Analysis

  • max time kernel
    91s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-02-2024 16:34

General

  • Target

    ORDER#4510093083_PO_NEW_MATERIAL_JAN_2024_PO.exe

  • Size

    2.4MB

  • MD5

    1414d0efbbb09adb1ba13bf4425674e2

  • SHA1

    6baa8796c4b669fbdcb6bcbdae2a54c83ddee8cc

  • SHA256

    f99f95fa5cd8015a84c6aef4ce0444b5e26e8c6bff54c13335a4d1a92201418c

  • SHA512

    73bb2737f9ef75661a038eac9c5921cd2e5260b4af032a0aa6950b322114181df541b6cb606490bc81bab152f43b5dc5104a7be142f0121da24f951f9fc2c776

  • SSDEEP

    49152:vgzFgXJBY8OQ7HnUjp3i1JNQvjJO0amGSNTgj8tff0JtvViqfKHv1uBERCZju:YzIjr7Hnspy1JNkKJSNTgaXOVGv1uSR5

Malware Config

Extracted

Family

remcos

Botnet

2024

C2

72.11.158.94:1604

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    vexplorers.exe

  • copy_folder

    vexplorers

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-800RNZ

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • NirSoft MailPassView 2 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 2 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 7 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ORDER#4510093083_PO_NEW_MATERIAL_JAN_2024_PO.exe
    "C:\Users\Admin\AppData\Local\Temp\ORDER#4510093083_PO_NEW_MATERIAL_JAN_2024_PO.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:4716
    • C:\Users\Admin\AppData\Local\Temp\ORDER#4510093083_PO_NEW_MATERIAL_JAN_2024_PO.exe
      "C:\Users\Admin\AppData\Local\Temp\ORDER#4510093083_PO_NEW_MATERIAL_JAN_2024_PO.exe"
      2⤵
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of NtCreateThreadExHideFromDebugger
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of WriteProcessMemory
      PID:4692
      • C:\ProgramData\vexplorers\vexplorers.exe
        "C:\ProgramData\vexplorers\vexplorers.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:2564
        • C:\ProgramData\vexplorers\vexplorers.exe
          "C:\ProgramData\vexplorers\vexplorers.exe"
          4⤵
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of NtCreateThreadExHideFromDebugger
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:380
          • C:\Windows\SysWOW64\svchost.exe
            svchost.exe
            5⤵
              PID:2284
            • C:\ProgramData\vexplorers\vexplorers.exe
              C:\ProgramData\vexplorers\vexplorers.exe /stext "C:\Users\Admin\AppData\Local\Temp\ttxwbxzoaesvrirmxfossaawsdqimpyqqp"
              5⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3584
            • C:\ProgramData\vexplorers\vexplorers.exe
              C:\ProgramData\vexplorers\vexplorers.exe /stext "C:\Users\Admin\AppData\Local\Temp\jrjlafonmwaqhbdioccqhofnjwyztmh"
              5⤵
              • Executes dropped EXE
              • Accesses Microsoft Outlook accounts
              PID:656
            • C:\ProgramData\vexplorers\vexplorers.exe
              C:\ProgramData\vexplorers\vexplorers.exe /stext "C:\Users\Admin\AppData\Local\Temp\gxetzmwtyoilfvhewrpxejtwjipq"
              5⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:1128
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 1412
              5⤵
              • Program crash
              PID:1724
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 380 -ip 380
      1⤵
        PID:3816

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Persistence

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Privilege Escalation

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Defense Evasion

      Modify Registry

      1
      T1112

      Credential Access

      Unsecured Credentials

      1
      T1552

      Credentials In Files

      1
      T1552.001

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      2
      T1082

      Collection

      Data from Local System

      1
      T1005

      Email Collection

      1
      T1114

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\vexplorers\vexplorers.exe
        Filesize

        737KB

        MD5

        39f99fcb9ef3abf65b408e65bec1f010

        SHA1

        4e9836273db4421528d12fada615ccce5364be2f

        SHA256

        b65156ab4680e8fc4c3b5d616bc76b3867a7b5d82f0fc2d4584bb779235f5af4

        SHA512

        6314af48c44e7ba0510695b730623636e90e5d82030ca361247b7ea286bdeb1be9b01c7834c7d5646a82846e20a783ec38f60832eb2509c3217cf2606aea721b

      • C:\ProgramData\vexplorers\vexplorers.exe
        Filesize

        433KB

        MD5

        010914040e9e66a7440f9dac4716c407

        SHA1

        9a9fae06bdaa6783d84c33ffc248860055bd74ab

        SHA256

        0d8f0198d606616f1f674fb3c08993a94d3788fafd284fe95c8113caf6ef1cdb

        SHA512

        62929821a8267b5b54dbfde43e5053814c8284725836ddd3ee8236306a8ba2b793088c3a338a163df6f6d9ca037e38f09b433b6eee7fbb769df8d327882cb152

