Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-04-2024 02:32

General

  • Target

    ef413eb1c49ca9cda1220c73b5f95138015c5d0e44d49589ae717def16af6ec0.exe

  • Size

    1.3MB

  • MD5

    69eaab67fd89a7dca0de1a2405d0df34

  • SHA1

    e1d55aca4c9c6edce5a1301f678f09826af3670e

  • SHA256

    ef413eb1c49ca9cda1220c73b5f95138015c5d0e44d49589ae717def16af6ec0

  • SHA512

    7c132d714c08a59d12f57f6b18669577a506398a87a9a050306a271c4be81975228d3e80a08ad7ba2d5cff1dd87ea7fff90ee3216b6cbaa009733930d5943140

  • SSDEEP

    24576:nAHnh+eWsN3skA4RV1Hom2KXMmHap7d4DajNV+zfKw6F5E1ZkDhJFa5:ah+ZkldoPK8Yapu+35qSDh8

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

sub.thisisnot2abuse.xyz:2080

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-PVWWU4

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot7124146126:AAGAbs9iw3XzfgH3tTN58djGN81AnAy9t-E/

https://api.telegram.org/bot5641014861:AAEm_7YGp9cbvOBbk5wT5BYfwW_Yl2L8a9Q/

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • NirSoft MailPassView 2 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 3 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 7 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef413eb1c49ca9cda1220c73b5f95138015c5d0e44d49589ae717def16af6ec0.exe
    "C:\Users\Admin\AppData\Local\Temp\ef413eb1c49ca9cda1220c73b5f95138015c5d0e44d49589ae717def16af6ec0.exe"
    1⤵
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:5016
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Users\Admin\AppData\Local\Temp\ef413eb1c49ca9cda1220c73b5f95138015c5d0e44d49589ae717def16af6ec0.exe"
      2⤵
        PID:2472
      • C:\Users\Admin\AppData\Local\Temp\ef413eb1c49ca9cda1220c73b5f95138015c5d0e44d49589ae717def16af6ec0.exe
        "C:\Users\Admin\AppData\Local\Temp\ef413eb1c49ca9cda1220c73b5f95138015c5d0e44d49589ae717def16af6ec0.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1676
        • C:\Windows\SysWOW64\svchost.exe
          "C:\Users\Admin\AppData\Local\Temp\ef413eb1c49ca9cda1220c73b5f95138015c5d0e44d49589ae717def16af6ec0.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:2504
          • C:\Windows\SysWOW64\svchost.exe
            C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\Admin\AppData\Local\Temp\kgpi"
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:4884
          • C:\Windows\SysWOW64\svchost.exe
            C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\Admin\AppData\Local\Temp\uiubsrk"
            4⤵
            • Accesses Microsoft Outlook accounts
            PID:5024
          • C:\Windows\SysWOW64\svchost.exe
            C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\Admin\AppData\Local\Temp\wcattjuctoc"
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:5064
          • C:\Users\Admin\AppData\Local\Temp\MINEOr.exe
            "C:\Users\Admin\AppData\Local\Temp\MINEOr.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1008
          • C:\Users\Admin\AppData\Local\Temp\COMddd.exe
            "C:\Users\Admin\AppData\Local\Temp\COMddd.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2500

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Anglophile
      Filesize

      29KB

      MD5

      e8991bf2bca0fe104b3528232fc91529

      SHA1

      7f1e768a257869db6d95299db0274905a94236cf

      SHA256

      431de39c1fedad4064f0021c9c8e0ad762717ea96e1b0243a456c4bd8b125167

      SHA512

      54ef5fe9ee73c622d4a74ba6c15bcb87124ce327cfe58a3af8c6db2c3118d608e5372d451563b5302ec377104b80d2d207e7346d0aa884903292e28a1a8ee3a3

    • C:\Users\Admin\AppData\Local\Temp\COMddd.exe
      Filesize

      234KB

      MD5

      b8bf53bd1b6236e6e4e1de037830802c

      SHA1

      a8b9be18347a91bf7d4acaf08fb910a533084620

      SHA256

      50efb12a800e55214863400a9c791d3675569f605e91098cad8f6d0d158a0d41

      SHA512

      ac6e5cb49de3940ff1cfaf836bc217d5e3a694cc9bace130fcb3d6bf58cd94635f5ee22acba20c9d054c4e002e73f31bd0f496ab5f1854bcc323d23f2f710dbc

    • C:\Users\Admin\AppData\Local\Temp\MINEOr.exe
      Filesize

      237KB

      MD5

      a46d418f60ad2ba7a8d579607a5b2ba6

      SHA1

      eca362a36a86322b2f8da228f363b98d7083095b

      SHA256

      f67b6a804a2712d92aa67b499c8434ae8c5193d4b598470eba9dd9ff181c83da

      SHA512

      600725e4208c0efb599e80d678b7d5532c3bad6057c3a6d891b764ce2bcc582e43e94a556d25eb8b91455c2987b56e3f497c2c5d902960033e512900eebbe230

