Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2024 13:39
Static task
static1
Behavioral task
behavioral1
Sample
ORDER#4510093083_PO_NEW_MATERIAL_JAN_20242.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ORDER#4510093083_PO_NEW_MATERIAL_JAN_20242.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231215-en
General
-
Target
ORDER#4510093083_PO_NEW_MATERIAL_JAN_20242.exe
-
Size
483KB
-
MD5
5e5c4d53d4c51e067287b3b2c5a0ccb5
-
SHA1
cd2a82ebb5e573cd01c0b708a249401d35b9424d
-
SHA256
c6190f275806fbc359dfb1ce50790b29355215fa3b9671ea5a81ac35293b9de3
-
SHA512
b5d32d5ee4fb3503278bf367f42c962887db26202640e86ef2fa0ccf8cf95f0fd10c65ecb294b51d96616d12e09c601b561d7da55bf42e73d094cb8af08a5999
-
SSDEEP
6144:XGC7W7BUJEflHwJVUesOjc3kv9MNfvfUuAhbLCrJHvg+JEVV8nU/uwtzSEdyS+tZ:Na7rNQJJpjcgyfvfUPs2PD4EdaMAboDQ
Malware Config
Extracted
remcos
2024
72.11.158.94:1604
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
vexplorers.exe
-
copy_folder
vexplorers
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-800RNZ
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
NirSoft MailPassView 2 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/1728-78-0x0000000000400000-0x0000000000457000-memory.dmp MailPassView behavioral2/memory/1728-80-0x0000000000400000-0x0000000000457000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 2 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/3296-74-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView behavioral2/memory/3296-95-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Nirsoft 7 IoCs
resource yara_rule behavioral2/memory/3296-74-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral2/memory/1728-78-0x0000000000400000-0x0000000000457000-memory.dmp Nirsoft behavioral2/memory/980-85-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/980-87-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/980-88-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/1728-80-0x0000000000400000-0x0000000000457000-memory.dmp Nirsoft behavioral2/memory/3296-95-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation ORDER#4510093083_PO_NEW_MATERIAL_JAN_20242.exe -
Executes dropped EXE 4 IoCs
pid Process 4732 vexplorers.exe 3296 vexplorers.exe 1728 vexplorers.exe 980 vexplorers.exe -
Loads dropped DLL 5 IoCs
pid Process 868 ORDER#4510093083_PO_NEW_MATERIAL_JAN_20242.exe 868 ORDER#4510093083_PO_NEW_MATERIAL_JAN_20242.exe 4732 vexplorers.exe 4732 vexplorers.exe 2092 vexplorers.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vexplorers.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-800RNZ = "\"C:\\ProgramData\\vexplorers\\vexplorers.exe\"" vexplorers.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Henk = "C:\\Users\\Admin\\AppData\\Roaming\\Nonconsolable\\Spirituosa.exe" ORDER#4510093083_PO_NEW_MATERIAL_JAN_20242.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rmc-800RNZ = "\"C:\\ProgramData\\vexplorers\\vexplorers.exe\"" ORDER#4510093083_PO_NEW_MATERIAL_JAN_20242.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-800RNZ = "\"C:\\ProgramData\\vexplorers\\vexplorers.exe\"" ORDER#4510093083_PO_NEW_MATERIAL_JAN_20242.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Henk = "C:\\Users\\Admin\\AppData\\Roaming\\Nonconsolable\\Spirituosa.exe" vexplorers.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rmc-800RNZ = "\"C:\\ProgramData\\vexplorers\\vexplorers.exe\"" vexplorers.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
