Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08-04-2024 01:10
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order Specifications 2024.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
Purchase Order Specifications 2024.exe
Resource
win10v2004-20231215-en
General
-
Target
Purchase Order Specifications 2024.exe
-
Size
891KB
-
MD5
365611c6c550f6b4d41e017b7f658975
-
SHA1
b31644d9fb613abfcb0bf7a801db77b4d7fd7ec9
-
SHA256
f486a970c3228b346008eb169500d373560ea047084818b77357ba68bfa960af
-
SHA512
6393bd06d1ea7faaccc85469f6b87aaab102064c8871f6ea8c33ea5434d822ddbd59157e50def89219ee0d3ebe09d34423dfc5d23f337b42a134422d71c3f721
-
SSDEEP
24576:Ig5HJmx9NoiP7+J7v8Dlco1AtasmkDu13xXD7:1Jmx/7zYv8BJ4a1kq1R7
Malware Config
Extracted
remcos
RemoteHost
paygateme.net:2286
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-WTDTSU
-
screenshot_crypt
true
-
screenshot_flag
true
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
1
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
NirSoft MailPassView 2 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral2/memory/4108-97-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView behavioral2/memory/4108-98-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 2 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule behavioral2/memory/4060-89-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView behavioral2/memory/4060-100-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Nirsoft 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4060-89-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral2/memory/4108-97-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral2/memory/4108-98-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral2/memory/4060-100-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Purchase Order Specifications 2024.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation Purchase Order Specifications 2024.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
Purchase Order Specifications 2024.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts Purchase Order Specifications 2024.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
Purchase Order Specifications 2024.exePurchase Order Specifications 2024.exedescription pid process target process PID 3708 set thread context of 1828 3708 Purchase Order Specifications 2024.exe Purchase Order Specifications 2024.exe PID 1828 set thread context of 4060 1828 Purchase Order Specifications 2024.exe Purchase Order Specifications 2024.exe PID 1828 set thread context of 4108 1828 Purchase Order Specifications 2024.exe Purchase Order Specifications 2024.exe PID 1828 set thread context of 3092 1828 Purchase Order Specifications 2024.exe Purchase Order Specifications 2024.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2512 3092 WerFault.exe Purchase Order Specifications 2024.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 15 IoCs
Processes:
Purchase Order Specifications 2024.exepowershell.exePurchase Order Specifications 2024.exepid process 3708 Purchase Order Specifications 2024.exe 3708 Purchase Order Specifications 2024.exe 3708 Purchase Order Specifications 2024.exe 3708 Purchase Order Specifications 2024.exe 3708 Purchase Order Specifications 2024.exe 3708 Purchase Order Specifications 2024.exe 3708 Purchase Order Specifications 2024.exe 3708 Purchase Order Specifications 2024.exe 2280 powershell.exe 3708 Purchase Order Specifications 2024.exe 2280 powershell.exe 4060 Purchase Order Specifications 2024.exe 4060 Purchase Order Specifications 2024.exe 4060 Purchase Order Specifications 2024.exe 4060 Purchase Order Specifications 2024.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
Purchase Order Specifications 2024.exepid process 1828 Purchase Order Specifications 2024.exe 1828 Purchase Order Specifications 2024.exe 1828 Purchase Order Specifications 2024.exe 1828 Purchase Order Specifications 2024.exe 1828 Purchase Order Specifications 2024.exe 1828 Purchase Order Specifications 2024.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Purchase Order Specifications 2024.exepowershell.exedescription pid process Token: SeDebugPrivilege 3708 Purchase Order Specifications 2024.exe Token: SeDebugPrivilege 2280 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Purchase Order Specifications 2024.exepid process 1828 Purchase Order Specifications 2024.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Purchase Order Specifications 2024.exepid process 3092 Purchase Order Specifications 2024.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
