Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-03-2024 21:04
Static task
static1
Behavioral task
behavioral1
Sample
b9c144592964694742c93d09a6db9194a58cfed85c9a81f00b5ae2d14ac5c87d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b9c144592964694742c93d09a6db9194a58cfed85c9a81f00b5ae2d14ac5c87d.exe
Resource
win10v2004-20240226-en
General
-
Target
b9c144592964694742c93d09a6db9194a58cfed85c9a81f00b5ae2d14ac5c87d.exe
-
Size
888KB
-
MD5
cf659feea0c1c9e0a1705e076b831f48
-
SHA1
4e79ae9003d92a10d09fdb231512ca914c60a7c7
-
SHA256
b9c144592964694742c93d09a6db9194a58cfed85c9a81f00b5ae2d14ac5c87d
-
SHA512
6ebf5d751d94772def751a6085e233e8cadb0c4c29193be247d0b11c977370ae82a2d5190bae463b0de60cbe8bf0c2c7a4b0dd84f9c2fd142e7ededc42afdfc4
-
SSDEEP
12288:oXxu5oy0XhL9ljnp9zIO6S33Ys1fCjPfeCMVAgfMCf3e9:ohAcXhL9lV9cHSY2ZCMVAgfM
Malware Config
Extracted
remcos
RemoteHost
127.0.0.1:47212
officerem.duckdns.org:47212
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-I8N3XG
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2000-2-0x00000000031F0000-0x00000000041F0000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
Processes:
2820216.exe2820216.exepid process 2656 2820216.exe 1540 2820216.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
b9c144592964694742c93d09a6db9194a58cfed85c9a81f00b5ae2d14ac5c87d.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Hmbaewme = "C:\\Users\\Public\\Hmbaewme.url" b9c144592964694742c93d09a6db9194a58cfed85c9a81f00b5ae2d14ac5c87d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 4 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
colorcpl.execmd.exepid process 1712 colorcpl.exe 1360 cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
colorcpl.exepid process 1712 colorcpl.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
b9c144592964694742c93d09a6db9194a58cfed85c9a81f00b5ae2d14ac5c87d.exedescription pid process target process PID 2000 wrote to memory of 2292 2000 b9c144592964694742c93d09a6db9194a58cfed85c9a81f00b5ae2d14ac5c87d.exe cmd.exe PID 2000 wrote to memory of 2292 2000 b9c144592964694742c93d09a6db9194a58cfed85c9a81f00b5ae2d14ac5c87d.exe cmd.exe PID 2000 wrote to memory of 2292 2000 b9c144592964694742c93d09a6db9194a58cfed85c9a81f00b5ae2d14ac5c87d.exe cmd.exe PID 2000 wrote to memory of 2292 2000 b9c144592964694742c93d09a6db9194a58cfed85c9a81f00b5ae2d14ac5c87d.exe cmd.exe PID 2000 wrote to memory of 2964 2000 b9c144592964694742c93d09a6db9194a58cfed85c9a81f00b5ae2d14ac5c87d.exe cmd.exe PID 2000 wrote to memory of 2964 2000 b9c144592964694742c93d09a6db9194a58cfed85c9a81f00b5ae2d14ac5c87d.exe cmd.exe PID 2000 wrote to memory of 2964 2000 b9c144592964694742c93d09a6db9194a58cfed85c9a81f00b5ae2d14ac5c87d.exe cmd.exe PID 2000 wrote to memory of 2964 2000 b9c144592964694742c93d09a6db9194a58cfed85c9a81f00b5ae2d14ac5c87d.exe cmd.exe PID 2000 wrote to memory of 1360 2000 b9c144592964694742c93d09a6db9194a58cfed85c9a81f00b5ae2d14ac5c87d.exe cmd.exe PID 2000 wrote to memory of 1360 2000 b9c144592964694742c93d09a6db9194a58cfed85c9a81f00b5ae2d14ac5c87d.exe cmd.exe