Analysis
-
max time kernel
147s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 14:38
Behavioral task
behavioral1
Sample
de4f901137b60be1b2c0155595baa77837d7325736cc1d4910536cd32cf58252.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
de4f901137b60be1b2c0155595baa77837d7325736cc1d4910536cd32cf58252.exe
Resource
win10v2004-20240412-en
General
-
Target
de4f901137b60be1b2c0155595baa77837d7325736cc1d4910536cd32cf58252.exe
-
Size
233KB
-
MD5
c8b5bcc79120a06f16b69bcef71324ac
-
SHA1
75acf6d77851efc30a181ad9a78334b7c272705a
-
SHA256
de4f901137b60be1b2c0155595baa77837d7325736cc1d4910536cd32cf58252
-
SHA512
e8e842e78ae6ae6a395a3c30f2ae043fc33762d0ac13df6ad333dbf1c28345ca79c7c5af5f9a33e134c13db9368a4b65a3a229c3189608b05e02402632bd5a7c
-
SSDEEP
6144:tmvl3n8iOiB4RBucKa3h80tK2gBWvADGGw6j1:8vlX8i8RB5JvADGGnj
Malware Config
Extracted
remcos
richard6474646
money001.duckdns.org:9596
salwanazeeze.duckdns.org:9595
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
windows.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-UMF99C
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
NirSoft MailPassView 3 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/2548-22-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView behavioral1/memory/2548-26-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView behavioral1/memory/2548-43-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 3 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral1/memory/2656-19-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView behavioral1/memory/2656-23-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView behavioral1/memory/2656-32-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Nirsoft 9 IoCs
resource yara_rule behavioral1/memory/2364-21-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral1/memory/2656-19-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral1/memory/2548-22-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral1/memory/2548-26-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral1/memory/2656-23-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral1/memory/2364-25-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral1/memory/2364-16-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral1/memory/2656-32-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral1/memory/2548-43-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/3068-0-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/3068-35-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/3068-45-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/3068-47-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/3068-51-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/3068-55-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/3068-58-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/3068-61-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/3068-63-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/3068-67-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/3068-70-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/3068-73-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/3068-76-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/3068-79-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/3068-82-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/3068-84-0x0000000000400000-0x000000000048A000-memory.dmp upx -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts de4f901137b60be1b2c0155595baa77837d7325736cc1d4910536cd32cf58252.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3068 set thread context of 2656 3068 de4f901137b60be1b2c0155595baa77837d7325736cc1d4910536cd32cf58252.exe 29 PID 3068 set thread context of 2548 3068 de4f901137b60be1b2c0155595baa77837d7325736cc1d4910536cd32cf58252.exe 30 PID 3068 set thread context of 2364 3068 de4f901137b60be1b2c0155595baa77837d7325736cc1d4910536cd32cf58252.exe 31 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2656 de4f901137b60be1b2c0155595baa77837d7325736cc1d4910536cd32cf58252.exe 2656 de4f901137b60be1b2c0155595baa77837d7325736cc1d4910536cd32cf58252.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 3068 de4f901137b60be1b2c0155595baa77837d7325736cc1d4910536cd32cf58252.exe 3068 de4f901137b60be1b2c0155595baa77837d7325736cc1d4910536cd32cf58252.exe 3068 de4f901137b60be1b2c0155595baa77837d7325736cc1d4910536cd32cf58252.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2364 de4f901137b60be1b2c0155595baa77837d7325736cc1d4910536cd32cf58252.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3068 de4f901137b60be1b2c0155595baa77837d7325736cc1d4910536cd32cf58252.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2656 3068 de4f901137b60be1b2c0155595baa77837d7325736cc1d4910536cd32cf58252.exe 29 PID 3068 wrote to memory of 2656 3068 de4f901137b60be1b2c0155595baa77837d7325736cc1d4910536cd32cf58252.exe 29 PID 3068 wrote to memory of 2656 3068 de4f901137b60be1b2c0155595baa77837d7325736cc1d4910536cd32cf58252.exe 29 PID 3068 wrote to memory of 2656 3068 de4f901137b60be1b2c0155595baa77837d7325736cc1d4910536cd32cf58252.exe 29 PID 3068 wrote to memory of 2548 3068 de4f901137b60be1b2c0155595baa77837d7325736cc1d4910536cd32cf58252.exe 30 PID 3068 wrote to memory of 2548 3068 de4f901137b60be1b2c0155595baa77837d7325736cc1d4910536cd32cf58252.exe 30 PID 3068 wrote to memory of 2548 3068 de4f901137b60be1b2c0155595baa77837d7325736cc1d4910536cd32cf58252.exe 30 PID 3068 wrote to memory of 2548 3068 de4f901137b60be1b2c0155595baa77837d7325736cc1d4910536cd32cf58252.exe 30 PID 3068 wrote to memory of 2364 3068 de4f901137b60be1b2c0155595baa77837d7325736cc1d4910536cd32cf58252.exe 31 PID 3068 wrote to memory of 2364 3068 de4f901137b60be1b2c0155595baa77837d7325736cc1d4910536cd32cf58252.exe 31 PID 3068 wrote to memory of 2364 3068 de4f901137b60be1b2c0155595baa77837d7325736cc1d4910536cd32cf58252.exe 31 PID 3068 wrote to memory of 2364 3068 de4f901137b60be1b2c0155595baa77837d7325736cc1d4910536cd32cf58252.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\de4f901137b60be1b2c0155595baa77837d7325736cc1d4910536cd32cf58252.exe"C:\Users\Admin\AppData\Local\Temp\de4f901137b60be1b2c0155595baa77837d7325736cc1d4910536cd32cf58252.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\de4f901137b60be1b2c0155595baa77837d7325736cc1d4910536cd32cf58252.exeC:\Users\Admin\AppData\Local\Temp\de4f901137b60be1b2c0155595baa77837d7325736cc1d4910536cd32cf58252.exe /stext "C:\Users\Admin\AppData\Local\Temp\psamsmckyndwwqcguhpm"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2656
-
-
C:\Users\Admin\AppData\Local\Temp\de4f901137b60be1b2c0155595baa77837d7325736cc1d4910536cd32cf58252.exeC:\Users\Admin\AppData\Local\Temp\de4f901137b60be1b2c0155595baa77837d7325736cc1d4910536cd32cf58252.exe /stext "C:\Users\Admin\AppData\Local\Temp\zmfwtfvemvvjheykdkcnqvpf"2⤵
- Accesses Microsoft Outlook accounts
PID:2548
-
-
C:\Users\Admin\AppData\Local\Temp\de4f901137b60be1b2c0155595baa77837d7325736cc1d4910536cd32cf58252.exeC:\Users\Admin\AppData\Local\Temp\de4f901137b60be1b2c0155595baa77837d7325736cc1d4910536cd32cf58252.exe /stext "C:\Users\Admin\AppData\Local\Temp\cokpuxgfidnojknouuphtijwyys"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD52efa3b69f0ee81d8927ea57e8efbe69e
SHA1a870a6fa5966ac6b638cd711f684b6df2eed8612
SHA256675c38fa6eca733f5ad305ea2eaba99e835c6815078626e153c212dd7d11a582
SHA51229d285faf7cfa9450de88d0ea9077bd9d93c0a955949e954670cd5cd967c52d35dcfd5c96221e777806640589f736a6d55e67ac7e3d9ba70ac7442de7fff48c3
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84