Purchase Order Specifications 2024.exePurchase Order Specifications 2024.exedescription pid process target process PID 3708 wrote to memory of 2280 3708 Purchase Order Specifications 2024.exe powershell.exe PID 3708 wrote to memory of 2280 3708 Purchase Order Specifications 2024.exe powershell.exe PID 3708 wrote to memory of 2280 3708 Purchase Order Specifications 2024.exe powershell.exe PID 3708 wrote to memory of 4456 3708 Purchase Order Specifications 2024.exe schtasks.exe PID 3708 wrote to memory of 4456 3708 Purchase Order Specifications 2024.exe schtasks.exe PID 3708 wrote to memory of 4456 3708 Purchase Order Specifications 2024.exe schtasks.exe PID 3708 wrote to memory of 3712 3708 Purchase Order Specifications 2024.exe Purchase Order Specifications 2024.exe PID 3708 wrote to memory of 3712 3708 Purchase Order Specifications 2024.exe Purchase Order Specifications 2024.exe PID 3708 wrote to memory of 3712 3708 Purchase Order Specifications 2024.exe Purchase Order Specifications 2024.exe PID 3708 wrote to memory of 1828 3708 Purchase Order Specifications 2024.exe Purchase Order Specifications 2024.exe PID 3708 wrote to memory of 1828 3708 Purchase Order Specifications 2024.exe Purchase Order Specifications 2024.exe PID 3708 wrote to memory of 1828 3708 Purchase Order Specifications 2024.exe Purchase Order Specifications 2024.exe PID 3708 wrote to memory of 1828 3708 Purchase Order Specifications 2024.exe Purchase Order Specifications 2024.exe PID 3708 wrote to memory of 1828 3708 Purchase Order Specifications 2024.exe Purchase Order Specifications 2024.exe PID 3708 wrote to memory of 1828 3708 Purchase Order Specifications 2024.exe Purchase Order Specifications 2024.exe PID 3708 wrote to memory of 1828 3708 Purchase Order Specifications 2024.exe Purchase Order Specifications 2024.exe PID 3708 wrote to memory of 1828 3708 Purchase Order Specifications 2024.exe Purchase Order Specifications 2024.exe PID 3708 wrote to memory of 1828 3708 Purchase Order Specifications 2024.exe Purchase Order Specifications 2024.exe PID 3708 wrote to memory of 1828 3708 Purchase Order Specifications 2024.exe Purchase Order Specifications 2024.exe PID 3708 wrote to memory of 1828 3708 Purchase Order Specifications 2024.exe Purchase Order Specifications 2024.exe PID 3708 wrote to memory of 1828 3708 Purchase Order Specifications 2024.exe Purchase Order Specifications 2024.exe PID 1828 wrote to memory of 1740 1828 Purchase Order Specifications 2024.exe Purchase Order Specifications 2024.exe PID 1828 wrote to memory of 1740 1828 Purchase Order Specifications 2024.exe Purchase Order Specifications 2024.exe PID 1828 wrote to memory of 1740 1828 Purchase Order Specifications 2024.exe Purchase Order Specifications 2024.exe PID 1828 wrote to memory of 4060 1828 Purchase Order Specifications 2024.exe Purchase Order Specifications 2024.exe PID 1828 wrote to memory of 4060 1828 Purchase Order Specifications 2024.exe Purchase Order Specifications 2024.exe PID 1828 wrote to memory of 4060 1828 Purchase Order Specifications 2024.exe Purchase Order Specifications 2024.exe PID 1828 wrote to memory of 4060 1828 Purchase Order Specifications 2024.exe Purchase Order Specifications 2024.exe PID 1828 wrote to memory of 2572 1828 Purchase Order Specifications 2024.exe Purchase Order Specifications 2024.exe PID 1828 wrote to memory of 2572 1828 Purchase Order Specifications 2024.exe Purchase Order Specifications 2024.exe PID 1828 wrote to memory of 2572 1828 Purchase Order Specifications 2024.exe Purchase Order Specifications 2024.exe PID 1828 wrote to memory of 4680 1828 Purchase Order Specifications 2024.exe Purchase Order Specifications 2024.exe PID 1828 wrote to memory of 4680 1828 Purchase Order Specifications 2024.exe Purchase Order Specifications 2024.exe PID 1828 wrote to memory of 4680 1828 Purchase Order Specifications 2024.exe Purchase Order Specifications 2024.exe PID 1828 wrote to memory of 4108 1828 