PID 2000 wrote to memory of 1360 2000 b9c144592964694742c93d09a6db9194a58cfed85c9a81f00b5ae2d14ac5c87d.exe cmd.exe PID 2000 wrote to memory of 1360 2000 b9c144592964694742c93d09a6db9194a58cfed85c9a81f00b5ae2d14ac5c87d.exe cmd.exe PID 2000 wrote to memory of 1776 2000 b9c144592964694742c93d09a6db9194a58cfed85c9a81f00b5ae2d14ac5c87d.exe extrac32.exe PID 2000 wrote to memory of 1776 2000 b9c144592964694742c93d09a6db9194a58cfed85c9a81f00b5ae2d14ac5c87d.exe extrac32.exe PID 2000 wrote to memory of 1776 2000 b9c144592964694742c93d09a6db9194a58cfed85c9a81f00b5ae2d14ac5c87d.exe extrac32.exe PID 2000 wrote to memory of 1776 2000 b9c144592964694742c93d09a6db9194a58cfed85c9a81f00b5ae2d14ac5c87d.exe extrac32.exe PID 2000 wrote to memory of 1712 2000 b9c144592964694742c93d09a6db9194a58cfed85c9a81f00b5ae2d14ac5c87d.exe colorcpl.exe PID 2000 wrote to memory of 1712 2000 b9c144592964694742c93d09a6db9194a58cfed85c9a81f00b5ae2d14ac5c87d.exe colorcpl.exe PID 2000 wrote to memory of 1712 2000 b9c144592964694742c93d09a6db9194a58cfed85c9a81f00b5ae2d14ac5c87d.exe colorcpl.exe PID 2000 wrote to memory of 1712 2000 b9c144592964694742c93d09a6db9194a58cfed85c9a81f00b5ae2d14ac5c87d.exe colorcpl.exe PID 2000 wrote to memory of 1712 2000 b9c144592964694742c93d09a6db9194a58cfed85c9a81f00b5ae2d14ac5c87d.exe colorcpl.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9c144592964694742c93d09a6db9194a58cfed85c9a81f00b5ae2d14ac5c87d.exe"C:\Users\Admin\AppData\Local\Temp\b9c144592964694742c93d09a6db9194a58cfed85c9a81f00b5ae2d14ac5c87d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\cmd.execmd /c mkdir "\\?\C:\Windows "2⤵PID:2292
-
C:\Windows\SysWOW64\cmd.execmd /c mkdir "\\?\C:\Windows \System32"2⤵PID:2964
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Windows \System32\2820216.exe"2⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:1360 -
C:\Windows \System32\2820216.exe"C:\Windows \System32\2820216.exe"3⤵
- Executes dropped EXE
PID:2656 -
C:\Windows \System32\2820216.exe"C:\Windows \System32\2820216.exe"3⤵
- Executes dropped EXE
PID:1540 -
C:\Windows\SysWOW64\extrac32.exeC:\\Windows\\System32\\extrac32.exe /C /Y C:\Users\Admin\AppData\Local\Temp\b9c144592964694742c93d09a6db9194a58cfed85c9a81f00b5ae2d14ac5c87d.exe C:\\Users\\Public\\Libraries\\Hmbaewme.PIF2⤵PID:1776
-
C:\Windows\SysWOW64\colorcpl.exeC:\Windows\System32\colorcpl.exe2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5ac70d6c8787a1c16f5a5e4e0f24bfd10
SHA19fba83cfd410813ed7ac14cd485990af37b2a242
SHA2564889725292cd84943611394b678a22178b848bd98d07e0db63ac77ea6626f0fd
SHA5125a9ad0ff2a3b005d2df34b715aafa135a0d0252b06cc3709f5af3067c8844b8d8999d21ae1762ee1730944355db8c84c8ef308be05b982c1764fe9ea603dda10
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63
-
Filesize
128KB
MD5231ce1e1d7d98b44371ffff407d68b59
SHA125510d0f6353dbf0c9f72fc880de7585e34b28ff
SHA25630951db8bfc21640645aa9144cfeaa294bb7c6980ef236d28552b6f4f3f92a96
SHA512520887b01bda96b7c4f91b9330a5c03a12f7c7f266d4359432e7bacc76b0eef377c05a4361f8fa80ad0b94b5865699d747a5d94a2d3dcdb85dabf5887bb6c612