Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23-07-2024 13:14
Static task
static1
Behavioral task
behavioral1
Sample
MalwareBazaar.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
MalwareBazaar.exe
Resource
win10v2004-20240709-en
General
-
Target
MalwareBazaar.exe
-
Size
1.4MB
-
MD5
962b35661c04b5bff3e3504f9cd646a7
-
SHA1
1a1cd695804bd14e8e1ea64a21b2b81fe76baf6c
-
SHA256
af0b876a436452a6e998fc622493aaa4553bcc53864d66a6a6d5d476a85902eb
-
SHA512
a7b7fb2990abc7a73e0f5963c3ce72b1b18a37fb908ec069985bde616e7e8fcd75f288855ae33218e66b1483b7f2596bf4729e3cab9afb478fc37691488964ec
-
SSDEEP
24576:dngozf6mbIWaZWazVXOLJPqEXN9/uZteoFjqQOy:dnVD6mkWawkXmPqEXN9mZteuj5/
Malware Config
Extracted
remcos
NewRemoteHost
newnex.3utilities.com:8580
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-68D53E
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Extracted
nanocore
1.2.2.0
newsddawork.3utilities.com:1620
maxlogs.webhop.me:1620
1fa46b72-10f9-4da3-bc15-84dde165706d
-
activate_away_mode
true
-
backup_connection_host
maxlogs.webhop.me
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2024-02-17T03:41:10.727034736Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
1620
-
default_group
NewBin
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
1fa46b72-10f9-4da3-bc15-84dde165706d
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
newsddawork.3utilities.com
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Detected Nirsoft tools 3 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
Processes:
resource yara_rule behavioral1/memory/2488-152-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral1/memory/2476-157-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral1/memory/992-156-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral1/memory/2476-157-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule behavioral1/memory/2488-152-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE 2 IoCs
Processes:
a.exea.exepid process 1536 a.exe 1716 a.exe -
Loads dropped DLL 2 IoCs
Processes:
RegSvcs.exea.exepid process 2540 RegSvcs.exe 1536 a.exe -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
a.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\PCI Manager = "C:\\Program Files (x86)\\PCI Manager\\pcimgr.exe" a.exe -
Processes:
a.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA a.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
MalwareBazaar.exeRegSvcs.exea.exedescription pid process target process PID 1476 set thread context of 2540 1476 MalwareBazaar.exe RegSvcs.exe PID 2540 set thread context of 2488 2540 RegSvcs.exe RegSvcs.exe PID 2540 set thread context of 2476 2540 RegSvcs.exe RegSvcs.exe PID 2540 set thread context of 992 2540 RegSvcs.exe RegSvcs.exe PID 1536 set thread context of 1716 1536 a.exe a.exe -
Drops file in Program Files directory 2 IoCs
Processes:
a.exedescription ioc process File created C:\Program Files (x86)\PCI Manager\pcimgr.exe a.exe File opened for modification C:\Program Files (x86)\PCI Manager\pcimgr.exe a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
MalwareBazaar.exepowershell.exeRegSvcs.exea.exea.exepid process 1476 MalwareBazaar.exe 2728 powershell.exe 1476 MalwareBazaar.exe 2488 RegSvcs.exe 2488 RegSvcs.exe 1536 a.exe 1536 a.exe 1716 a.exe 1716 a.exe 1716 a.exe 1716 a.exe 1716 a.exe 1716 a.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
a.exepid process 1716 a.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
RegSvcs.exepid process 2540 RegSvcs.exe 2540 RegSvcs.exe 2540 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