pid Process 3568 ORDER#4510093083_PO_NEW_MATERIAL_JAN_20242.exe 2092 vexplorers.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 868 ORDER#4510093083_PO_NEW_MATERIAL_JAN_20242.exe 3568 ORDER#4510093083_PO_NEW_MATERIAL_JAN_20242.exe 4732 vexplorers.exe 2092 vexplorers.exe -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 868 set thread context of 3568 868 ORDER#4510093083_PO_NEW_MATERIAL_JAN_20242.exe 91 PID 4732 set thread context of 2092 4732 vexplorers.exe 94 PID 2092 set thread context of 4080 2092 vexplorers.exe 95 PID 2092 set thread context of 3296 2092 vexplorers.exe 96 PID 2092 set thread context of 1728 2092 vexplorers.exe 97 PID 2092 set thread context of 980 2092 vexplorers.exe 98 PID 2092 set thread context of 716 2092 vexplorers.exe 101 -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\udskamningen.com ORDER#4510093083_PO_NEW_MATERIAL_JAN_20242.exe File opened for modification C:\Windows\payout\opsigt.nic ORDER#4510093083_PO_NEW_MATERIAL_JAN_20242.exe File opened for modification C:\Windows\udskamningen.com vexplorers.exe File opened for modification C:\Windows\payout\opsigt.nic vexplorers.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2308 2092 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3296 vexplorers.exe 3296 vexplorers.exe 980 vexplorers.exe 980 vexplorers.exe 3296 vexplorers.exe 3296 vexplorers.exe -
Suspicious behavior: MapViewOfSection 9 IoCs
pid Process 868 ORDER#4510093083_PO_NEW_MATERIAL_JAN_20242.exe 4732 vexplorers.exe 2092 vexplorers.exe 2092 vexplorers.exe 2092 vexplorers.exe 2092 vexplorers.exe 2092 vexplorers.exe 2092 vexplorers.exe 2092 vexplorers.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 980 vexplorers.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 868 wrote to memory of 3568 868 ORDER#4510093083_PO_NEW_MATERIAL_JAN_20242.exe 91 PID 868 wrote to memory of 3568 868 ORDER#4510093083_PO_NEW_MATERIAL_JAN_20242.exe 91 PID 868 wrote to memory of 3568 868 ORDER#4510093083_PO_NEW_MATERIAL_JAN_20242.exe 91 PID 868 wrote to memory of 3568 868 ORDER#4510093083_PO_NEW_MATERIAL_JAN_20242.exe 91 PID 868 wrote to memory of 3568 868 ORDER#4510093083_PO_NEW_MATERIAL_JAN_20242.exe 91 PID 3568 wrote to memory of 4732 3568 ORDER#4510093083_PO_NEW_MATERIAL_JAN_20242.exe 93 PID 3568 wrote to memory of 4732 3568 ORDER#4510093083_PO_NEW_MATERIAL_JAN_20242.exe 93 PID 3568 wrote to memory of 4732 3568 ORDER#4510093083_PO_NEW_MATERIAL_JAN_20242.exe 93 PID 4732 wrote to memory of 2092 4732 vexplorers.exe 94 PID 4732 wrote to memory of 2092 4732 vexplorers.exe 94 PID 4732 wrote to memory of 2092 4732 vexplorers.exe 94 PID 4732 wrote to memory of 2092 4732 vexplorers.exe 94 PID 4732 wrote to memory of 2092 4732 vexplorers.exe 94 PID 2092 wrote to memory of 4080 2092 vexplorers.exe 95 PID 2092 wrote to memory of 4080 2092 vexplorers.exe 95 PID 2092 wrote to memory of 4080 2092 vexplorers.exe 95 PID 2092 wrote to memory of 4080 2092 vexplorers.exe 95 PID 2092 wrote to memory of 3296 2092 vexplorers.exe 96 PID 2092 wrote to memory of 3296 2092 vexplorers.exe 96 PID 2092 wrote to memory of 3296 2092 vexplorers.exe 96 PID 2092 wrote to memory of 1728 2092 vexplorers.exe 97 PID 2092 wrote to memory of 1728 2092 vexplorers.exe 97 PID 2092 wrote to memory of 1728 2092 vexplorers.exe 97 PID 2092 wrote to memory of 980 2092 vexplorers.exe 98 PID 2092 wrote to memory of 980 2092 vexplorers.exe 98 PID 2092 wrote to memory of 980 2092 vexplorers.exe 98 PID 2092 wrote to memory of 2524 2092 vexplorers.exe 99 PID 2092 wrote to memory of 2524 2092 vexplorers.exe 99 PID 2092 wrote to memory of 2524 2092 vexplorers.exe 99 PID 2092 wrote to memory of 724 2092 vexplorers.exe 100 PID 2092 wrote to memory of 724 2092 vexplorers.exe 100 PID 2092 wrote to memory of 724 2092 vexplorers.exe 100 PID 2092 wrote to memory of 716 2092 vexplorers.exe 101 PID 2092 wrote to memory of 716 2092 vexplorers.exe 101 PID 2092 wrote to memory of 716 2092 vexplorers.exe 101 PID 2092 wrote to memory of 716 2092 vexplorers.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\ORDER#4510093083_PO_NEW_MATERIAL_JAN_20242.exe"C:\Users\Admin\AppData\Local\Temp\ORDER#4510093083_PO_NEW_MATERIAL_JAN_20242.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Users\Admin\AppData\Local\Temp\ORDER#4510093083_PO_NEW_MATERIAL_JAN_20242.exe"C:\Users\Admin\AppData\Local\Temp\ORDER#4510093083_PO_NEW_MATERIAL_JAN_20242.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\ProgramData\vexplorers\vexplorers.exe"C:\ProgramData\vexplorers\vexplorers.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\ProgramData\vexplorers\vexplorers.exe"C:\ProgramData\vexplorers\vexplorers.exe"4⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:4080
-
-
C:\ProgramData\vexplorers\vexplorers.exeC:\ProgramData\vexplorers\vexplorers.exe /stext "C:\Users\Admin\AppData\Local\Temp\feirkmltutszfflmrybwbowovvxklosp"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3296
-
-
C:\ProgramData\vexplorers\vexplorers.exeC:\ProgramData\vexplorers\vexplorers.exe /stext "C:\Users\Admin\AppData\Local\Temp\iynb"5⤵
- Executes dropped EXE
- Accesses Microsoft Outlook accounts
PID:1728
-
-
C:\ProgramData\vexplorers\vexplorers.exeC:\ProgramData\vexplorers\vexplorers.exe /stext "C:\Users\Admin\AppData\Local\Temp\satumxgp"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:980
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:2524
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:724
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 14845⤵
- Program crash
PID:2308
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2092 -ip 20921⤵PID:4828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
483KB
MD55e5c4d53d4c51e067287b3b2c5a0ccb5
SHA1cd2a82ebb5e573cd01c0b708a249401d35b9424d
SHA256c6190f275806fbc359dfb1ce50790b29355215fa3b9671ea5a81ac35293b9de3
SHA512b5d32d5ee4fb3503278bf367f42c962887db26202640e86ef2fa0ccf8cf95f0fd10c65ecb294b51d96616d12e09c601b561d7da55bf42e73d094cb8af08a5999
-
Filesize
257KB
MD55288e246130b4f57cded5916fae4f39b
SHA184697e73b082642f4de4e1ecb6c73f22ea57e0e3
SHA2564fbc84e9a1e75522b42fd3f8a0e8f6b5bb19fe04eed0a487157040d0057c9e77
SHA512758ea0231e480a0cd0a341235dc27389da81d0bb5e7b21d41edfedbefd53e2e52fb7754fc13863812aab8acdc4cdc7e012e7f9904069bbd2ac143948b6fbd86d
-
Filesize
4KB
MD5a4b83bf48e62a41c2f45628d10c5bba1
SHA12596a41d8da2eb88f7f69e27cc16a046a2287f35
SHA2567b29149f6971b7fba6137f401c2d515cc576dafd233b7d312dd7d818b9f91829
SHA512afcaee732127ad05cc70a2a9cca8e4ccdcacf8161b16ed4c5e346418a7c221f3da4f20d95b449fb813a6ccbd2aad05a3a9449a9db01f8fd5c132068d1cf4c7bd
-
Filesize
11KB
MD53e6bf00b3ac976122f982ae2aadb1c51
SHA1caab188f7fdc84d3fdcb2922edeeb5ed576bd31d
SHA2564ff9b2678d698677c5d9732678f9cf53f17290e09d053691aac4cc6e6f595cbe
SHA5121286f05e6a7e6b691f6e479638e7179897598e171b52eb3a3dc0e830415251069d29416b6d1ffc6d7dce8da5625e1479be06db9b7179e7776659c5c1ad6aa706
-
Filesize
483KB
MD5a7ec03cb53accf6dd62ac32f01160173
SHA11efdba6aba44dbd72fd48a115000c9fa6d542f47
SHA2565d3e517cf5732d40c54fe03d4786ee08c14b29cb5751c4993e2d351e7490e901
SHA51263fb1cfd5038c9051b0ad08d0f90a69c043aeb43b78596b5c733ef2112b44eb7c099f9b0e9daf52c3556a523a98466c223df94feeb5f64bd03f904c1590e2470
-
Filesize
245KB
MD5ced89e164bfe18cae1aa190b4ae9178c
SHA194c44c548980a6092706a4ffb943592d9d1f325b
SHA2561f2b3588330809595cb33273ed52c3d14299ca015eb8a70ccdc9ec4ad1ada7b2
SHA512946cecce44eebcdd63f948992926d96f7863238312dc85d31bef7cb2bec31e21c95222d2852a06d0af515961a5164aabcf966ad283794bfa0da7eddb130df93c