Analysis
-
max time kernel
1199s -
max time network
1192s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 21:28
Static task
static1
Behavioral task
behavioral1
Sample
Order confirmation.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240426-en
General
-
Target
Order confirmation.exe
-
Size
417KB
-
MD5
ce9a01b0cb4fefdcf3e515c04eed116a
-
SHA1
b8ad340b679ba3e82d7ffc638338b9b3a2aea6c9
-
SHA256
bd7881bba1d222d41dffeed7e666f6c916886ad5841842064922deef45b67e87
-
SHA512
a31da8278c3fd4661ce4d7a5d971a21a8cb4f5983998bd6aa2a8e51abee6f491edfd97a4ed05dd340539714a28267f1f9cb35910b3ce3f30927ff03451f55f9b
-
SSDEEP
12288:FdY4AJBniIuil827YSeuie2OeSNu0ldZ4obxZm5g4:Fe4AJBniIVsSeuie7HPZZZ4
Malware Config
Extracted
remcos
RemoteHost
185.202.173.179:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-IQO6U9
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
NirSoft MailPassView 2 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral1/memory/4692-33-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView behavioral1/memory/4692-35-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 3 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule behavioral1/memory/3180-36-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView behavioral1/memory/3180-32-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView behavioral1/memory/3180-48-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Nirsoft 8 IoCs
Processes:
resource yara_rule behavioral1/memory/4692-33-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral1/memory/4196-44-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral1/memory/4196-43-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral1/memory/3180-36-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral1/memory/4692-35-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral1/memory/3180-32-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral1/memory/4196-45-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral1/memory/3180-48-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft -
Loads dropped DLL 1 IoCs
Processes:
Order confirmation.exepid process 4144 Order confirmation.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
Order confirmation.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts Order confirmation.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
Processes:
Order confirmation.exepid process 540 Order confirmation.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
Order confirmation.exeOrder confirmation.exepid process 4144 Order confirmation.exe 540 Order confirmation.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
Order confirmation.exeOrder confirmation.exedescription pid process target process PID 4144 set thread context of 540 4144 Order confirmation.exe Order confirmation.exe PID 540 set thread context of 3180 540 Order confirmation.exe Order confirmation.exe PID 540 set thread context of 4692 540 Order confirmation.exe Order confirmation.exe PID 540 set thread context of 4196 540 Order confirmation.exe Order confirmation.exe -
Drops file in Windows directory 1 IoCs
Processes:
Order confirmation.exedescription ioc process File opened for modification C:\Windows\forsrgelsens.cur Order confirmation.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
Order confirmation.exeOrder confirmation.exepid process 3180 Order confirmation.exe 3180 Order confirmation.exe 4196 Order confirmation.exe 4196 Order confirmation.exe 3180 Order confirmation.exe 3180 Order confirmation.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Order confirmation.exepid process 540 Order confirmation.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
Order confirmation.exeOrder confirmation.exepid process 4144 Order confirmation.exe 540 Order confirmation.exe 540 Order confirmation.exe 540 Order confirmation.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Order confirmation.exedescription pid process Token: SeDebugPrivilege 4196 Order confirmation.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Order confirmation.exepid process 540 Order confirmation.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
Order confirmation.exeOrder confirmation.exedescription pid process target process PID 4144 wrote to memory of 540 4144 Order confirmation.exe Order confirmation.exe PID 4144 wrote to memory of 540 4144 Order confirmation.exe Order confirmation.exe PID 4144 wrote to memory of 540 4144 Order confirmation.exe Order confirmation.exe PID 4144 wrote to memory of 540 4144 Order confirmation.exe Order confirmation.exe PID 4144 wrote to memory of 540 4144 Order confirmation.exe Order confirmation.exe PID 540 wrote to memory of 3180 540 Order confirmation.exe Order confirmation.exe PID 540 wrote to memory of 3180 540 Order confirmation.exe Order confirmation.exe PID 540 wrote to memory of 3180 540 Order confirmation.exe Order confirmation.exe PID 540 wrote to memory of 4692 540 Order confirmation.exe Order confirmation.exe PID 540 wrote to memory of 4692 540 Order confirmation.exe Order confirmation.exe PID 540 wrote to memory of 4692 540 Order confirmation.exe Order confirmation.exe PID 540 wrote to memory of 4196 540 Order confirmation.exe Order confirmation.exe PID 540 wrote to memory of 4196 540 Order confirmation.exe Order confirmation.exe PID 540 wrote to memory of 4196 540 Order confirmation.exe Order confirmation.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Order confirmation.exe"C:\Users\Admin\AppData\Local\Temp\Order confirmation.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\Order confirmation.exe"C:\Users\Admin\AppData\Local\Temp\Order confirmation.exe"2⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\Order confirmation.exe"C:\Users\Admin\AppData\Local\Temp\Order confirmation.exe" /stext "C:\Users\Admin\AppData\Local\Temp\kteqglcqwffmnniawkgjgm"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3180
-
-
C:\Users\Admin\AppData\Local\Temp\Order confirmation.exe"C:\Users\Admin\AppData\Local\Temp\Order confirmation.exe" /stext "C:\Users\Admin\AppData\Local\Temp\nnjbhenjsnxyptwegvbkrzpqq"3⤵
- Accesses Microsoft Outlook accounts
PID:4692
-
-
C:\Users\Admin\AppData\Local\Temp\Order confirmation.exe"C:\Users\Admin\AppData\Local\Temp\Order confirmation.exe" /stext "C:\Users\Admin\AppData\Local\Temp\xhwuiwylgvpdaztixgneuekzzgin"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4196
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5b314bf6e44f4521ca13dcba0b1c76c7d
SHA150fc6799a78a258b65e7d30227319df4fd4619f3
SHA256ea14c4d8373f2c4767d61c86c1dffcbe3bfb24e94452a6856c722c543cf12afe
SHA51261821831295fbd6b6685dc49e0ba0d60771331a758f64dc75f9e988c38acef5aff2d97630f79624582c96b4fbbf86cfdd4b125196955866db89b418bfd037f6e
-
Filesize
4KB
MD52f9f3e06c08fbefb9d972eb45910783e
SHA1f8452829b8404981ee3f7ac2f8f4b16825014c14
SHA25641fcf3117cab8796adc9854cf66a6533fc2766f0e36abdaf04ce5fd7c13f5a50
SHA512db33ff568a991b3b7d6574e0b4514236f22d3df30c26593a18d7f2d879be2f6831e9d9361800ca349303ba9c43591643f04c090fb16dfc99f7301e197ff48dec
-
Filesize
11KB
MD575ed96254fbf894e42058062b4b4f0d1
SHA1996503f1383b49021eb3427bc28d13b5bbd11977
SHA256a632d74332b3f08f834c732a103dafeb09a540823a2217ca7f49159755e8f1d7
SHA51258174896db81d481947b8745dafe3a02c150f3938bb4543256e8cce1145154e016d481df9fe68dac6d48407c62cbe20753320ebd5fe5e84806d07ce78e0eb0c4