Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
17-05-2024 01:37
Static task
static1
Behavioral task
behavioral1
Sample
PO 738900.exe
Resource
win7-20240508-en
General
-
Target
PO 738900.exe
-
Size
1.1MB
-
MD5
a4df734fada4dec0bebcbbbed4e083ab
-
SHA1
283763090c6af71ef60d76b4515c9edebd416bcf
-
SHA256
e0d74fa44286f3a4c4c4c2fc151a339f487c2af644fb9691016dcf057b3bd343
-
SHA512
914b580fefa91d948a256c2f2ab39b18f36f631e7ff9c387888334521221466814af45bde59b59420c8eb6f22d0808afc6e27f3b562d5c495ab8b8a7666af637
-
SSDEEP
24576:bOp3fxqwcD01FUKer5zdzDarNhrBAJhDdiGXck5WZ7XZeLBmWlo:bOZOqbeDsBixy7XZsblo
Malware Config
Extracted
remcos
76364
103.150.8.12:5689
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-FF0K7G
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
detects Windows exceutables potentially bypassing UAC using eventvwr.exe 21 IoCs
Processes:
resource yara_rule behavioral1/memory/2060-31-0x0000000000400000-0x000000000047F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer behavioral1/memory/2060-35-0x0000000000400000-0x000000000047F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer behavioral1/memory/2060-34-0x0000000000400000-0x000000000047F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer behavioral1/memory/2060-32-0x0000000000400000-0x000000000047F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer behavioral1/memory/2060-29-0x0000000000400000-0x000000000047F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer behavioral1/memory/2060-26-0x0000000000400000-0x000000000047F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer behavioral1/memory/2060-24-0x0000000000400000-0x000000000047F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer behavioral1/memory/2060-23-0x0000000000400000-0x000000000047F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer behavioral1/memory/2060-20-0x0000000000400000-0x000000000047F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer behavioral1/memory/2060-36-0x0000000000400000-0x000000000047F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer behavioral1/memory/2060-37-0x0000000000400000-0x000000000047F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer behavioral1/memory/2060-38-0x0000000000400000-0x000000000047F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer behavioral1/memory/2060-39-0x0000000000400000-0x000000000047F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer behavioral1/memory/2060-40-0x0000000000400000-0x000000000047F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer behavioral1/memory/2060-41-0x0000000000400000-0x000000000047F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer behavioral1/memory/2060-42-0x0000000000400000-0x000000000047F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer behavioral1/memory/2060-43-0x0000000000400000-0x000000000047F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer behavioral1/memory/2060-44-0x0000000000400000-0x000000000047F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer behavioral1/memory/2060-45-0x0000000000400000-0x000000000047F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer behavioral1/memory/2060-46-0x0000000000400000-0x000000000047F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer behavioral1/memory/2060-47-0x0000000000400000-0x000000000047F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
PO 738900.exedescription pid process target process PID 2368 set thread context of 2060 2368 PO 738900.exe PO 738900.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 2716 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2716 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
PO 738900.exedescription pid process target process PID 2368 wrote to memory of 2716 2368 PO 738900.exe powershell.exe PID 2368 wrote to memory of 2716 2368 PO 738900.exe powershell.exe PID 2368 wrote to memory of 2716 2368 PO 738900.exe powershell.exe PID 2368 wrote to memory of 2716 2368 PO 738900.exe powershell.exe PID 2368 wrote to memory of 2752 2368 PO 738900.exe schtasks.exe PID 2368 wrote to memory of 2752 2368 PO 738900.exe schtasks.exe PID 2368 wrote to memory of 2752 2368 PO 738900.exe schtasks.exe PID 2368 wrote to memory of 2752 2368 PO 738900.exe schtasks.exe PID 2368 wrote to memory of 2060 2368 PO 738900.exe PO 738900.exe PID 2368 wrote to memory of 2060 2368 PO 738900.exe PO 738900.exe PID 2368 wrote to memory of 2060 2368 PO 738900.exe PO 738900.exe PID 2368 wrote to memory of 2060 2368 PO 738900.exe PO 738900.exe PID 2368 wrote to memory of 2060 2368 PO 738900.exe PO 738900.exe PID 2368 wrote to memory of 2060 2368 PO 738900.exe PO 738900.exe PID 2368 wrote to memory of 2060 2368 PO 738900.exe PO 738900.exe PID 2368 wrote to memory of 2060 2368 PO 738900.exe PO 738900.exe PID 2368 wrote to memory of 2060 2368 PO 738900.exe PO 738900.exe PID 2368 wrote to memory of 2060 2368 PO 738900.exe PO 738900.exe PID 2368 wrote to memory of 2060 2368 PO 738900.exe PO 738900.exe PID 2368 wrote to memory of 2060 2368 PO 738900.exe PO 738900.exe PID 2368 wrote to memory of 2060 2368 PO 738900.exe PO 738900.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO 738900.exe"C:\Users\Admin\AppData\Local\Temp\PO 738900.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\tkoOXvlkbwis.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2716
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tkoOXvlkbwis" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5DBA.tmp"2⤵
- Creates scheduled task(s)
PID:2752
-
-
C:\Users\Admin\AppData\Local\Temp\PO 738900.exe"C:\Users\Admin\AppData\Local\Temp\PO 738900.exe"2⤵PID:2060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD572e6ebc194d7a0466680106169857bcf
SHA14e4fa2208fd4051b2bc67e9291fef2392b5a8ca9
SHA25683e3c33d9f54056050fa35d1aa9d126b3daff3037b72c252edc4f0ed64352cab
SHA5128af39725d8a974ccc16c5116662117b161a5ad461abec2996cf6c49be4894ec1b53432833545aab4dd87df73dc05d34c66d3534d8ccaaaffcbf9fc87aec9f400