Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 14:43
Behavioral task
behavioral1
Sample
120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe
Resource
win10v2004-20240426-en
General
-
Target
120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe
-
Size
483KB
-
MD5
e180ec9e3d182fbd5043af6eb02763a4
-
SHA1
d00ec158f971c7e78df7fc32f8c6371c6dcf8fe7
-
SHA256
120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db
-
SHA512
e241b1bb200b0b375772f2b4151a86ba12054ec9a8e8548cff89f1233bc48384d1a630eee407b13efd6fcaf672866529a7203662da940c3d3b1fd21d157f500c
-
SSDEEP
6144:mXIktXfM8Lv86r9uVWAa2je4Z5zl4hgDHQQs4NTQjoHFsAOZZDAXYcNn5Gv:mX7tPMK8ctGe4Dzl4h2QnuPs/ZDicv
Malware Config
Extracted
remcos
RemoteHost
185.216.70.120:2427
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-FSXSJ2
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
NirSoft MailPassView 2 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral2/memory/2696-17-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView behavioral2/memory/2696-16-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 2 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule behavioral2/memory/2140-21-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView behavioral2/memory/2140-26-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Nirsoft 6 IoCs
Processes:
resource yara_rule behavioral2/memory/2696-17-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral2/memory/2696-16-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral2/memory/4032-14-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/4032-9-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/2140-21-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral2/memory/2140-26-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts 120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exedescription pid process target process PID 2604 set thread context of 2140 2604 120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe 120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe PID 2604 set thread context of 2696 2604 120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe 120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe PID 2604 set thread context of 4032 2604 120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe 120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exepid process 4032 120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe 4032 120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe 2140 120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe 2140 120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe 2140 120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe 2140 120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exepid process 2604 120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe 2604 120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe 2604 120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exedescription pid process Token: SeDebugPrivilege 4032 120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exedescription pid process target process PID 2604 wrote to memory of 2140 2604 120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe 120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe PID 2604 wrote to memory of 2140 2604 120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe 120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe PID 2604 wrote to memory of 2140 2604 120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe 120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe PID 2604 wrote to memory of 2696 2604 120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe 120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe PID 2604 wrote to memory of 2696 2604 120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe 120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe PID 2604 wrote to memory of 2696 2604 120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe 120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe PID 2604 wrote to memory of 4032 2604 120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe 120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe PID 2604 wrote to memory of 4032 2604 120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe 120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe PID 2604 wrote to memory of 4032 2604 120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe 120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe"C:\Users\Admin\AppData\Local\Temp\120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exeC:\Users\Admin\AppData\Local\Temp\120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe /stext "C:\Users\Admin\AppData\Local\Temp\mmgezgumndpqabfofvefecpghfte"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exeC:\Users\Admin\AppData\Local\Temp\120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe /stext "C:\Users\Admin\AppData\Local\Temp\pglwayegblhdchbaogqgphkpqmdnckvs"2⤵
- Accesses Microsoft Outlook accounts
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exeC:\Users\Admin\AppData\Local\Temp\120087f7bcd116f56bebecf72302b8280702e32a44bdb069778fd060acf304db.exe /stext "C:\Users\Admin\AppData\Local\Temp\zjqp"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\mmgezgumndpqabfofvefecpghfteFilesize
4KB
MD52f9f3e06c08fbefb9d972eb45910783e
SHA1f8452829b8404981ee3f7ac2f8f4b16825014c14
SHA25641fcf3117cab8796adc9854cf66a6533fc2766f0e36abdaf04ce5fd7c13f5a50
SHA512db33ff568a991b3b7d6574e0b4514236f22d3df30c26593a18d7f2d879be2f6831e9d9361800ca349303ba9c43591643f04c090fb16dfc99f7301e197ff48dec
-
memory/2140-20-0x0000000000400000-0x0000000000478000-memory.dmpFilesize
480KB
-
memory/2140-1-0x0000000000400000-0x0000000000478000-memory.dmpFilesize
480KB
-
memory/2140-26-0x0000000000400000-0x0000000000478000-memory.dmpFilesize
480KB
-
memory/2140-10-0x0000000000400000-0x0000000000478000-memory.dmpFilesize
480KB
-
memory/2140-21-0x0000000000400000-0x0000000000478000-memory.dmpFilesize
480KB
-
memory/2604-35-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/2604-34-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/2604-29-0x0000000010000000-0x0000000010019000-memory.dmpFilesize
100KB
-
memory/2604-32-0x0000000010000000-0x0000000010019000-memory.dmpFilesize
100KB
-
memory/2604-33-0x0000000010000000-0x0000000010019000-memory.dmpFilesize
100KB
-
memory/2696-16-0x0000000000400000-0x0000000000462000-memory.dmpFilesize
392KB
-
memory/2696-13-0x0000000000400000-0x0000000000462000-memory.dmpFilesize
392KB
-
memory/2696-15-0x0000000000400000-0x0000000000462000-memory.dmpFilesize
392KB
-
memory/2696-17-0x0000000000400000-0x0000000000462000-memory.dmpFilesize
392KB
-
memory/2696-3-0x0000000000400000-0x0000000000462000-memory.dmpFilesize
392KB
-
memory/4032-9-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/4032-14-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/4032-7-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/4032-4-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB