Analysis
-
max time kernel
148s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 11:34
Static task
static1
Behavioral task
behavioral1
Sample
Customer Advisory - HS Code - Maersk Shipping.ppt.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
Customer Advisory - HS Code - Maersk Shipping.ppt.exe
Resource
win10v2004-20240508-en
General
-
Target
Customer Advisory - HS Code - Maersk Shipping.ppt.exe
-
Size
947KB
-
MD5
23f0cf81aa7d1c7a4a23e95e5a2595e4
-
SHA1
0e477abeb86ae366d906a247e8f30b4ccdc02eef
-
SHA256
a135b28345728e0533bf4bdad442dfee04d2e6f67e9b04ebb088919ef18d6601
-
SHA512
208db7a72859d78a9b9ee235f78ae55b3fbc05fec9c475c5aaf66ffd50e4d9c16d58620473a21ffd0c19874b4906f9c0b7b1e77b6bd22f9cf87789ad3d4ab0e9
-
SSDEEP
24576:/YTyQ+R2J+E34ppWnRM/ggnlWWf5tlD7k:/pbkJqbMWBtN
Malware Config
Extracted
remcos
FmGlobal
royaldachpharmacy.duckdns.org:6395
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
services.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-GRT17F
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
NirSoft MailPassView 2 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral2/memory/1416-41-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView behavioral2/memory/1416-47-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 3 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule behavioral2/memory/380-33-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView behavioral2/memory/380-30-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView behavioral2/memory/380-52-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Nirsoft 7 IoCs
Processes:
resource yara_rule behavioral2/memory/380-33-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral2/memory/1416-41-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral2/memory/1416-47-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral2/memory/860-49-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/860-43-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/380-30-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral2/memory/380-52-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Customer Advisory - HS Code - Maersk Shipping.ppt.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Customer Advisory - HS Code - Maersk Shipping.ppt.exe -
Executes dropped EXE 4 IoCs
Processes:
services.exeservices.exeservices.exeservices.exepid process 1764 services.exe 380 services.exe 1416 services.exe 860 services.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
services.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts services.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
services.exeCustomer Advisory - HS Code - Maersk Shipping.ppt.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-GRT17F = "\"C:\\ProgramData\\Remcos\\services.exe\"" services.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Jqzdsttb = "C:\\Users\\Public\\Jqzdsttb.url" Customer Advisory - HS Code - Maersk Shipping.ppt.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rmc-GRT17F = "\"C:\\ProgramData\\Remcos\\services.exe\"" Customer Advisory - HS Code - Maersk Shipping.ppt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-GRT17F = "\"C:\\ProgramData\\Remcos\\services.exe\"" Customer Advisory - HS Code - Maersk Shipping.ppt.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rmc-GRT17F = "\"C:\\ProgramData\\Remcos\\services.exe\"" services.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
services.exedescription pid process target process PID 1764 set thread context of 380 1764 services.exe services.exe PID 1764 set thread context of 1416 1764 services.exe services.exe PID 1764 set thread context of 860 1764 services.exe services.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Script User-Agent 4 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 31 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 33 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 16 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 18 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
services.exeservices.exepid process 380 services.exe 380 services.exe 860 services.exe 860 services.exe 380 services.exe 380 services.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
services.exepid process 1764 services.exe 1764 services.exe 1764 services.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
services.exedescription pid process Token: SeDebugPrivilege 860 services.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
services.exepid process 1764 services.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Customer Advisory - HS Code - Maersk Shipping.ppt.exeservices.exedescription pid process target process PID 4712 wrote to memory of 2040 4712 Customer Advisory - HS Code - Maersk Shipping.ppt.exe extrac32.exe PID 4712 wrote to memory of 2040 4712 Customer Advisory - HS Code - Maersk Shipping.ppt.exe extrac32.exe PID 4712 wrote to memory of 2040 4712 Customer Advisory - HS Code - Maersk Shipping.ppt.exe extrac32.exe PID 4712 wrote to memory of 1764 4712 Customer Advisory - HS Code - Maersk Shipping.ppt.exe services.exe PID 4712 wrote to memory of 1764 4712 Customer Advisory - HS Code - Maersk Shipping.ppt.exe services.exe PID 4712 wrote to memory of 1764 4712 Customer Advisory - HS Code - Maersk Shipping.ppt.exe services.exe PID 1764 wrote to memory of 380 1764 services.exe services.exe PID 1764 wrote to memory of 380 1764 services.exe services.exe PID 1764 wrote to memory of 380 1764 services.exe services.exe PID 1764 wrote to memory of 1416 1764 services.exe services.exe PID 1764 wrote to memory of 1416 1764 services.exe services.exe PID 1764 wrote to memory of 1416 1764 services.exe services.exe PID 1764 wrote to memory of 860 1764 services.exe services.exe PID 1764 wrote to memory of 860 1764 services.exe services.exe PID 1764 wrote to memory of 860 1764 services.exe services.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Customer Advisory - HS Code - Maersk Shipping.ppt.exe"C:\Users\Admin\AppData\Local\Temp\Customer Advisory - HS Code - Maersk Shipping.ppt.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\SysWOW64\extrac32.exeC:\\Windows\\System32\\extrac32.exe /C /Y C:\Users\Admin\AppData\Local\Temp\Customer Advisory - HS Code - Maersk Shipping.ppt.exe C:\\Users\\Public\\Libraries\\Jqzdsttb.PIF2⤵PID:2040
-
-
C:\ProgramData\Remcos\services.exe"C:\ProgramData\Remcos\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\ProgramData\Remcos\services.exeC:\ProgramData\Remcos\services.exe /stext "C:\Users\Admin\AppData\Local\Temp\einkpnsgnqfetnirun"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:380
-
-
C:\ProgramData\Remcos\services.exeC:\ProgramData\Remcos\services.exe /stext "C:\Users\Admin\AppData\Local\Temp\ocscqfdibyxjduevdxlsje"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook accounts
PID:1416
-
-
C:\ProgramData\Remcos\services.exeC:\ProgramData\Remcos\services.exe /stext "C:\Users\Admin\AppData\Local\Temp\rfxvixnbpgpofasznifuujtdt"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:860
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD515263d2d2ff2b8772ff7b87fe327690f
SHA177d79943c50523726e96b90c12c508371b834f56
SHA2567eba789cd6be7f46bb2fd63c6989ae5b1e0ea9f6810b223f2e681224f5889252
SHA512127005a2969e486b5452621a082ffea8e1813a6f60604238198da05ad4fdf8b7365b707e70c2b91e3a5de4b668d39eaad9c92eb3ddc7d8bf5e400b6e46f15f7b
-
Filesize
947KB
MD523f0cf81aa7d1c7a4a23e95e5a2595e4
SHA10e477abeb86ae366d906a247e8f30b4ccdc02eef
SHA256a135b28345728e0533bf4bdad442dfee04d2e6f67e9b04ebb088919ef18d6601
SHA512208db7a72859d78a9b9ee235f78ae55b3fbc05fec9c475c5aaf66ffd50e4d9c16d58620473a21ffd0c19874b4906f9c0b7b1e77b6bd22f9cf87789ad3d4ab0e9
-
Filesize
4KB
MD58651f1ecc401fe73c45d06863467d144
SHA10150ba4649afe382ae1705552473bba7beb990f4
SHA25651827e101e890667e6d9b8aa7b804d56b53cadc110b5b8b834229788c29a65e8
SHA512c0b371d9080c0e82adae100a9400bb7bd239cfe243c072dde0f9310524b92d16a10db9117403d8af227cef9def552dba7c04da3b3bd46a88836acc071cb9890f