Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 05:36
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order-ListSamples_xls.scr
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Purchase Order-ListSamples_xls.scr
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Specifications.scr
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
Specifications.scr
Resource
win10v2004-20231222-en
General
-
Target
Specifications.scr
-
Size
1020KB
-
MD5
f03e14fede667def5971cd05001ac26e
-
SHA1
c3b194d8b0d66a3a7aa540123f9191f06632c31a
-
SHA256
a090d4d19e61d32cc67cbbcd57124becd412d1e9f7d8d8ed896da4d2d689dc7f
-
SHA512
e38eaa3b4720cd0e0fd002f9d9067991c7b2ded1335a0a8d8872b96ec498a3231bdf99c1347e701b0bf23631e27a2569d62b0671a009562f9effb932c2ff3ff1
-
SSDEEP
24576:MtS2xc3m8Y83BarJ3OJJwFcx9wyeZBMI4mCJFix:MQ2x+b3BaN3mwF6yJXWFi
Malware Config
Extracted
remcos
RemoteHost
lora1.taiwantradeglobal.com:2404
lora2.taiwantradeglobal.com:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-R9UMK0
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) 53 IoCs
resource yara_rule behavioral3/memory/2460-31-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-33-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-34-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-35-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-29-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-37-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-41-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-39-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-42-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-43-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-46-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-47-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-48-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-49-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-51-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-52-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-53-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-54-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-55-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-56-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-57-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-58-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-59-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-60-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-61-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-63-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-64-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-65-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-67-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-68-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-69-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-71-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-72-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-73-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-74-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-76-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-77-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-78-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-80-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-81-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-82-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-83-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-84-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-85-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-86-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-88-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-89-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-90-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-92-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-93-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-94-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-95-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral3/memory/2460-96-0x0000000000400000-0x0000000000482000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2360 set thread context of 2460 2360 Specifications.scr 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2052 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2360 Specifications.scr 2360 Specifications.scr 2360 Specifications.scr 2360 Specifications.scr 2360 Specifications.scr 2360 Specifications.scr 2360 Specifications.scr 2604 powershell.exe 2608 powershell.exe 2360 Specifications.scr -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2360 Specifications.scr Token: SeDebugPrivilege 2604 powershell.exe Token: SeDebugPrivilege 2608 powershell.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2604 2360 Specifications.scr 28 PID 2360 wrote to memory of 2604 2360 Specifications.scr 28 PID 2360 wrote to memory of 2604 2360 Specifications.scr 28 PID 2360 wrote to memory of 2604 2360 Specifications.scr 28 PID 2360 wrote to memory of 2608 2360 Specifications.scr 30 PID 2360 wrote to memory of 2608 2360 Specifications.scr 30 PID 2360 wrote to memory of 2608 2360 Specifications.scr 30 PID 2360 wrote to memory of 2608 2360 Specifications.scr 30 PID 2360 wrote to memory of 2052 2360 Specifications.scr 32 PID 2360 wrote to memory of 2052 2360 Specifications.scr 32 PID 2360 wrote to memory of 2052 2360 Specifications.scr 32 PID 2360 wrote to memory of 2052 2360 Specifications.scr 32 PID 2360 wrote to memory of 2460 2360 Specifications.scr 34 PID 2360 wrote to memory of 2460 2360 Specifications.scr 34 PID 2360 wrote to memory of 2460 2360 Specifications.scr 34 PID 2360 wrote to memory of 2460 2360 Specifications.scr 34 PID 2360 wrote to memory of 2460 2360 Specifications.scr 34 PID 2360 wrote to memory of 2460 2360 Specifications.scr 34 PID 2360 wrote to memory of 2460 2360 Specifications.scr 34 PID 2360 wrote to memory of 2460 2360 Specifications.scr 34 PID 2360 wrote to memory of 2460 2360 Specifications.scr 34 PID 2360 wrote to memory of 2460 2360 Specifications.scr 34 PID 2360 wrote to memory of 2460 2360 Specifications.scr 34 PID 2360 wrote to memory of 2460 2360 Specifications.scr 34 PID 2360 wrote to memory of 2460 2360 Specifications.scr 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\Specifications.scr"C:\Users\Admin\AppData\Local\Temp\Specifications.scr" /S1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Specifications.scr"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\QfWagJoK.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2608
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QfWagJoK" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6A19.tmp"2⤵
- Creates scheduled task(s)
PID:2052
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:2460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD591aeacf918eb0be0d9298706b5b0ac00
SHA1c1610d2839d57a2ac9d6faf033aaf68d0b19cef5
SHA25683edfdcda4e31d4c1e0593b355bb73299b6f912bd447affc213445448754c749
SHA512a3bba4a8c5475e2d9d9457f1f4fcd4742b27686570e9302660b0b6df5cd2b5e0ecb041da1d1d079d153454032ea908a76a93aed403f4e0d1a5c57d8a80801e15
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\16AB8O3KIYJ9WWLVY74Y.temp
Filesize7KB
MD5a733b61a46ef489207db40b2431ebae6
SHA14d7a4f6b9f800a1044985fa3416997a2bd7df7fa
SHA256111dcabece2c29892d88b7acb65d019408bf5c0508fcfd17ba9428b18e24b6bc
SHA5122060fb5864630681b1d6662b7836db10ec2216c5aff28f10c3eb935c9b4ed3963e7acff1bad9c175d385828492af4ddb95dbfb6ba47c23971a1ad53777f06930