Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 12:12
Static task
static1
Behavioral task
behavioral1
Sample
5997f5719c8272c35a0428f7cf2804f9eabb9e8260a9ed8f3e38807c8ba15a41.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5997f5719c8272c35a0428f7cf2804f9eabb9e8260a9ed8f3e38807c8ba15a41.exe
Resource
win10v2004-20240226-en
General
-
Target
5997f5719c8272c35a0428f7cf2804f9eabb9e8260a9ed8f3e38807c8ba15a41.exe
-
Size
384KB
-
MD5
5d44e0aa3a2b58c2877f513d80d01e19
-
SHA1
578fd865531470f640aed391a3b21993237c424b
-
SHA256
5997f5719c8272c35a0428f7cf2804f9eabb9e8260a9ed8f3e38807c8ba15a41
-
SHA512
37785964539860a328613c2d1b2454b7885fdc037a5ed95778afd66a822319a4fdf3d320142e75b1ee749a488a063f283d5a8683c54e56f0dd4c3b9356257d8b
-
SSDEEP
6144:DDv9rF8ANTnYjY+98jtTG1bSqOMYZHEeK20CSdLMDoCiSYDBSmE5WhDTXHwQ0w:/p7FkcsSqOREveA4ECKBSRydf
Malware Config
Extracted
remcos
Protected
jgbours284hawara02.duckdns.org:3050
jgbours284hawara02.duckdns.org:3051
jgbours284hawara03.duckdns.org:3050
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
jiourhjs.dat
-
keylog_flag
false
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
klpcourg-793VPF
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral2/memory/1980-60-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule behavioral2/memory/4968-61-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Nirsoft 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1980-60-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral2/memory/4968-61-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral2/memory/4688-59-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
wab.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts wab.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bladselleriens168 = "%Dicyandiamide% -windowstyle minimized $Anillas=(Get-ItemProperty -Path 'HKCU:\\Sufflr50\\').Fanegas;%Dicyandiamide% ($Anillas)" reg.exe -
Drops file in System32 directory 1 IoCs
Processes:
5997f5719c8272c35a0428f7cf2804f9eabb9e8260a9ed8f3e38807c8ba15a41.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Cantraip\brkjerns.she 5997f5719c8272c35a0428f7cf2804f9eabb9e8260a9ed8f3e38807c8ba15a41.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
Processes:
wab.exepid process 1636 wab.exe 1636 wab.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
powershell.exewab.exepid process 3164 powershell.exe 1636 wab.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
powershell.exewab.exedescription pid process target process PID 3164 set thread context of 1636 3164 powershell.exe wab.exe PID 1636 set thread context of 4968 1636 wab.exe wab.exe PID 1636 set thread context of 1980 1636 wab.exe wab.exe PID 1636 set thread context of 4688 1636 wab.exe wab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
powershell.exewab.exewab.exepid process 3164 powershell.exe 3164 powershell.exe 3164 powershell.exe 3164 powershell.exe 3164 powershell.exe 3164 powershell.exe 3164 powershell.exe 3164 powershell.exe 3164 powershell.exe 3164 powershell.exe 4688 wab.exe 4688 wab.exe 4968 wab.exe 4968 wab.exe 4968 wab.exe 4968 wab.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
powershell.exewab.exepid process 3164 powershell.exe 1636 wab.exe 1636 wab.exe 1636 wab.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exewab.exedescription pid process Token: SeDebugPrivilege 3164 powershell.exe Token: SeDebugPrivilege 4688 wab.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
wab.exepid process 1636 wab.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
