Analysis
-
max time kernel
147s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 12:58
Static task
static1
Behavioral task
behavioral1
Sample
a7ab5280efdd1f09f7c15daafa507b5a889e30cb9bfa0060ae5cf29a64c9d410.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a7ab5280efdd1f09f7c15daafa507b5a889e30cb9bfa0060ae5cf29a64c9d410.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
Reservebeholdninger.ps1
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
Reservebeholdninger.ps1
Resource
win10v2004-20240412-en
General
-
Target
a7ab5280efdd1f09f7c15daafa507b5a889e30cb9bfa0060ae5cf29a64c9d410.exe
-
Size
692KB
-
MD5
0613b5c6e1cbce2a95749aad0f66d0a5
-
SHA1
7efd22ff2aeed3bbe316bf99126b6934da672128
-
SHA256
a7ab5280efdd1f09f7c15daafa507b5a889e30cb9bfa0060ae5cf29a64c9d410
-
SHA512
e00bd747a765de4f07b162b85f3a9d0f054155fd48dc6fa08658d8e3a7b45403664943958a3dc3b4bcf67a2c59f2f6fddc94245a5c97d164099379dfdc73307d
-
SSDEEP
12288:Hpwiapd/PNMdUhTvaqOyXudHs+feJOgxQN08QbXyTTFakU5zxmRgZYqMC:HauFPfeQdQbX4FytdZnMC
Malware Config
Extracted
remcos
GRACE
eweo9264gtuiort.duckdns.org:35966
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
ghyhne.dat
-
keylog_flag
false
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
gtsyhbnj-ZGGA79
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
NirSoft MailPassView 3 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/4612-109-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView behavioral2/memory/4612-116-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView behavioral2/memory/4612-117-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 2 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/4384-108-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView behavioral2/memory/4384-124-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Nirsoft 7 IoCs
resource yara_rule behavioral2/memory/4612-109-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral2/memory/4612-116-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral2/memory/4384-108-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral2/memory/4612-117-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral2/memory/2728-119-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/2728-120-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/4384-124-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-553605503-2331009851-2137262461-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts wab.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-553605503-2331009851-2137262461-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Maskinchef = "%Unlime% -windowstyle minimized $Affaldsordningens=(Get-ItemProperty -Path 'HKCU:\\Opkaldsforsgene\\').Subelementary;%Unlime% ($Affaldsordningens)" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 44 drive.google.com 45 drive.google.com -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 4880 wab.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3600 powershell.exe 4880 wab.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3600 set thread context of 4880 3600 powershell.exe 95 PID 4880 set thread context of 4384 4880 wab.exe 99 PID 4880 set thread context of 4612 4880 wab.exe 100 PID 4880 set thread context of 2728 4880 wab.exe 101 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1936 4880 WerFault.exe 95 -
Modifies registry key 1 TTPs 1 IoCs
pid Process 5112 reg.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 3600 powershell.exe 3600 powershell.exe 3600 powershell.exe 3600 powershell.exe 3600 powershell.exe 3600 powershell.exe 3600 powershell.exe 3600 powershell.exe 3600 powershell.exe 4384 wab.exe 4384 wab.exe 2728 wab.exe 2728 wab.exe 4384 wab.exe 4384 wab.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 3600 powershell.exe 4880 wab.exe 4880 wab.exe 4880 wab.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3600 powershell.exe Token: SeDebugPrivilege 2728 wab.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4880 wab.