Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 10:08
Static task
static1
Behavioral task
behavioral1
Sample
5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr
Resource
win10v2004-20240426-en
General
-
Target
5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr
-
Size
926KB
-
MD5
1784f051e12e25d36f33965d1a32f806
-
SHA1
b51d7cba074c043b543a537db2743566fa3ba0ac
-
SHA256
ac28e104b06d7025bab07468070e74b3ea0017b34d25e48150b6c55f8ffda4bf
-
SHA512
a741dd7b19fab2192786b64df250adf5ab1538d2645f4c6986d5048a5ded901df5c09f24e39450c43a0eafcd09a1023533de96bbfaf4933bd1377068d81f8766
-
SSDEEP
12288:i3X4MaU+3Rk/T2xi/tRBd1XRbiacwiy75UZN7I7L7Zu28C//rBA0Rt:EsU+aqxi/vBnAx5ao8nEC//rC0R
Malware Config
Extracted
remcos
RemoteHost
104.250.180.178:7902
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
Microsoft .exe
-
copy_folder
Microsoft
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Microsoft -QUCX7D
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
NirSoft MailPassView 2 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral2/memory/5072-32-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView behavioral2/memory/5072-38-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 3 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule behavioral2/memory/2636-31-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView behavioral2/memory/2636-37-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView behavioral2/memory/2636-46-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Nirsoft 7 IoCs
Processes:
resource yara_rule behavioral2/memory/2636-31-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral2/memory/5072-32-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral2/memory/5072-38-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral2/memory/2636-37-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral2/memory/1836-41-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/1836-44-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/2636-46-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scrdescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr -
Suspicious use of SetThreadContext 4 IoCs
Processes:
5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scrdescription pid process target process PID 3460 set thread context of 3252 3460 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr PID 3252 set thread context of 2636 3252 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr PID 3252 set thread context of 5072 3252 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr PID 3252 set thread context of 1836 3252 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scrpid process 2636 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr 2636 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr 1836 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr 1836 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr 2636 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr 2636 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scrpid process 3252 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr 3252 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr 3252 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scrdescription pid process Token: SeDebugPrivilege 1836 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scrdescription pid process target process PID 3460 wrote to memory of 3252 3460 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr PID 3460 wrote to memory of 3252 3460 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr PID 3460 wrote to memory of 3252 3460 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr PID 3460 wrote to memory of 3252 3460 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr PID 3460 wrote to memory of 3252 3460 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr PID 3460 wrote to memory of 3252 3460 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr PID 3460 wrote to memory of 3252 3460 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr PID 3460 wrote to memory of 3252 3460 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr PID 3460 wrote to memory of 3252 3460 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr PID 3460 wrote to memory of 3252 3460 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr PID 3460 wrote to memory of 3252 3460 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr PID 3460 wrote to memory of 3252 3460 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr PID 3252 wrote to memory of 2636 3252 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr PID 3252 wrote to memory of 2636 3252 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr PID 3252 wrote to memory of 2636 3252 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr PID 3252 wrote to memory of 2636 3252 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr PID 3252 wrote to memory of 5072 3252 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr PID 3252 wrote to memory of 5072 3252 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr PID 3252 wrote to memory of 5072 3252 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr PID 3252 wrote to memory of 5072 3252 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr PID 3252 wrote to memory of 1836 3252 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr PID 3252 wrote to memory of 1836 3252 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr PID 3252 wrote to memory of 1836 3252 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr 5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr
