Analysis
-
max time kernel
139s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 13:43
Static task
static1
Behavioral task
behavioral1
Sample
f2fe3aa0d244d7f17610042ee41aaa3eff40b1a349b43f317ff92f6ec5b7608e.exe
Resource
win7-20240215-en
General
-
Target
f2fe3aa0d244d7f17610042ee41aaa3eff40b1a349b43f317ff92f6ec5b7608e.exe
-
Size
989KB
-
MD5
5d4a1543df1e7ee3ec6393b7f2e9435c
-
SHA1
f57d0fbb8a3c5f96486b87bfeb56c9ee140faca9
-
SHA256
f2fe3aa0d244d7f17610042ee41aaa3eff40b1a349b43f317ff92f6ec5b7608e
-
SHA512
7e56907cc86e423bab6bc02661ca8ba7787ed5fe412a226a326a97ed115c3b9da03f2ef6ec603fcb6f2b561be31487ec252d337c68791079b0ffe85e03312e78
-
SSDEEP
12288:ppahc5Gs5eiBq7rdlsOkbSFRUx4rbFY4Qo/g7bmGhiqZr8JqkOMbpceiLz1dl:pZci87Hs5bRkQommGQKJWpBiZ
Malware Config
Extracted
remcos
Admepc
darkotemplar.sytes.net:1999
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
admepc.exe
-
copy_folder
Admepc
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
admepc
-
mouse_option
false
-
mutex
Rmc-SETMPC
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
f2fe3aa0d244d7f17610042ee41aaa3eff40b1a349b43f317ff92f6ec5b7608e.exedescription pid process target process PID 1600 set thread context of 2840 1600 f2fe3aa0d244d7f17610042ee41aaa3eff40b1a349b43f317ff92f6ec5b7608e.exe f2fe3aa0d244d7f17610042ee41aaa3eff40b1a349b43f317ff92f6ec5b7608e.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1916 2840 WerFault.exe f2fe3aa0d244d7f17610042ee41aaa3eff40b1a349b43f317ff92f6ec5b7608e.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
f2fe3aa0d244d7f17610042ee41aaa3eff40b1a349b43f317ff92f6ec5b7608e.exedescription pid process target process PID 1600 wrote to memory of 2840 1600 f2fe3aa0d244d7f17610042ee41aaa3eff40b1a349b43f317ff92f6ec5b7608e.exe f2fe3aa0d244d7f17610042ee41aaa3eff40b1a349b43f317ff92f6ec5b7608e.exe PID 1600 wrote to memory of 2840 1600 f2fe3aa0d244d7f17610042ee41aaa3eff40b1a349b43f317ff92f6ec5b7608e.exe f2fe3aa0d244d7f17610042ee41aaa3eff40b1a349b43f317ff92f6ec5b7608e.exe PID 1600 wrote to memory of 2840 1600 f2fe3aa0d244d7f17610042ee41aaa3eff40b1a349b43f317ff92f6ec5b7608e.exe f2fe3aa0d244d7f17610042ee41aaa3eff40b1a349b43f317ff92f6ec5b7608e.exe PID 1600 wrote to memory of 2840 1600 f2fe3aa0d244d7f17610042ee41aaa3eff40b1a349b43f317ff92f6ec5b7608e.exe f2fe3aa0d244d7f17610042ee41aaa3eff40b1a349b43f317ff92f6ec5b7608e.exe PID 1600 wrote to memory of 2840 1600 f2fe3aa0d244d7f17610042ee41aaa3eff40b1a349b43f317ff92f6ec5b7608e.exe f2fe3aa0d244d7f17610042ee41aaa3eff40b1a349b43f317ff92f6ec5b7608e.exe PID 1600 wrote to memory of 2840 1600 f2fe3aa0d244d7f17610042ee41aaa3eff40b1a349b43f317ff92f6ec5b7608e.exe f2fe3aa0d244d7f17610042ee41aaa3eff40b1a349b43f317ff92f6ec5b7608e.exe PID 1600 wrote to memory of 2840 1600 f2fe3aa0d244d7f17610042ee41aaa3eff40b1a349b43f317ff92f6ec5b7608e.exe f2fe3aa0d244d7f17610042ee41aaa3eff40b1a349b43f317ff92f6ec5b7608e.exe PID 1600 wrote to memory of 2840 1600 f2fe3aa0d244d7f17610042ee41aaa3eff40b1a349b43f317ff92f6ec5b7608e.exe f2fe3aa0d244d7f17610042ee41aaa3eff40b1a349b43f317ff92f6ec5b7608e.exe PID 1600 wrote to memory of 2840 1600 f2fe3aa0d244d7f17610042ee41aaa3eff40b1a349b43f317ff92f6ec5b7608e.exe f2fe3aa0d244d7f17610042ee41aaa3eff40b1a349b43f317ff92f6ec5b7608e.exe PID 1600 wrote to memory of 2840 1600 f2fe3aa0d244d7f17610042ee41aaa3eff40b1a349b43f317ff92f6ec5b7608e.exe f2fe3aa0d244d7f17610042ee41aaa3eff40b1a349b43f317ff92f6ec5b7608e.exe PID 1600 wrote to memory of 2840 1600 f2fe3aa0d244d7f17610042ee41aaa3eff40b1a349b43f317ff92f6ec5b7608e.exe f2fe3aa0d244d7f17610042ee41aaa3eff40b1a349b43f317ff92f6ec5b7608e.exe PID 1600 wrote to memory of 2840 1600 f2fe3aa0d244d7f17610042ee41aaa3eff40b1a349b43f317ff92f6ec5b7608e.exe f2fe3aa0d244d7f17610042ee41aaa3eff40b1a349b43f317ff92f6ec5b7608e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2fe3aa0d244d7f17610042ee41aaa3eff40b1a349b43f317ff92f6ec5b7608e.exe"C:\Users\Admin\AppData\Local\Temp\f2fe3aa0d244d7f17610042ee41aaa3eff40b1a349b43f317ff92f6ec5b7608e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f2fe3aa0d244d7f17610042ee41aaa3eff40b1a349b43f317ff92f6ec5b7608e.exe"C:\Users\Admin\AppData\Local\Temp\f2fe3aa0d244d7f17610042ee41aaa3eff40b1a349b43f317ff92f6ec5b7608e.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2840 -s 5123⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 2840 -ip 28401⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4060 --field-trial-handle=3240,i,13319578961094268484,16557498665191861597,262144 --variations-seed-version /prefetch:81⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1600-0-0x0000000074EE0000-0x0000000075690000-memory.dmpFilesize
7.7MB
-
memory/1600-1-0x0000000000240000-0x000000000033E000-memory.dmpFilesize
1016KB
-
memory/1600-2-0x0000000004E20000-0x0000000004E30000-memory.dmpFilesize
64KB
-
memory/1600-3-0x0000000004CC0000-0x0000000004D6E000-memory.dmpFilesize
696KB
-
memory/1600-4-0x00000000053E0000-0x0000000005984000-memory.dmpFilesize
5.6MB
-
memory/1600-5-0x0000000004ED0000-0x0000000004F62000-memory.dmpFilesize
584KB
-
memory/1600-6-0x0000000004F70000-0x000000000500C000-memory.dmpFilesize
624KB
-
memory/1600-7-0x0000000004E10000-0x0000000004E18000-memory.dmpFilesize
32KB
-
memory/1600-21-0x0000000074EE0000-0x0000000075690000-memory.dmpFilesize
7.7MB
-
memory/2840-9-0x0000000000630000-0x00000000006B2000-memory.dmpFilesize
520KB
-
memory/2840-14-0x0000000000630000-0x00000000006B2000-memory.dmpFilesize
520KB
-
memory/2840-20-0x0000000000630000-0x00000000006B2000-memory.dmpFilesize
520KB