Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23-07-2024 13:14
Static task
static1
Behavioral task
behavioral1
Sample
MalwareBazaar.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
MalwareBazaar.exe
Resource
win10v2004-20240709-en
General
-
Target
MalwareBazaar.exe
-
Size
1.4MB
-
MD5
962b35661c04b5bff3e3504f9cd646a7
-
SHA1
1a1cd695804bd14e8e1ea64a21b2b81fe76baf6c
-
SHA256
af0b876a436452a6e998fc622493aaa4553bcc53864d66a6a6d5d476a85902eb
-
SHA512
a7b7fb2990abc7a73e0f5963c3ce72b1b18a37fb908ec069985bde616e7e8fcd75f288855ae33218e66b1483b7f2596bf4729e3cab9afb478fc37691488964ec
-
SSDEEP
24576:dngozf6mbIWaZWazVXOLJPqEXN9/uZteoFjqQOy:dnVD6mkWawkXmPqEXN9mZteuj5/
Malware Config
Extracted
remcos
NewRemoteHost
newnex.3utilities.com:8580
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-68D53E
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Extracted
nanocore
1.2.2.0
newsddawork.3utilities.com:1620
maxlogs.webhop.me:1620
1fa46b72-10f9-4da3-bc15-84dde165706d
-
activate_away_mode
true
-
backup_connection_host
maxlogs.webhop.me
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2024-02-17T03:41:10.727034736Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
1620
-
default_group
NewBin
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
1fa46b72-10f9-4da3-bc15-84dde165706d
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
newsddawork.3utilities.com
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Detected Nirsoft tools 3 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
Processes:
resource yara_rule behavioral2/memory/3192-97-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral2/memory/3776-104-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/460-99-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral2/memory/460-99-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule behavioral2/memory/3192-97-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
MalwareBazaar.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Control Panel\International\Geo\Nation MalwareBazaar.exe -
Executes dropped EXE 3 IoCs
Processes:
a.exea.exea.exepid process 1368 a.exe 4580 a.exe 2236 a.exe -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
a.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WAN Subsystem = "C:\\Program Files (x86)\\WAN Subsystem\\wanss.exe" a.exe -
Processes:
a.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA a.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
MalwareBazaar.exeRegSvcs.exea.exedescription pid process target process PID 1328 set thread context of 4712 1328 MalwareBazaar.exe RegSvcs.exe PID 4712 set thread context of 3192 4712 RegSvcs.exe RegSvcs.exe PID 4712 set thread context of 460 4712 RegSvcs.exe RegSvcs.exe PID 4712 set thread context of 3776 4712 RegSvcs.exe RegSvcs.exe PID 1368 set thread context of 2236 1368 a.exe a.exe -
Drops file in Program Files directory 2 IoCs
Processes:
a.exedescription ioc process File created C:\Program Files (x86)\WAN Subsystem\wanss.exe a.exe File opened for modification C:\Program Files (x86)\WAN Subsystem\wanss.exe a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
MalwareBazaar.exepowershell.exeRegSvcs.exeRegSvcs.exea.exea.exepid process 1328 MalwareBazaar.exe 1328 MalwareBazaar.exe 3468 powershell.exe 3468 powershell.exe 3192 RegSvcs.exe 3192 RegSvcs.exe 3776 RegSvcs.exe 3776 RegSvcs.exe 3192 RegSvcs.exe 3192 RegSvcs.exe 1368 a.exe 1368 a.exe 1368 a.exe 1368 a.exe 2236 a.exe 2236 a.exe 2236 a.exe 2236 a.exe 2236 a.exe 2236 a.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
a.exepid process 2236 a.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
RegSvcs.exepid process 4712 RegSvcs.exe 4712 RegSvcs.exe 4712 RegSvcs.exe 4712 RegSvcs.exe 4712 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