      • C:\ProgramData\vexplorers\vexplorers.exe
        Filesize

        650KB

        MD5

        f5bb146205ef17f280f1adcf0779fd56

        SHA1

        51527e0bb0aa06174c48635f3ccc811dfbc6c581

        SHA256

        9571c9b1383aab6837befa9baf15f6c67127ae62c218b2f986e8d1b38a3b8a6e

        SHA512

        106a521d7363f75d0e4d44f5096428e1bf37b8906d70af30c5d70a268c1b6aab97f37bb4566c449189a5be49c8964f2cb30c2f50a17de2dc371f77c01544cca4

      • C:\ProgramData\vexplorers\vexplorers.exe
        Filesize

        1.1MB

        MD5

        17707d53e82be9d0e7d40cf4781248da

        SHA1

        c1035a4dedd0b8e1fad49471db867d9261c8aa63

        SHA256

        0e0e1dc6862f42230b3c304092688219a7e10b2a09680224ff5a629e85357ceb

        SHA512

        426283e3df19e7b554df00d0e74a6f04916df9ff3806d8b314b4290b997ccf0ba1d17382697952a0d7e63855a0f78358970ed60d828fac4ab853c6d7960f03b5

      • C:\ProgramData\vexplorers\vexplorers.exe
        Filesize

        365KB

        MD5

        53b3dc81212c2eb7e137248da5d46779

        SHA1

        6f94b4f9ff223998d97effe792edb5f48f2ac5ad

        SHA256

        a989221f2583ed7094558bfe896f835d6f467021f7694bf995c6bbda3513c46c

        SHA512

        0eddd6f6e6100901aad113e3231b3fa87a96f9708acffe61314e706decb8718d99f6aa1e61a8f8e4110b5cc8f221dadc0e807b9dc030133dec7daa7dca9d95fc

      • C:\ProgramData\vexplorers\vexplorers.exe
        Filesize

        364KB

        MD5

        456dbcc9e1c86022a00361bd00f41feb

        SHA1

        d93f5f7c5c38b8cd9d055e379d109db8c9070dc1

        SHA256

        e2ce404f7b5ea7025baba216f77014ad89e5ebbdaa247cd0f8d2ab3c26345001

        SHA512

        c11c4c4a6fbabf8819c2f629642c6b1793a75503593ff70f4636a8604957b997a1be44de4e7f665feab3d621d5571e6e7ff5187c4f299ac904f86c81360aa76d

      • C:\ProgramData\vexplorers\vexplorers.exe
        Filesize

        428KB

        MD5

        f04be6581b09f4ef2d92af85ee251567

        SHA1

        fccd25a0cad8c882e483177e56e5f8c2d9b43fae

        SHA256

        adfd3028da5812981b44fe299e021e397e517765b46b4a12debb5739e3d808ad

        SHA512

        db8db34c3cb22c4fc4be467ec457effd6c6f8a36b31edc5f406b82ca93fe8f187aafdc2bdf258acdd877cbec6c9f7db59ba31823ba5dbad4e9c0f2d31425429f

      • C:\Users\Admin\AppData\Local\Temp\Purportedly\Savouriest.exe
        Filesize

        867KB

        MD5

        58388c2ebc6530862b0a5ce9f69c1ce2

        SHA1

        c4ac54cdf291c068119cb9f9cdc6816ad8844a8c

        SHA256

        4766bfaf1c7448ede9ca542d21604b3fe80b99e5dd8a3f342830015705b242c4

        SHA512

        3a6f32085cea19deb4d267af5ce2f0cd65013e130996bf0de9bb36721f60c5fc48c9e355dec9ef96e599d85764209f48f05c56f94375bc3ff24c535deb35af42

      • C:\Users\Admin\AppData\Local\Temp\gxetzmwtyoilfvhewrpxejtwjipq
        Filesize

        4KB

        MD5

        2cbe8873d9d19e766fd9a1f758da8e74

        SHA1

        544271b8bf2aa7108e9f0f1cf11de5eb2a389f17

        SHA256

        b92f48c215f2d309a748e67787283bb2c61bbce1faf7dcb3b917f57be92b28e2

        SHA512

        4f8842cfc7b97b82e5f105aeb1b838f9f50072d3f9cae7412e09c0f8fb592a40fc6064cd9ef8e67133ec5694590d106d3e3141e2fd0a21c3d32d6340068ca632

      • C:\Users\Admin\AppData\Local\Temp\nsq4807.tmp\System.dll
        Filesize

        12KB

        MD5

        564bb0373067e1785cba7e4c24aab4bf

        SHA1

        7c9416a01d821b10b2eef97b80899d24014d6fc1

        SHA256

        7a9ddee34562cd3703f1502b5c70e99cd5bba15de2b6845a3555033d7f6cb2a5

        SHA512

        22c61a323cb9293d7ec5c7e7e60674d0e2f7b29d55be25eb3c128ea2cd7440a1400cee17c43896b996278007c0d247f331a9b8964e3a40a0eb1404a9596c4472

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Ordsproget\Occamistic\Cystolithiasis.Men
        Filesize

