Analysis
-
max time kernel
173s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 20:46
Static task
static1
Behavioral task
behavioral1
Sample
1e503c242a09bc206666cdc1078d3a3e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1e503c242a09bc206666cdc1078d3a3e.exe
Resource
win10v2004-20240226-en
General
-
Target
1e503c242a09bc206666cdc1078d3a3e.exe
-
Size
1024.0MB
-
MD5
4ffa95f68a6c94b75a0ce7470bec1156
-
SHA1
f8c649d9017cc4cced5b920dc70ce1f60c2a9d12
-
SHA256
8fefc21e856b0bac0bf570b1693f5a1e3b79d41e0d4e22b9d07823808bee3a30
-
SHA512
fb015684141241c7e104c54d4328d2c4a750e913e4c01f23963c351a1fb56affd7f70bee4cfcda7d9ddc00ddc6c09123e50f62a7eba472ce801d21d8b5e8e19a
-
SSDEEP
12288:CPLYpYCQEfqDhEtMQcgwGQcRY38eO/Prg+cS9WJO5oABbJ4xmIF0:TnQEwjbzL38x/vc+Ww7J4xbF0
Malware Config
Extracted
remcos
MONNONO
kdhviusdhiuduidhn.con-ip.com:1998
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-CL1Y48
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
NirSoft MailPassView 2 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/1200-57-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView behavioral2/memory/1200-62-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 3 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/548-59-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView behavioral2/memory/548-60-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView behavioral2/memory/548-69-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Nirsoft 7 IoCs
resource yara_rule behavioral2/memory/548-59-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral2/memory/348-61-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/548-60-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral2/memory/1200-57-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral2/memory/1200-62-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral2/memory/348-63-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/548-69-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts AppLaunch.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1580 set thread context of 2208 1580 1e503c242a09bc206666cdc1078d3a3e.exe 97 PID 2208 set thread context of 548 2208 AppLaunch.exe 114 PID 2208 set thread context of 1200 2208 AppLaunch.exe 115 PID 2208 set thread context of 348 2208 AppLaunch.exe 118 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5024 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 548 AppLaunch.exe 548 AppLaunch.exe 348 AppLaunch.exe 348 AppLaunch.exe 548 AppLaunch.exe 548 AppLaunch.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2208 AppLaunch.exe 2208 AppLaunch.exe 2208 AppLaunch.exe 2208 AppLaunch.exe 2208 AppLaunch.exe 2208 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 348 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2208 AppLaunch.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 1580 wrote to memory of 2208 1580 1e503c242a09bc206666cdc1078d3a3e.exe 97 PID 1580 wrote to memory of 2208 1580 1e503c242a09bc206666cdc1078d3a3e.exe 97 PID 1580 wrote to memory of 2208 1580 1e503c242a09bc206666cdc1078d3a3e.exe 97 PID 1580 wrote to memory of 2208 1580 1e503c242a09bc206666cdc1078d3a3e.exe 97 PID 1580 wrote to memory of 2208 1580 1e503c242a09bc206666cdc1078d3a3e.exe 97 PID 1580 wrote to memory of 2208 1580 1e503c242a09bc206666cdc1078d3a3e.exe 97 PID 1580 wrote to memory of 2208 1580 1e503c242a09bc206666cdc1078d3a3e.exe 97 PID 1580 wrote to memory of 2208 1580 1e503c242a09bc206666cdc1078d3a3e.exe 97 PID 1580 wrote to memory of 2208 1580 1e503c242a09bc206666cdc1078d3a3e.exe 97 PID 1580 wrote to memory of 2208 1580 1e503c242a09bc206666cdc1078d3a3e.exe 97 PID 1580 wrote to memory of 2208 1580 1e503c242a09bc206666cdc1078d3a3e.exe 97 PID 1580 wrote to memory of 2208 1580 1e503c242a09bc206666cdc1078d3a3e.exe 97 PID 1580 wrote to memory of 3328 1580 1e503c242a09bc206666cdc1078d3a3e.exe 99 PID 1580 wrote to memory of 3328 1580 1e503c242a09bc206666cdc1078d3a3e.exe 99 PID 1580 wrote to memory of 3328 1580 1e503c242a09bc206666cdc1078d3a3e.exe 99 PID 1580 