Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2024, 14:56
Static task
static1
Behavioral task
behavioral1
Sample
a4b8aa74ad2cbd0637fde253fe274e83.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a4b8aa74ad2cbd0637fde253fe274e83.exe
Resource
win10v2004-20231215-en
General
-
Target
a4b8aa74ad2cbd0637fde253fe274e83.exe
-
Size
1.3MB
-
MD5
a4b8aa74ad2cbd0637fde253fe274e83
-
SHA1
33fcb9720d1995b44b04851ef407e6ad0e50a268
-
SHA256
20a6b7999fb3ff90688026a1c27ba38b36a2b164f949fc340373832388abf727
-
SHA512
82ee46fc2122fae3d168e06f0fdb39090135d6a5464072fa7ba74799a2bd18a98eb68f7e1b34b23f46641322e930e10f5cde38a956672f3d0f1ee09e17c181d3
-
SSDEEP
24576:BAHnh+eWsN3skA4RV1Hom2KXMmHadTm8wSntzVmaziyUqtkRzUhUzLqtkg5:Yh+ZkldoPK8YadHw812BjRzUhwLqtT
Malware Config
Extracted
remcos
RemoteHost
107.175.229.139:8087
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
yes.png
-
keylog_flag
false
-
keylog_folder
aka
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
jhudguiytgu-AAHEXC
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
NirSoft MailPassView 2 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/3404-60-0x0000000000400000-0x0000000000457000-memory.dmp MailPassView behavioral2/memory/3404-56-0x0000000000400000-0x0000000000457000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 2 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/4132-50-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView behavioral2/memory/4132-65-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Nirsoft 6 IoCs
resource yara_rule behavioral2/memory/4132-50-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral2/memory/3404-60-0x0000000000400000-0x0000000000457000-memory.dmp Nirsoft behavioral2/memory/3404-56-0x0000000000400000-0x0000000000457000-memory.dmp Nirsoft behavioral2/memory/3360-63-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/3360-62-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/4132-65-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs name.exe -
Executes dropped EXE 4 IoCs
pid Process 4824 name.exe 4132 name.exe 3404 name.exe 3360 name.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts name.exe -
AutoIT Executable 5 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0003000000022718-13.dat autoit_exe behavioral2/files/0x0003000000022718-14.dat autoit_exe behavioral2/files/0x0003000000022718-42.dat autoit_exe behavioral2/files/0x0003000000022718-45.dat autoit_exe behavioral2/files/0x0003000000022718-52.dat autoit_exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4824 set thread context of 4132 4824 name.exe 97 PID 4824 set thread context of 3404 4824 name.exe 98 PID 4824 set thread context of 3360 4824 name.exe 99 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4132 name.exe 4132 name.exe 3360 name.exe 3360 name.exe 4132 name.exe 4132 name.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 4824 name.exe 4824 name.exe 4824 name.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3360 name.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4808 wrote to memory of 4824 4808 a4b8aa74ad2cbd0637fde253fe274e83.exe 94 PID 4808 wrote to memory of 4824 4808 a4b8aa74ad2cbd0637fde253fe274e83.exe 94 PID 4808 wrote to memory of 4824 4808 a4b8aa74ad2cbd0637fde253fe274e83.exe 94 PID 4824 wrote to memory of 4132 4824 name.exe 97 PID 4824 wrote to memory of 4132 4824 name.exe 97 PID 4824 wrote to memory of 4132 4824 name.exe 97 PID 4824 wrote to memory of 4132 4824 name.exe 97 PID 4824 wrote to memory of 3404 4824 name.exe 98 PID 4824 wrote to memory of 3404 4824 name.exe 98 PID 4824 wrote to memory of 3404 4824 name.exe 98 PID 4824 wrote to memory of 3404 4824 name.exe 98 PID 4824 wrote to memory of 3360 4824 name.exe 99 PID 4824 wrote to memory of 3360 4824 name.exe 99 PID 4824 wrote to memory of 3360 4824 name.exe 99 PID 4824 wrote to memory of 3360 4824 name.