        227KB

        MD5

        99890cd335cfe57eabd5d8805cdda59b

        SHA1

        690022617a05a067ac8f1381a2db5ccc73206231

        SHA256

        112746845d67497aa742c0b13f82a1145cac510de10ca7112efac09385747b34

        SHA512

        e08062337327b864473db88f0320c2d10e53f289fd84ef2056bc5bf8e3b999cd91c40d61d0a89662178c843f420c5e84e7e09b4533ee659b14272bb38a02b680

      • memory/380-78-0x0000000000490000-0x00000000016E4000-memory.dmp
        Filesize

        18.3MB

      • memory/380-74-0x0000000000490000-0x00000000016E4000-memory.dmp
        Filesize

        18.3MB

      • memory/380-119-0x0000000000490000-0x00000000016E4000-memory.dmp
        Filesize

        18.3MB

      • memory/380-118-0x0000000035900000-0x0000000035919000-memory.dmp
        Filesize

        100KB

      • memory/380-115-0x0000000035900000-0x0000000035919000-memory.dmp
        Filesize

        100KB

      • memory/380-82-0x00000000016F0000-0x0000000004729000-memory.dmp
        Filesize

        48.2MB

      • memory/380-70-0x00000000016F0000-0x0000000004729000-memory.dmp
        Filesize

        48.2MB

      • memory/656-104-0x0000000000400000-0x0000000000457000-memory.dmp
        Filesize

        348KB

      • memory/656-103-0x0000000000400000-0x0000000000457000-memory.dmp
        Filesize

        348KB

      • memory/656-87-0x0000000000400000-0x0000000000457000-memory.dmp
        Filesize

        348KB

      • memory/656-93-0x0000000000400000-0x0000000000457000-memory.dmp
        Filesize

        348KB

      • memory/1128-85-0x0000000000400000-0x0000000000478000-memory.dmp
        Filesize

        480KB

      • memory/1128-91-0x0000000000400000-0x0000000000478000-memory.dmp
        Filesize

        480KB

      • memory/1128-112-0x0000000000400000-0x0000000000478000-memory.dmp
        Filesize

        480KB

      • memory/1128-96-0x0000000000400000-0x0000000000478000-memory.dmp
        Filesize

        480KB

      • memory/2284-79-0x0000000000400000-0x000000000048A000-memory.dmp
        Filesize

        552KB

      • memory/2284-83-0x0000000000400000-0x000000000048A000-memory.dmp
        Filesize

        552KB

      • memory/2284-81-0x0000000000400000-0x000000000048A000-memory.dmp
        Filesize

        552KB

      • memory/2564-68-0x00000000749D0000-0x00000000749D7000-memory.dmp
        Filesize

        28KB

      • memory/2564-67-0x0000000003190000-0x00000000061C9000-memory.dmp
        Filesize

        48.2MB

      • memory/2564-73-0x0000000003190000-0x00000000061C9000-memory.dmp
        Filesize

        48.2MB

      • memory/3584-105-0x0000000000400000-0x0000000000424000-memory.dmp
        Filesize

        144KB

      • memory/3584-95-0x0000000000400000-0x0000000000424000-memory.dmp
        Filesize

        144KB

      • memory/3584-107-0x0000000000400000-0x0000000000424000-memory.dmp
        Filesize

        144KB

      • memory/3584-109-0x0000000000400000-0x0000000000424000-memory.dmp
        Filesize

        144KB

      • memory/3584-108-0x0000000000400000-0x0000000000424000-memory.dmp
        Filesize

        144KB

      • memory/4692-35-0x00000000016F0000-0x0000000004729000-memory.dmp
        Filesize

        48.2MB

      • memory/4692-46-0x0000000077C91000-0x0000000077DB1000-memory.dmp
        Filesize

        1.1MB

      • memory/4692-36-0x0000000077D18000-0x0000000077D19000-memory.dmp
        Filesize

        4KB

      • memory/4692-39-0x0000000077C91000-0x0000000077DB1000-memory.dmp
        Filesize

        1.1MB

      • memory/4692-66-0x00000000016F0000-0x0000000004729000-memory.dmp
        Filesize

        48.2MB

      • memory/4692-40-0x0000000000490000-0x00000000016E4000-memory.dmp
        Filesize

        18.3MB

      • memory/4692-44-0x0000000000490000-0x00000000016E4000-memory.dmp
        Filesize

        18.3MB

      • memory/4692-56-0x0000000000490000-0x00000000016E4000-memory.dmp
        Filesize

        18.3MB

      • memory/4716-34-0x0000000074980000-0x0000000074987000-memory.dmp
        Filesize

        28KB

      • memory/4716-38-0x0000000003260000-0x0000000006299000-memory.dmp
        Filesize

        48.2MB

      • memory/4716-33-0x0000000077C91000-0x0000000077DB1000-memory.dmp
        Filesize

        1.1MB

      • memory/4716-32-0x0000000003260000-0x0000000006299000-memory.dmp
        Filesize

        48.2MB