MalwareBazaar.exepowershell.exeRegSvcs.exea.exea.exedescription pid process Token: SeDebugPrivilege 1476 MalwareBazaar.exe Token: SeDebugPrivilege 2728 powershell.exe Token: SeDebugPrivilege 992 RegSvcs.exe Token: SeDebugPrivilege 1536 a.exe Token: SeDebugPrivilege 1716 a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RegSvcs.exepid process 2540 RegSvcs.exe -
Suspicious use of WriteProcessMemory 61 IoCs
Processes:
MalwareBazaar.exeRegSvcs.exea.exedescription pid process target process PID 1476 wrote to memory of 2728 1476 MalwareBazaar.exe powershell.exe PID 1476 wrote to memory of 2728 1476 MalwareBazaar.exe powershell.exe PID 1476 wrote to memory of 2728 1476 MalwareBazaar.exe powershell.exe PID 1476 wrote to memory of 2728 1476 MalwareBazaar.exe powershell.exe PID 1476 wrote to memory of 2816 1476 MalwareBazaar.exe schtasks.exe PID 1476 wrote to memory of 2816 1476 MalwareBazaar.exe schtasks.exe PID 1476 wrote to memory of 2816 1476 MalwareBazaar.exe schtasks.exe PID 1476 wrote to memory of 2816 1476 MalwareBazaar.exe schtasks.exe PID 1476 wrote to memory of 2540 1476 MalwareBazaar.exe RegSvcs.exe PID 1476 wrote to memory of 2540 1476 MalwareBazaar.exe RegSvcs.exe PID 1476 wrote to memory of 2540 1476 MalwareBazaar.exe RegSvcs.exe PID 1476 wrote to memory of 2540 1476 MalwareBazaar.exe RegSvcs.exe PID 1476 wrote to memory of 2540 1476 MalwareBazaar.exe RegSvcs.exe PID 1476 wrote to memory of 2540 1476 MalwareBazaar.exe RegSvcs.exe PID 1476 wrote to memory of 2540 1476 MalwareBazaar.exe RegSvcs.exe PID 1476 wrote to memory of 2540 1476 MalwareBazaar.exe RegSvcs.exe PID 1476 wrote to memory of 2540 1476 MalwareBazaar.exe RegSvcs.exe PID 1476 wrote to memory of 2540 1476 MalwareBazaar.exe RegSvcs.exe PID 1476 wrote to memory of 2540 1476 MalwareBazaar.exe RegSvcs.exe PID 1476 wrote to memory of 2540 1476 MalwareBazaar.exe RegSvcs.exe PID 1476 wrote to memory of 2540 1476 MalwareBazaar.exe RegSvcs.exe PID 1476 wrote to memory of 2540 1476 MalwareBazaar.exe RegSvcs.exe PID 1476 wrote to memory of 2540 1476 MalwareBazaar.exe RegSvcs.exe PID 1476 wrote to memory of 2540 1476 MalwareBazaar.exe RegSvcs.exe PID 2540 wrote to memory of 2488 2540 RegSvcs.exe RegSvcs.exe PID 2540 wrote to memory of 2488 2540 RegSvcs.exe RegSvcs.exe PID 2540 wrote to memory of 2488 2540 RegSvcs.exe RegSvcs.exe PID 2540 wrote to memory of 2488 2540 RegSvcs.exe RegSvcs.exe PID 2540 wrote to memory of 2488 2540 RegSvcs.exe RegSvcs.exe PID 2540 wrote to memory of 2488 2540 RegSvcs.exe RegSvcs.exe PID 2540 wrote to memory of 2488 2540 RegSvcs.exe RegSvcs.exe PID 2540 wrote to memory of 2488 2540 RegSvcs.exe RegSvcs.exe PID 2540 wrote to memory of 2476 2540 RegSvcs.exe RegSvcs.exe PID 2540 wrote to memory of 2476 2540 RegSvcs.exe RegSvcs.exe PID 2540 wrote to memory of 2476 2540 RegSvcs.exe RegSvcs.exe PID 2540 wrote to memory of 2476 2540 RegSvcs.exe RegSvcs.exe PID 2540 wrote to memory of 2476 2540 RegSvcs.exe RegSvcs.exe PID 2540 wrote to memory of 2476 2540 RegSvcs.exe RegSvcs.exe PID 2540 wrote to memory of 2476 2540 RegSvcs.exe RegSvcs.exe PID 2540 wrote to memory of 2476 2540 RegSvcs.exe RegSvcs.exe PID 2540 wrote to memory of 992 2540 RegSvcs.exe RegSvcs.exe PID 2540 wrote to memory of 992 2540 RegSvcs.exe RegSvcs.exe PID 2540 wrote to memory of 992 2540 RegSvcs.exe RegSvcs.exe PID 2540 wrote to memory of 992 2540 RegSvcs.exe RegSvcs.exe PID 2540 wrote to memory of 992 2540 RegSvcs.exe RegSvcs.exe PID 2540 wrote to memory of 992 2540 RegSvcs.exe RegSvcs.exe