Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-03-2024 02:42
Static task
static1
Behavioral task
behavioral1
Sample
ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe
Resource
win10v2004-20240226-en
General
-
Target
ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe
-
Size
1.3MB
-
MD5
44aaef046aa99bfb6520d7b0b1fb758b
-
SHA1
d9649c6a5eb45805ad1d21cca7bd3f05830c5235
-
SHA256
ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350
-
SHA512
919fb01b986172932e5d3f042450489535f9def2273a4f95c701306d44bbe2f6aea36a064366b3b5043b85f5b4b1b562c89e594bb3ba631081df889553f2c740
-
SSDEEP
24576:EJWUid5kZHYX+fEHxniHBvag2ZCMVAgfM:EJ05aYt4dcsMVAgfM
Malware Config
Extracted
remcos
RemoteHost
127.0.0.1:47212
officerem.duckdns.org:47212
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-I8N3XG
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) 17 IoCs
Processes:
resource yara_rule behavioral1/memory/1896-84-0x0000000000280000-0x0000000001280000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral1/memory/1896-86-0x0000000000280000-0x0000000001280000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral1/memory/1896-87-0x0000000000280000-0x0000000001280000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral1/memory/1896-88-0x0000000000280000-0x0000000001280000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral1/memory/1896-89-0x0000000000280000-0x0000000001280000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral1/memory/1896-90-0x0000000000280000-0x0000000001280000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral1/memory/1896-92-0x0000000000280000-0x0000000001280000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral1/memory/1896-93-0x0000000000280000-0x0000000001280000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral1/memory/1896-94-0x0000000000280000-0x0000000001280000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral1/memory/1896-96-0x0000000000280000-0x0000000001280000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral1/memory/1896-100-0x0000000000280000-0x0000000001280000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral1/memory/1896-101-0x0000000000280000-0x0000000001280000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral1/memory/1896-108-0x0000000000280000-0x0000000001280000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral1/memory/1896-116-0x0000000000280000-0x0000000001280000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral1/memory/1896-117-0x0000000000280000-0x0000000001280000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral1/memory/1896-124-0x0000000000280000-0x0000000001280000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral1/memory/1896-125-0x0000000000280000-0x0000000001280000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM -
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1220-2-0x0000000003350000-0x0000000004350000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
Processes:
5886241.exe5886241.exepid process 1688 5886241.exe 2552 5886241.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wcbdytqr = "C:\\Users\\Public\\Wcbdytqr.url" ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 4 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exepid process 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe -
Suspicious use of SendNotifyMessage 25 IoCs
Processes:
ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exepid process 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
colorcpl.exepid process 1896 colorcpl.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exedescription pid process target process PID 1220 wrote to memory of 2372 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe cmd.exe PID 1220 wrote to memory of 2372 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe cmd.exe PID 1220 wrote to memory of 2372 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe cmd.exe PID 1220 wrote to memory of 2372 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe cmd.exe PID 1220 wrote to memory of 2368 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe cmd.exe PID 1220 wrote to memory of 2368 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe cmd.exe PID 1220 wrote to memory of 2368 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe cmd.exe PID 1220 wrote to memory of 2368 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe cmd.exe PID 1220 wrote to memory of 2880 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe cmd.exe PID 1220 wrote to memory of 2880 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe cmd.exe PID 1220 wrote to memory of 2880 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe cmd.exe PID 1220 wrote to memory of 2880 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe cmd.exe PID 1220 wrote to memory of 1516 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe extrac32.exe PID 1220 wrote to memory of 1516 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe extrac32.exe PID 1220 wrote to memory of 1516 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe extrac32.exe PID 1220 wrote to memory of 1516 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe extrac32.exe PID 1220 wrote to memory of 1896 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe colorcpl.exe PID 1220 wrote to memory of 1896 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe colorcpl.exe PID 1220 wrote to memory of 1896 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe colorcpl.exe PID 1220 wrote to memory of 1896 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe colorcpl.exe PID 1220 wrote to memory of 1896 1220 ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe colorcpl.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe"C:\Users\Admin\AppData\Local\Temp\ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe"1⤵
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\SysWOW64\cmd.execmd /c mkdir "\\?\C:\Windows "2⤵PID:2372
-
C:\Windows\SysWOW64\cmd.execmd /c mkdir "\\?\C:\Windows \System32"2⤵PID:2368
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Windows \System32\5886241.exe"2⤵PID:2880
-
C:\Windows \System32\5886241.exe"C:\Windows \System32\5886241.exe"3⤵
- Executes dropped EXE
PID:1688 -
C:\Windows \System32\5886241.exe"C:\Windows \System32\5886241.exe"3⤵
- Executes dropped EXE
PID:2552 -
C:\Windows\SysWOW64\extrac32.exeC:\\Windows\\System32\\extrac32.exe /C /Y C:\Users\Admin\AppData\Local\Temp\ae13dba25a62c3ecaf7bf4629ed726dcbb8528f6b6c6a4c7c37efefc17d93350.exe C:\\Users\\Public\\Libraries\\Wcbdytqr.PIF2⤵PID:1516
-
C:\Windows\SysWOW64\colorcpl.exeC:\Windows\System32\colorcpl.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:1896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD594855a689abf9ca5c3e08280703d6af4
SHA1599bf965bb887f0961940282b10ce7701658588d
SHA256454b05470ac2e431f9d5b46c658aeb642472a5eb0f6a8d966af2636a4f70165d
SHA512b162a7b503b8d0b44c6bb63b36ea78c5f3fe0362e370990586511435d0d87457fdc972484d7ba1cdf68038a8725d048b5bc8e081994e298eee81956a71b84acc
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63
-
Filesize
128KB
MD5231ce1e1d7d98b44371ffff407d68b59
SHA125510d0f6353dbf0c9f72fc880de7585e34b28ff
SHA25630951db8bfc21640645aa9144cfeaa294bb7c6980ef236d28552b6f4f3f92a96
SHA512520887b01bda96b7c4f91b9330a5c03a12f7c7f266d4359432e7bacc76b0eef377c05a4361f8fa80ad0b94b5865699d747a5d94a2d3dcdb85dabf5887bb6c612