wrote to memory of 4564 1580 1e503c242a09bc206666cdc1078d3a3e.exe 101 PID 1580 wrote to memory of 4564 1580 1e503c242a09bc206666cdc1078d3a3e.exe 101 PID 1580 wrote to memory of 4564 1580 1e503c242a09bc206666cdc1078d3a3e.exe 101 PID 4564 wrote to memory of 5024 4564 cmd.exe 103 PID 4564 wrote to memory of 5024 4564 cmd.exe 103 PID 4564 wrote to memory of 5024 4564 cmd.exe 103 PID 1580 wrote to memory of 2156 1580 1e503c242a09bc206666cdc1078d3a3e.exe 104 PID 1580 wrote to memory of 2156 1580 1e503c242a09bc206666cdc1078d3a3e.exe 104 PID 1580 wrote to memory of 2156 1580 1e503c242a09bc206666cdc1078d3a3e.exe 104 PID 2208 wrote to memory of 1184 2208 AppLaunch.exe 113 PID 2208 wrote to memory of 1184 2208 AppLaunch.exe 113 PID 2208 wrote to memory of 1184 2208 AppLaunch.exe 113 PID 2208 wrote to memory of 548 2208 AppLaunch.exe 114 PID 2208 wrote to memory of 548 2208 AppLaunch.exe 114 PID 2208 wrote to memory of 548 2208 AppLaunch.exe 114 PID 2208 wrote to memory of 548 2208 AppLaunch.exe 114 PID 2208 wrote to memory of 1200 2208 AppLaunch.exe 115 PID 2208 wrote to memory of 1200 2208 AppLaunch.exe 115 PID 2208 wrote to memory of 1200 2208 AppLaunch.exe 115 PID 2208 wrote to memory of 1200 2208 AppLaunch.exe 115 PID 2208 wrote to memory of 1720 2208 AppLaunch.exe 116 PID 2208 wrote to memory of 1720 2208 AppLaunch.exe 116 PID 2208 wrote to memory of 1720 2208 AppLaunch.exe 116 PID 2208 wrote to memory of 668 2208 AppLaunch.exe 117 PID 2208 wrote to memory of 668 2208 AppLaunch.exe 117 PID 2208 wrote to memory of 668 2208 AppLaunch.exe 117 PID 2208 wrote to memory of 348 2208 AppLaunch.exe 118 PID 2208 wrote to memory of 348 2208 AppLaunch.exe 118 PID 2208 wrote to memory of 348 2208 AppLaunch.exe 118 PID 2208 wrote to memory of 348 2208 AppLaunch.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e503c242a09bc206666cdc1078d3a3e.exe"C:\Users\Admin\AppData\Local\Temp\1e503c242a09bc206666cdc1078d3a3e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe /stext "C:\Users\Admin\AppData\Local\Temp\wuncrjwmifvnaadraapwtwtncmehlszfp"3⤵PID:1184
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe /stext "C:\Users\Admin\AppData\Local\Temp\wuncrjwmifvnaadraapwtwtncmehlszfp"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:548
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe /stext "C:\Users\Admin\AppData\Local\Temp\hpsvr"3⤵
- Accesses Microsoft Outlook accounts
PID:1200
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe /stext "C:\Users\Admin\AppData\Local\Temp\jrynstsh"3⤵PID:1720
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe /stext "C:\Users\Admin\AppData\Local\Temp\jrynstsh"3⤵PID:668
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe /stext "C:\Users\Admin\AppData\Local\Temp\jrynstsh"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:348
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mkdir "C:\Users\Admin\AppData\Roaming\AppData"2⤵PID:3328
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 10 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\AppData\AppData.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 10 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\AppData\AppData.exe'" /f3⤵
- Creates scheduled task(s)
PID:5024
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Local\Temp\1e503c242a09bc206666cdc1078d3a3e.exe" "C:\Users\Admin\AppData\Roaming\AppData\AppData.exe"2⤵PID:2156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD54c3cbe46a75794aedf814e653b816dd5
SHA15e7d87fbcde9529a271ae49d7827a611c08129c4
SHA256b9fce8b5445eaccae9fbabf37e2463980889ab33c78e7917b915477da1879fdb
SHA512b51e4a832b1a3a2516bef66d249f327259106f3d42eaaead4d03b0c2a07dcdd0ac0d28a3e078d64631fbfb1d3788e64cb3296fd65fe2dab7a4b57c70831fb36d
-
Filesize
4KB
MD5fc8ceff5210efa58594c67ed8f49a824
SHA1dba98c98becbdf81f623cdca6cd0a993022fe6cd
SHA256778b7d5b90428961459c82e9881fe0fece78424d6301eb0720a96f100511f599
SHA512c3b24fe5f5ba39174528ffc05544da6f22ac6aef2cac923ad139c0d044989873e004f9f5018cc0cc6847b5878f5aee96d6de823c860ac54a0fc67ff8d2d89cd1