Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 02:16
Static task
static1
Behavioral task
behavioral1
Sample
524 KAO – SH 1X40HQ (代用) BOOKING資料如下~ EXWORK 1X40HQ.scr.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
524 KAO – SH 1X40HQ (代用) BOOKING資料如下~ EXWORK 1X40HQ.scr.exe
Resource
win10v2004-20240426-en
General
-
Target
524 KAO – SH 1X40HQ (代用) BOOKING資料如下~ EXWORK 1X40HQ.scr.exe
-
Size
1.3MB
-
MD5
60561cff1dee1f6bab79d28ab8a84dc3
-
SHA1
abd6f2841675755c088b4d70dee090225caa73db
-
SHA256
b27ccf7bb556e1f332c8feb3a12f6f3c4b0ba949c059cdc3a1bdd416fb87921e
-
SHA512
ab073292660e415fbc8181fe7fefb83c3cdb92531fd4812742f7143dc31a75f1ab8b0e72279d02ffef137956502aa5c13a8e78ed1894ffd648de74b11c946fff
-
SSDEEP
24576:4Mbni723L73/gXFxoYXpmTvCkV0uf5ZmH1OvAwP0Cwbn:43a3L73ou7vCkCua1RwML
Malware Config
Extracted
remcos
RemoteHost
104.250.180.178:7902
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
Microsoft .exe
-
copy_folder
Microsoft
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Microsoft -QUCX7D
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/3896-34-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/3260-33-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Nirsoft 3 IoCs
resource yara_rule behavioral2/memory/3896-34-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral2/memory/3452-42-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/3260-33-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts AddInProcess32.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 5064 set thread context of 1536 5064 524 KAO – SH 1X40HQ (代用) BOOKING資料如下~ EXWORK 1X40HQ.scr.exe 98 PID 1536 set thread context of 3260 1536 AddInProcess32.exe 100 PID 1536 set thread context of 3896 1536 AddInProcess32.exe 101 PID 1536 set thread context of 3452 1536 AddInProcess32.exe 103 -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5064 524 KAO – SH 1X40HQ (代用) BOOKING資料如下~ EXWORK 1X40HQ.scr.exe 5064 524 KAO – SH 1X40HQ (代用) BOOKING資料如下~ EXWORK 1X40HQ.scr.exe 5064 524 KAO – SH 1X40HQ (代用) BOOKING資料如下~ EXWORK 1X40HQ.scr.exe 5064 524 KAO – SH 1X40HQ (代用) BOOKING資料如下~ EXWORK 1X40HQ.scr.exe 3260 AddInProcess32.exe 3260 AddInProcess32.exe 3452 AddInProcess32.exe 3452 AddInProcess32.exe 3260 AddInProcess32.exe 3260 AddInProcess32.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 1536 AddInProcess32.exe 1536 AddInProcess32.exe 1536 AddInProcess32.exe 1536 AddInProcess32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5064 524 KAO – SH 1X40HQ (代用) BOOKING資料如下~ EXWORK 1X40HQ.scr.exe Token: SeDebugPrivilege 3452 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 5064 wrote to memory of 2620 5064 524 KAO – SH 1X40HQ (代用) BOOKING資料如下~ EXWORK 1X40HQ.scr.exe 97 PID 5064 wrote to memory of 2620 5064 524 KAO – SH 1X40HQ (代用) BOOKING資料如下~ EXWORK 1X40HQ.scr.exe 97 PID 5064 wrote to memory of 2620 5064 524 KAO – SH 1X40HQ (代用) BOOKING資料如下~ EXWORK 1X40HQ.scr.exe 97 PID 5064 wrote to memory of 2620 5064 524 KAO – SH 1X40HQ (代用) BOOKING資料如下~ EXWORK 1X40HQ.scr.exe 97 PID 5064 wrote to memory of 2620 5064 524 KAO – SH 1X40HQ (代用) BOOKING資料如下~ EXWORK 1X40HQ.scr.exe 97 PID 5064 wrote to memory of 2620 5064 524 KAO – SH 1X40HQ (代用) BOOKING資料如下~ EXWORK 1X40HQ.scr.exe 97 PID 5064 wrote to memory of 2620 5064 524 KAO – SH 1X40HQ (代用) BOOKING資料如下~ EXWORK 1X40HQ.scr.exe 97 PID 5064 wrote to memory of 2620 5064 524 KAO – SH 1X40HQ (代用) BOOKING資料如下~ EXWORK 1X40HQ.scr.exe 97 PID 5064 wrote to memory of 2620 5064 524 KAO – SH 1X40HQ (代用) BOOKING資料如下~ EXWORK 1X40HQ.scr.exe 97 PID 5064 wrote to memory of 2620 5064 524 KAO – SH 1X40HQ (代用) BOOKING資料如下~ EXWORK 1X40HQ.scr.exe 97 PID 5064 wrote to memory of 2620 5064 524 KAO – SH 1X40HQ (代用) BOOKING資料如下~ EXWORK 1X40HQ.scr.exe 97 PID 5064 wrote to memory of 2620 5064 524 KAO – SH 1X40HQ (代用) BOOKING資料如下~ EXWORK 1X40HQ.scr.exe 97 PID 5064 wrote to memory of 1536 5064 524 KAO – SH 1X40HQ (代用) BOOKING資料如下~ EXWORK 1X40HQ.scr.exe 98 PID 5064 wrote to memory of 1536 5064 524 KAO – SH 1X40HQ (代用) BOOKING資料如下~ EXWORK 1X40HQ.scr.exe 98 PID 5064 wrote to memory of 1536 5064 524 KAO – SH 1X40HQ (代用) BOOKING資料如下~ EXWORK 1X40HQ.scr.exe 98 PID 5064 wrote to memory of 1536 5064 524 KAO – SH 1X40HQ (代用) BOOKING資料如下~ EXWORK 1X40HQ.scr.exe 98 PID 5064 wrote to memory of 1536 5064 524 KAO – SH 1X40HQ (代用) BOOKING資料如下~ EXWORK 1X40HQ.scr.exe 98 PID 5064 wrote to memory of 1536 5064 524 KAO – SH 1X40HQ (代用) BOOKING資料如下~ EXWORK 1X40HQ.scr.exe 98 PID 5064 wrote to memory of 1536 5064 524 KAO – SH 1X40HQ (代用) BOOKING資料如下~ EXWORK 1X40HQ.scr.exe 98 PID 5064 wrote to memory of 1536 5064 524 KAO – SH 1X40HQ (代用) BOOKING資料如下~ EXWORK 1X40HQ.scr.exe 98 PID 5064 wrote to memory of 1536 5064 524 KAO – SH 1X40HQ (代用) BOOKING資料如下~ EXWORK 1X40HQ.scr.exe 98 PID 5064 wrote to memory of 1536 5064 524 KAO – SH 1X40HQ (代用) BOOKING資料如下~ EXWORK 1X40HQ.scr.exe 98 PID 5064 wrote to memory of 1536 5064 524 KAO – SH 1X40HQ (代用) BOOKING資料如下~ EXWORK 1X40HQ.scr.exe 98 PID 5064 wrote to memory of 1536 5064 524 KAO – SH 1X40HQ (代用) BOOKING資料如下~ EXWORK 1X40HQ.scr.exe 98 PID 1536 wrote to memory of 3260 1536 AddInProcess32.exe 100 PID 1536 wrote to memory of 3260 1536 AddInProcess32.exe 100 PID 1536 wrote to memory of 3260 1536 AddInProcess32.exe 100 PID 1536 wrote to memory of 3260 1536 AddInProcess32.exe 100 PID 1536 wrote to memory of 3896 1536 AddInProcess32.exe 101 PID 1536 wrote to memory of 3896 1536 AddInProcess32.exe 101 PID 1536 wrote to memory of 3896 1536 AddInProcess32.exe 101 PID 1536 wrote to memory of 3896 1536 AddInProcess32.exe 101 PID 1536 wrote to memory of 448 1536 AddInProcess32.exe 102 PID 1536 wrote to memory of 448 1536 AddInProcess32.exe 102 PID 1536 wrote to memory of 448 1536 AddInProcess32.exe 102 PID 1536 wrote to memory of 3452 1536 AddInProcess32.exe 103 PID 1536 wrote to memory of 3452 1536 AddInProcess32.exe 103 PID 1536 wrote to memory of 3452 1536 AddInProcess32.exe 103 PID 1536 wrote to memory of 3452 1536 AddInProcess32.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\524 KAO – SH 1X40HQ (代用) BOOKING資料如下~ EXWORK 1X40HQ.scr.exe"C:\Users\Admin\AppData\Local\Temp\524 KAO – SH 1X40HQ (代用) BOOKING資料如下~ EXWORK 1X40HQ.scr.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵PID:2620
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe /stext "C:\Users\Admin\AppData\Local\Temp\femcifsyxzlbzkyeaipblauokcqczceuu"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3260
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe /stext "C:\Users\Admin\AppData\Local\Temp\qhzvjp"3⤵
- Accesses Microsoft Outlook accounts
PID:3896
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe /stext "C:\Users\Admin\AppData\Local\Temp\abefjioth"3⤵PID:448
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe /stext "C:\Users\Admin\AppData\Local\Temp\abefjioth"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3452
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5365f45018b7bcc98591979d6c4b23752
SHA1073aff125450845105f5daa7d0e7cc24ee8bbca5
SHA25627be905cdbf87c23851d00d61afd5fcfe5c72b1de227ac7d8c0dc5c7583c9a6e
SHA5124bd0d2266c624b9ad40e9ba6cb4d63debd12f46f5c27afae3bfc20e3e7f5e9f9c88f83151166324223c5889034a4d70652cf747f6943af011191c64c28e18703