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3328 wrote to memory of 3600 3328 a7ab5280efdd1f09f7c15daafa507b5a889e30cb9bfa0060ae5cf29a64c9d410.exe 87 PID 3328 wrote to memory of 3600 3328 a7ab5280efdd1f09f7c15daafa507b5a889e30cb9bfa0060ae5cf29a64c9d410.exe 87 PID 3328 wrote to memory of 3600 3328 a7ab5280efdd1f09f7c15daafa507b5a889e30cb9bfa0060ae5cf29a64c9d410.exe 87 PID 3600 wrote to memory of 3084 3600 powershell.exe 91 PID 3600 wrote to memory of 3084 3600 powershell.exe 91 PID 3600 wrote to memory of 3084 3600 powershell.exe 91 PID 3600 wrote to memory of 4880 3600 powershell.exe 95 PID 3600 wrote to memory of 4880 3600 powershell.exe 95 PID 3600 wrote to memory of 4880 3600 powershell.exe 95 PID 3600 wrote to memory of 4880 3600 powershell.exe 95 PID 3600 wrote to memory of 4880 3600 powershell.exe 95 PID 4880 wrote to memory of 4488 4880 wab.exe 96 PID 4880 wrote to memory of 4488 4880 wab.exe 96 PID 4880 wrote to memory of 4488 4880 wab.exe 96 PID 4488 wrote to memory of 5112 4488 cmd.exe 98 PID 4488 wrote to memory of 5112 4488 cmd.exe 98 PID 4488 wrote to memory of 5112 4488 cmd.exe 98 PID 4880 wrote to memory of 4384 4880 wab.exe 99 PID 4880 wrote to memory of 4384 4880 wab.exe 99 PID 4880 wrote to memory of 4384 4880 wab.exe 99 PID 4880 wrote to memory of 4384 4880 wab.exe 99 PID 4880 wrote to memory of 4612 4880 wab.exe 100 PID 4880 wrote to memory of 4612 4880 wab.exe 100 PID 4880 wrote to memory of 4612 4880 wab.exe 100 PID 4880 wrote to memory of 4612 4880 wab.exe 100 PID 4880 wrote to memory of 2728 4880 wab.exe 101 PID 4880 wrote to memory of 2728 4880 wab.exe 101 PID 4880 wrote to memory of 2728 4880 wab.exe 101 PID 4880 wrote to memory of 2728 4880 wab.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7ab5280efdd1f09f7c15daafa507b5a889e30cb9bfa0060ae5cf29a64c9d410.exe"C:\Users\Admin\AppData\Local\Temp\a7ab5280efdd1f09f7c15daafa507b5a889e30cb9bfa0060ae5cf29a64c9d410.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Albertas=Get-Content 'C:\Users\Admin\AppData\Local\retskrivningsreformer\Reservebeholdninger.Dak175';$buddingers=$Albertas.SubString(59489,3);.$buddingers($Albertas)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "set /A 1^^0"3⤵PID:3084
-
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"3⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Maskinchef" /t REG_EXPAND_SZ /d "%Unlime% -windowstyle minimized $Affaldsordningens=(Get-ItemProperty -Path 'HKCU:\Opkaldsforsgene\').Subelementary;%Unlime% ($Affaldsordningens)"4⤵
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Maskinchef" /t REG_EXPAND_SZ /d "%Unlime% -windowstyle minimized $Affaldsordningens=(Get-ItemProperty -Path 'HKCU:\Opkaldsforsgene\').Subelementary;%Unlime% ($Affaldsordningens)"5⤵
- Adds Run key to start application
- Modifies registry key
PID:5112
-
-
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\yvkubabdjyfmgpiyzxxqylfjddmlhng"4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4384
-
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\iqpeusuxfgyrjvecqikkjyzslswuaxxjfa"4⤵
- Accesses Microsoft Outlook accounts
PID:4612
-
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\ssvxvl"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4880 -s 17644⤵
- Program crash
PID:1936
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4880 -ip 48801⤵PID:1392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4KB
MD54c4514208ee3b84df84b0e70a3226fc9
SHA1c0229fd927531004752c99301f6600e2a2fae2cf
SHA256aea67e28903e21d9eb4f17fb68abc3d52695f21bcfa790de94bc0148ef788e6a
SHA51278d3381b1069f5052413f142498f764ec969f09abd3ee513a6d234c77ad7b933a19413bfa6c0c291b72c5c290262ebad4702f8ad45710eccc58fde5c13c5f1c7
-
Filesize
58KB
MD5a687f6d2ecff91aee4bd9e4d16a35089
SHA1d2666e69bc1455afb305dc880889acedbd0fab03
SHA2569667fc1a9915b7e9b53ec8d2d8711bf4855ca01420538e152e6f4624db54436c
SHA512284b000a92f44c171188bf540f5fb36b564c0fbd381d548cd3cffc74efc43e8acdf12d7db2da4228d1bbcde1658c3136d989b9f0c70bcd1ecbae8276cba1c759
-
Filesize
343KB
MD5462543a6eeab310df3f68bb5420ad1cb
SHA1583ed0031aab0b2e469d5c3f6562442b482c6a10
SHA2568123d207e8a14700ead583e95dfdab1e9d47312b851e6cc7dbf234a66c8b8549
SHA512fc863baeffb98ff446a9ebe5b33113b7fb1f55a9d7052d3591913da4360ac5a839e51eade732c0a9e3810239fe88468ca2bf3e8e3b642a682d6d83d1c3f6f871