Purchase Order Specifications 2024.exe Purchase Order Specifications 2024.exe PID 1828 wrote to memory of 4108 1828 Purchase Order Specifications 2024.exe Purchase Order Specifications 2024.exe PID 1828 wrote to memory of 4108 1828 Purchase Order Specifications 2024.exe Purchase Order Specifications 2024.exe PID 1828 wrote to memory of 4108 1828 Purchase Order Specifications 2024.exe Purchase Order Specifications 2024.exe PID 1828 wrote to memory of 3092 1828 Purchase Order Specifications 2024.exe Purchase Order Specifications 2024.exe PID 1828 wrote to memory of 3092 1828 Purchase Order Specifications 2024.exe Purchase Order Specifications 2024.exe PID 1828 wrote to memory of 3092 1828 Purchase Order Specifications 2024.exe Purchase Order Specifications 2024.exe PID 1828 wrote to memory of 3092 1828 Purchase Order Specifications 2024.exe Purchase Order Specifications 2024.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order Specifications 2024.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order Specifications 2024.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\FCsxaE.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FCsxaE" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA6CF.tmp"2⤵
- Creates scheduled task(s)
PID:4456
-
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order Specifications 2024.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order Specifications 2024.exe"2⤵PID:3712
-
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order Specifications 2024.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order Specifications 2024.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\Purchase Order Specifications 2024.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order Specifications 2024.exe" /stext "C:\Users\Admin\AppData\Local\Temp\qlqaifzvd"3⤵PID:1740
-
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order Specifications 2024.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order Specifications 2024.exe" /stext "C:\Users\Admin\AppData\Local\Temp\qlqaifzvd"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4060
-
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order Specifications 2024.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order Specifications 2024.exe" /stext "C:\Users\Admin\AppData\Local\Temp\bnwtjxkorazp"3⤵PID:2572
-
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order Specifications 2024.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order Specifications 2024.exe" /stext "C:\Users\Admin\AppData\Local\Temp\bnwtjxkorazp"3⤵PID:4680
-
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order Specifications 2024.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order Specifications 2024.exe" /stext "C:\Users\Admin\AppData\Local\Temp\bnwtjxkorazp"3⤵
- Accesses Microsoft Outlook accounts
PID:4108
-
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order Specifications 2024.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order Specifications 2024.exe" /stext "C:\Users\Admin\AppData\Local\Temp\dijlkivqfircvpgh"3⤵
- Suspicious use of UnmapMainImage
PID:3092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3092 -s 124⤵
- Program crash
PID:2512
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3092 -ip 30921⤵PID:3360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5e8da4b00279feceac2c340d818ba3c89
SHA116889529d3fb53419b7f586c05ae0427fc333a6c
SHA2564e94f8eeb24883b787383a6c85721bf317d80253efde380463b7e14ece389d6c
SHA512aa3feb68e268af3829157041921cae836d22790339e61b9313033fe9fc42bd78f658bfd0b614eae731ffe79bd390450c58471d009dc6ad8d6c8ca5281e6788cc
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4KB
MD5636c8230de66506aa2bdb3deee259503
SHA1244299ce9ed66e9bed0c458c28fa3c417eeabdee
SHA25698e7ebb0441c43ba079892f7fd1e9c1360d9d0e6d37575e452944fa0b08638d4
SHA512fb5756dc8c9726be7b7629230ca5cf12c59f7d01225b9b73f08953bd02087bef10e1d2cdb6ed717776d683bd5ce523a069a6ab081992839a238056d57fc4eb6e
-
Filesize
1KB
MD557e989cc3382f2220869bd54236f6d70
SHA156a1649b81e1b35532718edf4f7bb177cf03bd73
SHA25629a0be8461c9acb2925dc95437ac6a36975cdac1711431edc5363323f4397476
SHA512e2f48e64bc162731a90466532e48956568df16f3948c878ae55c0acb14dd1ee708ab55577cc882d2f15cb8c9253f36007ce34acc440b83ef936fcd870d03994a