Processes
-
C:\Users\Admin\AppData\Local\Temp\5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr"C:\Users\Admin\AppData\Local\Temp\5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr" /S1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr"C:\Users\Admin\AppData\Local\Temp\5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr"C:\Users\Admin\AppData\Local\Temp\5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr" /stext "C:\Users\Admin\AppData\Local\Temp\yjrcedfvpypvwdshkxjmnehcehuiptdyn"3⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr"C:\Users\Admin\AppData\Local\Temp\5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr" /stext "C:\Users\Admin\AppData\Local\Temp\idwve"3⤵
- Accesses Microsoft Outlook accounts
-
C:\Users\Admin\AppData\Local\Temp\5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr"C:\Users\Admin\AppData\Local\Temp\5-22 - Re-Schedule Notice for (HTW) EVER FRANK 1346-018E (TWTPE) - SO#C348.scr" /stext "C:\Users\Admin\AppData\Local\Temp\lxcnfojq"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\yjrcedfvpypvwdshkxjmnehcehuiptdynFilesize
4KB
MD52f9f3e06c08fbefb9d972eb45910783e
SHA1f8452829b8404981ee3f7ac2f8f4b16825014c14
SHA25641fcf3117cab8796adc9854cf66a6533fc2766f0e36abdaf04ce5fd7c13f5a50
SHA512db33ff568a991b3b7d6574e0b4514236f22d3df30c26593a18d7f2d879be2f6831e9d9361800ca349303ba9c43591643f04c090fb16dfc99f7301e197ff48dec
-
memory/1836-40-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/1836-44-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/1836-41-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/1836-33-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/2636-46-0x0000000000400000-0x0000000000478000-memory.dmpFilesize
480KB
-
memory/2636-25-0x0000000000400000-0x0000000000478000-memory.dmpFilesize
480KB
-
memory/2636-37-0x0000000000400000-0x0000000000478000-memory.dmpFilesize
480KB
-
memory/2636-31-0x0000000000400000-0x0000000000478000-memory.dmpFilesize
480KB
-
memory/2636-28-0x0000000000400000-0x0000000000478000-memory.dmpFilesize
480KB
-
memory/3252-51-0x0000000010000000-0x0000000010019000-memory.dmpFilesize
100KB
-
memory/3252-57-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/3252-12-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/3252-14-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/3252-15-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/3252-17-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/3252-62-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/3252-61-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/3252-19-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/3252-20-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/3252-21-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/3252-22-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/3252-59-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/3252-60-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/3252-58-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/3252-24-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/3252-56-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/3252-55-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/3252-16-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/3252-11-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/3252-54-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/3252-53-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/3252-52-0x0000000010000000-0x0000000010019000-memory.dmpFilesize
100KB
-
memory/3252-48-0x0000000010000000-0x0000000010019000-memory.dmpFilesize
100KB
-
memory/3460-10-0x0000000008A00000-0x0000000008A9C000-memory.dmpFilesize
624KB
-
memory/3460-5-0x0000000074680000-0x0000000074E30000-memory.dmpFilesize
7.7MB
-
memory/3460-1-0x0000000000150000-0x000000000023E000-memory.dmpFilesize
952KB
-
memory/3460-18-0x0000000074680000-0x0000000074E30000-memory.dmpFilesize
7.7MB
-
memory/3460-3-0x0000000004BB0000-0x0000000004C42000-memory.dmpFilesize
584KB
-
memory/3460-6-0x0000000006280000-0x0000000006362000-memory.dmpFilesize
904KB
-
memory/3460-8-0x0000000004E10000-0x0000000004E20000-memory.dmpFilesize
64KB
-
memory/3460-0-0x000000007468E000-0x000000007468F000-memory.dmpFilesize
4KB
-
memory/3460-2-0x0000000005160000-0x0000000005704000-memory.dmpFilesize
5.6MB
-
memory/3460-7-0x0000000004DF0000-0x0000000004E0A000-memory.dmpFilesize
104KB
-
memory/3460-4-0x0000000004AE0000-0x0000000004AEA000-memory.dmpFilesize
40KB
-
memory/3460-9-0x0000000006360000-0x0000000006420000-memory.dmpFilesize
768KB
-
memory/5072-26-0x0000000000400000-0x0000000000462000-memory.dmpFilesize
392KB
-
memory/5072-30-0x0000000000400000-0x0000000000462000-memory.dmpFilesize
392KB
-
memory/5072-32-0x0000000000400000-0x0000000000462000-memory.dmpFilesize
392KB
-
memory/5072-38-0x0000000000400000-0x0000000000462000-memory.dmpFilesize
392KB