Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
17-05-2024 01:28
Static task
static1
Behavioral task
behavioral1
Sample
5997f5719c8272c35a0428f7cf2804f9eabb9e8260a9ed8f3e38807c8ba15a41.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5997f5719c8272c35a0428f7cf2804f9eabb9e8260a9ed8f3e38807c8ba15a41.exe
Resource
win10v2004-20240508-en
General
-
Target
5997f5719c8272c35a0428f7cf2804f9eabb9e8260a9ed8f3e38807c8ba15a41.exe
-
Size
384KB
-
MD5
5d44e0aa3a2b58c2877f513d80d01e19
-
SHA1
578fd865531470f640aed391a3b21993237c424b
-
SHA256
5997f5719c8272c35a0428f7cf2804f9eabb9e8260a9ed8f3e38807c8ba15a41
-
SHA512
37785964539860a328613c2d1b2454b7885fdc037a5ed95778afd66a822319a4fdf3d320142e75b1ee749a488a063f283d5a8683c54e56f0dd4c3b9356257d8b
-
SSDEEP
6144:DDv9rF8ANTnYjY+98jtTG1bSqOMYZHEeK20CSdLMDoCiSYDBSmE5WhDTXHwQ0w:/p7FkcsSqOREveA4ECKBSRydf
Malware Config
Extracted
remcos
Protected
jgbours284hawara02.duckdns.org:3050
jgbours284hawara02.duckdns.org:3051
jgbours284hawara03.duckdns.org:3050
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
jiourhjs.dat
-
keylog_flag
false
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
klpcourg-793VPF
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2520-52-0x0000000000490000-0x00000000014F2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\Bladselleriens168 = "%Dicyandiamide% -windowstyle minimized $Anillas=(Get-ItemProperty -Path 'HKCU:\\Sufflr50\\').Fanegas;%Dicyandiamide% ($Anillas)" reg.exe -
Drops file in System32 directory 1 IoCs
Processes:
5997f5719c8272c35a0428f7cf2804f9eabb9e8260a9ed8f3e38807c8ba15a41.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Cantraip\brkjerns.she 5997f5719c8272c35a0428f7cf2804f9eabb9e8260a9ed8f3e38807c8ba15a41.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
Processes:
wab.exepid process 2520 wab.exe 2520 wab.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
powershell.exewab.exepid process 2268 powershell.exe 2520 wab.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 2268 set thread context of 2520 2268 powershell.exe wab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
powershell.exepid process 2268 powershell.exe 2268 powershell.exe 2268 powershell.exe 2268 powershell.exe 2268 powershell.exe 2268 powershell.exe 2268 powershell.exe 2268 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
powershell.exepid process 2268 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2268 powershell.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
5997f5719c8272c35a0428f7cf2804f9eabb9e8260a9ed8f3e38807c8ba15a41.exepowershell.exewab.execmd.exedescription pid process target process PID 3024 wrote to memory of 2268 3024 5997f5719c8272c35a0428f7cf2804f9eabb9e8260a9ed8f3e38807c8ba15a41.exe powershell.exe PID 3024 wrote to memory of 2268 3024 5997f5719c8272c35a0428f7cf2804f9eabb9e8260a9ed8f3e38807c8ba15a41.exe powershell.exe PID 3024 wrote to memory of 2268 3024 5997f5719c8272c35a0428f7cf2804f9eabb9e8260a9ed8f3e38807c8ba15a41.exe powershell.exe PID 3024 wrote to memory of 2268 3024 5997f5719c8272c35a0428f7cf2804f9eabb9e8260a9ed8f3e38807c8ba15a41.exe powershell.exe PID 2268 wrote to memory of 2588 2268 powershell.exe cmd.exe PID 2268 wrote to memory of 2588 2268 powershell.exe cmd.exe PID 2268 wrote to memory of 2588 2268 powershell.exe cmd.exe PID 2268 wrote to memory of 2588 2268 powershell.exe cmd.exe PID 2268 wrote to memory of 2520 2268 powershell.exe wab.exe PID 2268 wrote to memory of 2520 2268 powershell.exe wab.exe PID 2268 wrote to memory of 2520 2268 powershell.exe wab.exe PID 2268 wrote to memory of 2520 2268 powershell.exe wab.exe PID 2268 wrote to memory of 2520 2268 powershell.exe wab.exe PID 2268 wrote to memory of 2520 2268 powershell.exe wab.exe PID 2520 wrote to memory of 1816 2520 wab.exe cmd.exe PID 2520 wrote to memory of 1816 2520 wab.exe cmd.exe PID 2520 wrote to memory of 1816 2520 wab.exe cmd.exe PID 2520 wrote to memory of 1816 2520 wab.exe cmd.exe PID 1816 wrote to memory of 2464 1816 cmd.exe reg.exe PID 1816 wrote to memory of 2464 1816 cmd.exe reg.exe PID 1816 wrote to memory of 2464 1816 cmd.exe reg.exe PID 1816 wrote to memory of 2464 1816 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5997f5719c8272c35a0428f7cf2804f9eabb9e8260a9ed8f3e38807c8ba15a41.exe"C:\Users\Admin\AppData\Local\Temp\5997f5719c8272c35a0428f7cf2804f9eabb9e8260a9ed8f3e38807c8ba15a41.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Kernebiders=Get-Content 'C:\Users\Admin\AppData\Local\mesostoma\Vicomtesses\Rettelsens.Fun';$Henvisningsformaalenes=$Kernebiders.SubString(52381,3);.$Henvisningsformaalenes($Kernebiders)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" "/c set /A 1^^0"3⤵PID:2588
-
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"3⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Bladselleriens168" /t REG_EXPAND_SZ /d "%Dicyandiamide% -windowstyle minimized $Anillas=(Get-ItemProperty -Path 'HKCU:\Sufflr50\').Fanegas;%Dicyandiamide% ($Anillas)"4⤵
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Bladselleriens168" /t REG_EXPAND_SZ /d "%Dicyandiamide% -windowstyle minimized $Anillas=(Get-ItemProperty -Path 'HKCU:\Sufflr50\').Fanegas;%Dicyandiamide% ($Anillas)"5⤵
- Adds Run key to start application
- Modifies registry key
PID:2464
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
51KB
MD56b26f241773f6d93d74baa158720f000
SHA127544fb26ed0f29e578e75086f237053f33d447b
SHA25608c8481e9f4d40638f5754c9949884bc8ee962a5cc0dad71455f03043ad9ca1a
SHA512f8d411c78094a180f9b5a4c0136df2c9f99d7fdf5dbc6842eb13bc96c062a93c7df666367deda8451a3c5e5a5eb17e33e6bd90b2482663a4acbebf38bd0ef19f
-
Filesize
331KB
MD5487bff0f93689ca23ac0bc1884bbc5a5
SHA1c032d16c921940bcff3f40e4c7f051d4a7d3af74
SHA256748d7d417c84a5655fd63d1563e01a9f65287c47e35a501516237497d123338d
SHA512708e5026a25e5043c3c05e51a86e76d85b79d9ea3c032520e2cb7714a8e4a3fd1684356dcd30a99d721146f9b06e94f76c7e45d5b8606a0e3b0e981f7a8cb368