5997f5719c8272c35a0428f7cf2804f9eabb9e8260a9ed8f3e38807c8ba15a41.exepowershell.exewab.execmd.exedescription pid process target process PID 3220 wrote to memory of 3164 3220 5997f5719c8272c35a0428f7cf2804f9eabb9e8260a9ed8f3e38807c8ba15a41.exe powershell.exe PID 3220 wrote to memory of 3164 3220 5997f5719c8272c35a0428f7cf2804f9eabb9e8260a9ed8f3e38807c8ba15a41.exe powershell.exe PID 3220 wrote to memory of 3164 3220 5997f5719c8272c35a0428f7cf2804f9eabb9e8260a9ed8f3e38807c8ba15a41.exe powershell.exe PID 3164 wrote to memory of 2520 3164 powershell.exe cmd.exe PID 3164 wrote to memory of 2520 3164 powershell.exe cmd.exe PID 3164 wrote to memory of 2520 3164 powershell.exe cmd.exe PID 3164 wrote to memory of 1636 3164 powershell.exe wab.exe PID 3164 wrote to memory of 1636 3164 powershell.exe wab.exe PID 3164 wrote to memory of 1636 3164 powershell.exe wab.exe PID 3164 wrote to memory of 1636 3164 powershell.exe wab.exe PID 3164 wrote to memory of 1636 3164 powershell.exe wab.exe PID 1636 wrote to memory of 2992 1636 wab.exe cmd.exe PID 1636 wrote to memory of 2992 1636 wab.exe cmd.exe PID 1636 wrote to memory of 2992 1636 wab.exe cmd.exe PID 2992 wrote to memory of 2540 2992 cmd.exe reg.exe PID 2992 wrote to memory of 2540 2992 cmd.exe reg.exe PID 2992 wrote to memory of 2540 2992 cmd.exe reg.exe PID 1636 wrote to memory of 4968 1636 wab.exe wab.exe PID 1636 wrote to memory of 4968 1636 wab.exe wab.exe PID 1636 wrote to memory of 4968 1636 wab.exe wab.exe PID 1636 wrote to memory of 4968 1636 wab.exe wab.exe PID 1636 wrote to memory of 1980 1636 wab.exe wab.exe PID 1636 wrote to memory of 1980 1636 wab.exe wab.exe PID 1636 wrote to memory of 1980 1636 wab.exe wab.exe PID 1636 wrote to memory of 1980 1636 wab.exe wab.exe PID 1636 wrote to memory of 4688 1636 wab.exe wab.exe PID 1636 wrote to memory of 4688 1636 wab.exe wab.exe PID 1636 wrote to memory of 4688 1636 wab.exe wab.exe PID 1636 wrote to memory of 4688 1636 wab.exe wab.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5997f5719c8272c35a0428f7cf2804f9eabb9e8260a9ed8f3e38807c8ba15a41.exe"C:\Users\Admin\AppData\Local\Temp\5997f5719c8272c35a0428f7cf2804f9eabb9e8260a9ed8f3e38807c8ba15a41.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Kernebiders=Get-Content 'C:\Users\Admin\AppData\Local\mesostoma\Vicomtesses\Rettelsens.Fun';$Henvisningsformaalenes=$Kernebiders.SubString(52381,3);.$Henvisningsformaalenes($Kernebiders)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" "/c set /A 1^^0"3⤵PID:2520
-
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"3⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Bladselleriens168" /t REG_EXPAND_SZ /d "%Dicyandiamide% -windowstyle minimized $Anillas=(Get-ItemProperty -Path 'HKCU:\Sufflr50\').Fanegas;%Dicyandiamide% ($Anillas)"4⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Bladselleriens168" /t REG_EXPAND_SZ /d "%Dicyandiamide% -windowstyle minimized $Anillas=(Get-ItemProperty -Path 'HKCU:\Sufflr50\').Fanegas;%Dicyandiamide% ($Anillas)"5⤵
- Adds Run key to start application
- Modifies registry key
PID:2540
-
-
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tuorsccaplsxellglchbwz"4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4968
-
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\dotbtuntltkchzhkuetuhefkc"4⤵
- Accesses Microsoft Outlook accounts
PID:1980
-
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\oryutnxvzbcprfvolpowkqrblpfqs"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4688
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4104 --field-trial-handle=2280,i,11703952675008463361,17436195144517971517,262144 --variations-seed-version /prefetch:81⤵PID:2296
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4KB
MD510fa8ec140c204486092fb161e567ec7
SHA14d63e1f8df3afefedb19df73d7ee5f3b1e7b6473
SHA2567176ca3d0196ec46f178107fdb587adaef3f6ea65daa80eccd2371a515880e04
SHA5129db4eeb3f07d8d0579f75f3426c91156809152d8c1a37c9a27bf159888f6dd97f1212ac80f5bbb17e4d86f3087c512ccba2ca50a2db07d071370bd36364e1f76
-
Filesize
51KB
MD56b26f241773f6d93d74baa158720f000
SHA127544fb26ed0f29e578e75086f237053f33d447b
SHA25608c8481e9f4d40638f5754c9949884bc8ee962a5cc0dad71455f03043ad9ca1a
SHA512f8d411c78094a180f9b5a4c0136df2c9f99d7fdf5dbc6842eb13bc96c062a93c7df666367deda8451a3c5e5a5eb17e33e6bd90b2482663a4acbebf38bd0ef19f
-
Filesize
331KB
MD5487bff0f93689ca23ac0bc1884bbc5a5
SHA1c032d16c921940bcff3f40e4c7f051d4a7d3af74
SHA256748d7d417c84a5655fd63d1563e01a9f65287c47e35a501516237497d123338d
SHA512708e5026a25e5043c3c05e51a86e76d85b79d9ea3c032520e2cb7714a8e4a3fd1684356dcd30a99d721146f9b06e94f76c7e45d5b8606a0e3b0e981f7a8cb368