrote to memory of 2428 2520 cmd.exe 33 PID 2520 wrote to memory of 2428 2520 cmd.exe 33 PID 2520 wrote to memory of 2428 2520 cmd.exe 33 PID 2520 wrote to memory of 2552 2520 cmd.exe 34 PID 2520 wrote to memory of 2552 2520 cmd.exe 34 PID 2520 wrote to memory of 2552 2520 cmd.exe 34 PID 2520 wrote to memory of 2552 2520 cmd.exe 34 PID 2552 wrote to memory of 1316 2552 Windows Sessions Start.exe 35 PID 2552 wrote to memory of 1316 2552 Windows Sessions Start.exe 35 PID 2552 wrote to memory of 1316 2552 Windows Sessions Start.exe 35 PID 2552 wrote to memory of 1316 2552 Windows Sessions Start.exe 35 PID 2552 wrote to memory of 1316 2552 Windows Sessions Start.exe 35 PID 2552 wrote to memory of 1316 2552 Windows Sessions Start.exe 35 PID 2552 wrote to memory of 1316 2552 Windows Sessions Start.exe 35 PID 2552 wrote to memory of 1316 2552 Windows Sessions Start.exe 35 PID 2552 wrote to memory of 1316 2552 Windows Sessions Start.exe 35 PID 2552 wrote to memory of 1316 2552 Windows Sessions Start.exe 35 PID 1316 wrote to memory of 2792 1316 Windows Sessions Start.exe 36 PID 1316 wrote to memory of 2792 1316 Windows Sessions Start.exe 36 PID 1316 wrote to memory of 2792 1316 Windows Sessions Start.exe 36 PID 1316 wrote to memory of 2792 1316 Windows Sessions Start.exe 36 PID 1316 wrote to memory of 2792 1316 Windows Sessions Start.exe 36 PID 1316 wrote to memory of 2792 1316 Windows Sessions Start.exe 36 PID 1316 wrote to memory of 2792 1316 Windows Sessions Start.exe 36 PID 1316 wrote to memory of 2792 1316 Windows Sessions Start.exe 36 PID 1316 wrote to memory of 2792 1316 Windows Sessions Start.exe 36 PID 2792 wrote to memory of 2948 2792 iexplore.exe 37 PID 2792 wrote to memory of 2948 2792 iexplore.exe 37 PID 2792 wrote to memory of 2948 2792 iexplore.exe 37 PID 2792 wrote to memory of 2948 2792 iexplore.exe 37 PID 2948 wrote to memory of 1924 2948 iexplore.exe 39 PID 2948 wrote to memory of 1924 2948 iexplore.exe 39 PID 2948 wrote to memory of 1924 2948 iexplore.exe 39 PID 2948 wrote to memory of 1924 2948 iexplore.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.NEAS015de283d33b7b246204fad78eaede87ab7939aaa34f035d59569aec3606747dexeexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.NEAS015de283d33b7b246204fad78eaede87ab7939aaa34f035d59569aec3606747dexeexe_JC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\NEAS.NEAS015de283d33b7b246204fad78eaede87ab7939aaa34f035d59569aec3606747dexeexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.NEAS015de283d33b7b246204fad78eaede87ab7939aaa34f035d59569aec3606747dexeexe_JC.exe"2⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\PING.EXEPING 127.0.0.1 -n 24⤵
- Runs ping.exe
PID:2428
-
-
C:\Windows\Microsoft Media Session\Windows Sessions Start.exe"C:\Windows\Microsoft Media Session\Windows Sessions Start.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\Microsoft Media Session\Windows Sessions Start.exe"C:\Windows\Microsoft Media Session\Windows Sessions Start.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=iexplore.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.07⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2948 CREDAT:275457 /prefetch:28⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1924
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112B
MD540a998ff79f4402d4f33fea33d691229
SHA116719c08bf1008db7ae4cc7dcc32bc8a5c231102
SHA256c301c55862e8ec3d976b511dafd63f73cde752d8a3fd67a1c893f2c072fb06b5
SHA512d1d6ce31648d560007127f694df0ae18edc93d4a2bc12ff50771d6d21023c8a2f80acef95e27bb97be3f0cac986f7945adfcf68b15287022464b0d1092c99b98
-
Filesize
112B
MD540a998ff79f4402d4f33fea33d691229
SHA116719c08bf1008db7ae4cc7dcc32bc8a5c231102
SHA256c301c55862e8ec3d976b511dafd63f73cde752d8a3fd67a1c893f2c072fb06b5
SHA512d1d6ce31648d560007127f694df0ae18edc93d4a2bc12ff50771d6d21023c8a2f80acef95e27bb97be3f0cac986f7945adfcf68b15287022464b0d1092c99b98
-
Filesize
909KB
MD51471855e22fc3165fffc6e371bc01feb
SHA1acd40870c767d6a4590b0ba5abe8cffad7651de5
SHA256015de283d33b7b246204fad78eaede87ab7939aaa34f035d59569aec3606747d
SHA512419f8b0cc930569d92bc7eb8150bb6d6503d290ade994f04ca2b24dbeec3cf13d0bf506fe123e7b03dd933cbb85864ba93a1535982e8fdbbe2edc8f00c467973
-
Filesize
909KB
MD51471855e22fc3165fffc6e371bc01feb
SHA1acd40870c767d6a4590b0ba5abe8cffad7651de5
SHA256015de283d33b7b246204fad78eaede87ab7939aaa34f035d59569aec3606747d
SHA512419f8b0cc930569d92bc7eb8150bb6d6503d290ade994f04ca2b24dbeec3cf13d0bf506fe123e7b03dd933cbb85864ba93a1535982e8fdbbe2edc8f00c467973
-
Filesize
909KB
MD51471855e22fc3165fffc6e371bc01feb
SHA1acd40870c767d6a4590b0ba5abe8cffad7651de5
SHA256015de283d33b7b246204fad78eaede87ab7939aaa34f035d59569aec3606747d
SHA512419f8b0cc930569d92bc7eb8150bb6d6503d290ade994f04ca2b24dbeec3cf13d0bf506fe123e7b03dd933cbb85864ba93a1535982e8fdbbe2edc8f00c467973
-
Filesize
909KB
MD51471855e22fc3165fffc6e371bc01feb
SHA1acd40870c767d6a4590b0ba5abe8cffad7651de5
SHA256015de283d33b7b246204fad78eaede87ab7939aaa34f035d59569aec3606747d
SHA512419f8b0cc930569d92bc7eb8150bb6d6503d290ade994f04ca2b24dbeec3cf13d0bf506fe123e7b03dd933cbb85864ba93a1535982e8fdbbe2edc8f00c467973