    • C:\Users\Admin\AppData\Local\Temp\kgpi
      Filesize

      4KB

      MD5

      f97c396687d09448bccf0c3c470beb25

      SHA1

      fb14d5b945f3ca0d304750530ae583860940aaeb

      SHA256

      1e8fe5b750c0b577cfe7732e87fe963547deea8ac3ca24410e32a9066ebd7f5b

      SHA512

      57b9d7d9d6593df68e84e01a6974b88a382284626397b4cbb0d08257d29d6715347024e0968b052e97d45233f90d608cfb448285064efa62e9fcd3bb583d1e0c

    • C:\Users\Admin\AppData\Local\Temp\unhelpable
      MD5

      d41d8cd98f00b204e9800998ecf8427e

      SHA1

      da39a3ee5e6b4b0d3255bfef95601890afd80709

      SHA256

      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

      SHA512

      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

    • memory/1008-111-0x0000000004DC0000-0x0000000004DD0000-memory.dmp
      Filesize

      64KB

    • memory/1008-108-0x00000000732C0000-0x0000000073A70000-memory.dmp
      Filesize

      7.7MB

    • memory/1008-103-0x0000000005DC0000-0x0000000005E5C000-memory.dmp
      Filesize

      624KB

    • memory/1008-95-0x0000000004DC0000-0x0000000004DD0000-memory.dmp
      Filesize

      64KB

    • memory/1008-86-0x0000000000360000-0x00000000003A2000-memory.dmp
      Filesize

      264KB

    • memory/1008-84-0x00000000732C0000-0x0000000073A70000-memory.dmp
      Filesize

      7.7MB

    • memory/2500-102-0x0000000006470000-0x00000000064C0000-memory.dmp
      Filesize

      320KB

    • memory/2500-106-0x0000000006E50000-0x0000000006E5A000-memory.dmp
      Filesize

      40KB

    • memory/2500-110-0x0000000005680000-0x0000000005690000-memory.dmp
      Filesize

      64KB

    • memory/2500-109-0x00000000732C0000-0x0000000073A70000-memory.dmp
      Filesize

      7.7MB

    • memory/2500-105-0x0000000006EA0000-0x0000000006F32000-memory.dmp
      Filesize

      584KB

    • memory/2500-91-0x0000000005680000-0x0000000005690000-memory.dmp
      Filesize

      64KB

    • memory/2500-92-0x00000000057B0000-0x0000000005816000-memory.dmp
      Filesize

      408KB

    • memory/2500-88-0x0000000005C60000-0x0000000006204000-memory.dmp
      Filesize

      5.6MB

    • memory/2500-87-0x00000000732C0000-0x0000000073A70000-memory.dmp
      Filesize

      7.7MB

    • memory/2500-85-0x0000000000DB0000-0x0000000000DF0000-memory.dmp
      Filesize

      256KB

    • memory/2504-26-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2504-118-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2504-119-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2504-98-0x0000000010000000-0x0000000010019000-memory.dmp
      Filesize

      100KB

    • memory/2504-117-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2504-116-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2504-115-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2504-31-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2504-114-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2504-71-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2504-30-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2504-48-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2504-29-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2504-28-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2504-83-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2504-113-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2504-112-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2504-99-0x0000000010000000-0x0000000010019000-memory.dmp
      Filesize

      100KB

    • memory/2504-23-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2504-27-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2504-33-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2504-94-0x0000000010000000-0x0000000010019000-memory.dmp
      Filesize

      100KB

    • memory/2504-34-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2504-24-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2504-107-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2504-101-0x0000000010000000-0x0000000010019000-memory.dmp
      Filesize

      100KB

    • memory/2504-100-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2504-32-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2504-25-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2504-104-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2504-37-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/4884-43-0x0000000000400000-0x0000000000478000-memory.dmp
      Filesize

      480KB

    • memory/4884-52-0x0000000000400000-0x0000000000478000-memory.dmp
      Filesize

      480KB

    • memory/4884-38-0x0000000000400000-0x0000000000478000-memory.dmp
      Filesize

      480KB

    • memory/4884-90-0x0000000000400000-0x0000000000478000-memory.dmp
      Filesize

      480KB

    • memory/4884-50-0x0000000000400000-0x0000000000478000-memory.dmp
      Filesize

      480KB

    • memory/5016-10-0x0000000003F00000-0x0000000003F04000-memory.dmp
      Filesize

      16KB

    • memory/5024-44-0x0000000000400000-0x0000000000462000-memory.dmp
      Filesize

      392KB

    • memory/5024-51-0x0000000000400000-0x0000000000462000-memory.dmp
      Filesize

      392KB

    • memory/5024-39-0x0000000000400000-0x0000000000462000-memory.dmp
      Filesize

      392KB

    • memory/5024-58-0x0000000000400000-0x0000000000462000-memory.dmp
      Filesize

      392KB

    • memory/5064-42-0x0000000000400000-0x0000000000424000-memory.dmp
      Filesize

      144KB

    • memory/5064-62-0x0000000000400000-0x0000000000424000-memory.dmp
      Filesize

      144KB

    • memory/5064-59-0x0000000000400000-0x0000000000424000-memory.dmp
      Filesize

      144KB

    • memory/5064-53-0x0000000000400000-0x0000000000424000-memory.dmp
      Filesize

      144KB