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4b8aa74ad2cbd0637fde253fe274e83.exe"C:\Users\Admin\AppData\Local\Temp\a4b8aa74ad2cbd0637fde253fe274e83.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\Temp\a4b8aa74ad2cbd0637fde253fe274e83.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\directory\name.exeC:\Users\Admin\AppData\Local\directory\name.exe /stext "C:\Users\Admin\AppData\Local\Temp\deyvhradngjjnjushnaxrblmowwmdwjgn"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4132
-
-
C:\Users\Admin\AppData\Local\directory\name.exeC:\Users\Admin\AppData\Local\directory\name.exe /stext "C:\Users\Admin\AppData\Local\Temp\fgdgi"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook accounts
PID:3404
-
-
C:\Users\Admin\AppData\Local\directory\name.exeC:\Users\Admin\AppData\Local\directory\name.exe /stext "C:\Users\Admin\AppData\Local\Temp\qajzacezp"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3360
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5fdaa8866c905accc6ed1cb0f204b0f2c
SHA1cf3a1f2d3841e3d52f3875df2bc1ff667ba8c774
SHA25696db24a652541fb09e22d3dc23495c0475a4dbd2bd2dd6bb4d2aa98b1ae591ad
SHA51202fae866918ca0250be91c2b85baf1a65d5cb295e6f995f0814c0a20ad1192a78f44b8a456bf1b52c9e202d523e7685157cbd2930bec483481463b7926309f2f
-
Filesize
29KB
MD56095b3a6322d084d755577894297de0f
SHA1b8c97c4350364e2157376b90f0b66a40e9bfbbea
SHA256bfd80df7b9ce9e3299227cbb03fa95142bed451d842b50a0523bcaa532ae7a06
SHA5127700d0090e812b3c195246df71901c51383c810b962aafd94f006caa7e3353a83308fb905c3800488ed1300d4c7cd49602696f1871db9fa20bb7efe8d9940427
-
Filesize
2.4MB
MD592be7bd812e3d1dbef1a35f9b3a24b84
SHA10b94f227f832e8f98a1e1aca7db721c945551281
SHA256c22fad63b760a3223c66be5445096bdbef8e892a82d4e4e339f95b3167a3ae3e
SHA512d0285ba2ed99bf4e0d790454303d18ca710eac1e7bfada9cdb4f323fc8326596ea115123a45b5287f84f9cac9373e55073eaaa54034221eb856527c67dc5fcef
-
Filesize
2.8MB
MD538df23fb5a7b5503528422147e32fee1
SHA1b610459e6cf42496543ccb99a76d5cf5d7804cbb
SHA256c71fc5add23095cb8cd59d5e8904ceabcba45a2915da7381a06b6fea51bb7b5c
SHA51206c015df97209972077822c33043793e1c378b7b241b05f30932d707baf2cfbf890e72a30a9c2c2cde910305647fe055e7cb6180c536ae7cfcf692ea55db9fe4
-
Filesize
2.2MB
MD56f8de56d2037c8ad8084f3dfc35741eb
SHA18b7f81ed658a3730aa4e6fb10a4ee3c67f64471e
SHA256b2270175eff35604d9267bd213ba72aff27bc2c534a647f172c91f508b675865
SHA51204efe6c3033506a291b573200d03297721917a087f6a5a81c3caf9b9a08d987ee97ad1694d6998c20d30ab0a6ef21bb017bc7bd4f594762d6f57740bd8269142
-
Filesize
2.5MB
MD57d3924e7f4e69e0d134eefac59e982ac
SHA16ac759af10077e4f9caa206848594336f00a15be
SHA256a0bc5b0408958a0c356be56fc653642e7ab5b68688423c6b0e332becdb36a473
SHA512920d8cd2c09a00adb472a4ae84be9a50573698cd81394a635e6813c7b615727005f4deeb823b921071068abb635be72c34bc3fc74488d825328ee3620b05b1c8
-
Filesize
2.6MB
MD53dca99b930dce4d5fb1ecc3e64e77123
SHA10a56b07a43d774011e1be9901e73ed60d25b3c78
SHA256c0b5876fc17699e8e648f84af3a70dcb28dcaec4586f3b612f681fe249824796
SHA5126af2239144f1949728d6f3553bc5b96a39c2e6d4753d03edbfa2547e006b3814c4a46aecf7fbd054c180192ba928c6c447b9a2d99983b567cd5ba1906c10e737
-
Filesize
144B
MD5ab60012bdc08732d712b655c641e5a5c
SHA188d1fd4548fc3d37a0465e7f90abf8a0600ca90a
SHA25610ee1b7ba14408c421130b3b589f185c2a8fca4a7e490283d5ffca0145bb4c94
SHA512d4ca93c37a94f476e66e34a65de86aa931f9fb5a7a48d283243e6c12ad68a64d3b3aaa824a398ded3a707323a45762658fac93ae0aa738eabe6442e3f5c05cdc