PID 2540 wrote to memory of 992 2540 RegSvcs.exe RegSvcs.exe PID 2540 wrote to memory of 992 2540 RegSvcs.exe RegSvcs.exe PID 2540 wrote to memory of 1536 2540 RegSvcs.exe a.exe PID 2540 wrote to memory of 1536 2540 RegSvcs.exe a.exe PID 2540 wrote to memory of 1536 2540 RegSvcs.exe a.exe PID 2540 wrote to memory of 1536 2540 RegSvcs.exe a.exe PID 1536 wrote to memory of 1716 1536 a.exe a.exe PID 1536 wrote to memory of 1716 1536 a.exe a.exe PID 1536 wrote to memory of 1716 1536 a.exe a.exe PID 1536 wrote to memory of 1716 1536 a.exe a.exe PID 1536 wrote to memory of 1716 1536 a.exe a.exe PID 1536 wrote to memory of 1716 1536 a.exe a.exe PID 1536 wrote to memory of 1716 1536 a.exe a.exe PID 1536 wrote to memory of 1716 1536 a.exe a.exe PID 1536 wrote to memory of 1716 1536 a.exe a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\tPbnVzkURocjXA.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2728 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tPbnVzkURocjXA" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3237.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2816 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe /stext "C:\Users\Admin\AppData\Local\Temp\zoiitf"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2488 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe /stext "C:\Users\Admin\AppData\Local\Temp\jjnatxjwa"3⤵
- Accesses Microsoft Outlook accounts
PID:2476 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe /stext "C:\Users\Admin\AppData\Local\Temp\mlttmquqoafm"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:992 -
C:\Users\Admin\AppData\Local\Temp\a.exe"C:\Users\Admin\AppData\Local\Temp\a.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\a.exe"C:\Users\Admin\AppData\Local\Temp\a.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1716
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5159e3447e1b32c480d8bdc1142b62a34
SHA140b7cbae688b3bfa11ec40cff938e27be2444bc5
SHA25680136dae363d9c166e9e648d479e3f5cadc2ebf29274a17f02f00dcacfcc23a9
SHA51204adc24f24f1218124c02fa9a9dc6251012f30a8380607987edec5917e40cb582251d1344f5db5818436101fa7cb81d846b45a8c90a4b9c8ded4361283004b92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c05f27b76dd99769bfca2154a898eb83
SHA1836527d8a62e6b52b9e37a82c01da362b88e4735
SHA256d47f619b25cba5fe413a02b06988862e412a3a85fb24f9dc3c1f8ece0fa5c201
SHA5123ba7399aae5ac433f6852f92411710f33702758fc6edeed65b6f5e82449640441a72c92370857f00ffc4e02b3112c79f8b19de587087379ad67085405d2dc8ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5223d2c88b834c786b51c44b5cd7c1713
SHA116b086fbb374d32809918c98ec767e31e0b2289a
SHA256b33209ee0b8b3611afb7f7aa490f390f6afb1725c4e5e8f8cad299ac3c847b46
SHA512c28cee738eea476aa2438de904e18351bb85bb4f8cbb4271995c11cbf3a52b3eedd514753e538687f712c8f0128d269ebf6a0275492e560b82c593b17f97d571
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
623KB
MD57166bb20971fd3ea0214675b80d6dce2
SHA1c6bb92b860375a05a54465b9a2b53c4210d88042
SHA256b6fcf56c757a74ebf781c794d629965dc94bc256ebeb502c2a948681789d5044
SHA5120b3e8569c171f1f95e3c5ad724ee02cb81c8c0af3a384058de9578930fd56dcf00e92f76818501537d91aa8d905375a8f179224ce08b4917989622901a97eb64
-
Filesize
1KB
MD5da47c95f9ef5efb7f543a732e054d200
SHA144e66676ed521e9740a9a1807035c0241d0a83f0
SHA256b4f774f478ebfa7a75342b215c02cc816e085dd6e39563354457bc7a39444f6d
SHA51276866ff96f4c6718de6230f792d4dcb3c32e741aa1673b47d22e6e0c737f69ed3c60499c0327dcd28c917d22b26b79158257ddcaebf91a1af84da72045143da2
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84