MalwareBazaar.exepowershell.exeRegSvcs.exea.exea.exedescription pid process Token: SeDebugPrivilege 1328 MalwareBazaar.exe Token: SeDebugPrivilege 3468 powershell.exe Token: SeDebugPrivilege 3776 RegSvcs.exe Token: SeDebugPrivilege 1368 a.exe Token: SeDebugPrivilege 2236 a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RegSvcs.exepid process 4712 RegSvcs.exe -
Suspicious use of WriteProcessMemory 50 IoCs
Processes:
MalwareBazaar.exeRegSvcs.exea.exedescription pid process target process PID 1328 wrote to memory of 3468 1328 MalwareBazaar.exe powershell.exe PID 1328 wrote to memory of 3468 1328 MalwareBazaar.exe powershell.exe PID 1328 wrote to memory of 3468 1328 MalwareBazaar.exe powershell.exe PID 1328 wrote to memory of 1224 1328 MalwareBazaar.exe schtasks.exe PID 1328 wrote to memory of 1224 1328 MalwareBazaar.exe schtasks.exe PID 1328 wrote to memory of 1224 1328 MalwareBazaar.exe schtasks.exe PID 1328 wrote to memory of 4712 1328 MalwareBazaar.exe RegSvcs.exe PID 1328 wrote to memory of 4712 1328 MalwareBazaar.exe RegSvcs.exe PID 1328 wrote to memory of 4712 1328 MalwareBazaar.exe RegSvcs.exe PID 1328 wrote to memory of 4712 1328 MalwareBazaar.exe RegSvcs.exe PID 1328 wrote to memory of 4712 1328 MalwareBazaar.exe RegSvcs.exe PID 1328 wrote to memory of 4712 1328 MalwareBazaar.exe RegSvcs.exe PID 1328 wrote to memory of 4712 1328 MalwareBazaar.exe RegSvcs.exe PID 1328 wrote to memory of 4712 1328 MalwareBazaar.exe RegSvcs.exe PID 1328 wrote to memory of 4712 1328 MalwareBazaar.exe RegSvcs.exe PID 1328 wrote to memory of 4712 1328 MalwareBazaar.exe RegSvcs.exe PID 1328 wrote to memory of 4712 1328 MalwareBazaar.exe RegSvcs.exe PID 1328 wrote to memory of 4712 1328 MalwareBazaar.exe RegSvcs.exe PID 4712 wrote to memory of 3192 4712 RegSvcs.exe RegSvcs.exe PID 4712 wrote to memory of 3192 4712 RegSvcs.exe RegSvcs.exe PID 4712 wrote to memory of 3192 4712 RegSvcs.exe RegSvcs.exe PID 4712 wrote to memory of 3192 4712 RegSvcs.exe RegSvcs.exe PID 4712 wrote to memory of 4524 4712 RegSvcs.exe RegSvcs.exe PID 4712 wrote to memory of 4524 4712 RegSvcs.exe RegSvcs.exe PID 4712 wrote to memory of 4524 4712 RegSvcs.exe RegSvcs.exe PID 4712 wrote to memory of 4664 4712 RegSvcs.exe RegSvcs.exe PID 4712 wrote to memory of 4664 4712 RegSvcs.exe RegSvcs.exe PID 4712 wrote to memory of 4664 4712 RegSvcs.exe RegSvcs.exe PID 4712 wrote to memory of 460 4712 RegSvcs.exe RegSvcs.exe PID 4712 wrote to memory of 460 4712 RegSvcs.exe RegSvcs.exe PID 4712 wrote to memory of 460 4712 RegSvcs.exe RegSvcs.exe PID 4712 wrote to memory of 460 4712 RegSvcs.exe RegSvcs.exe PID 4712 wrote to memory of 3776 4712 RegSvcs.exe RegSvcs.exe PID 4712 wrote to memory of 3776 4712 RegSvcs.exe RegSvcs.exe PID 4712 wrote to memory of 3776 4712 RegSvcs.exe RegSvcs.exe PID 4712 wrote to memory of 3776 4712 RegSvcs.exe RegSvcs.exe PID 4712 wrote to memory of 1368 4712 RegSvcs.exe a.exe PID 4712 wrote to memory of 1368 4712 RegSvcs.exe a.exe PID 4712 wrote to memory of 1368 4712 RegSvcs.exe a.exe PID 1368 wrote to memory of 4580 1368 a.exe a.exe PID 1368 wrote to memory of 4580 1368 a.exe a.exe PID 1368 wrote to memory of 4580 1368 a.exe a.exe PID 1368 wrote to memory of 2236 1368 a.exe a.exe PID 1368 wrote to memory of 2236 1368 a.exe a.exe PID 1368 wrote to memory of 2236 1368 a.exe a.exe PID 1368 wrote to memory of 2236 1368 a.exe a.exe PID 1368 wrote to memory of 2236 1368 a.exe a.exe PID 1368 wrote to memory of 2236 1368 a.exe a.exe PID 1368 wrote to memory of 2236 1368 a.exe a.exe PID 1368 wrote to memory of 2236 1368 a.exe a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\tPbnVzkURocjXA.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3468 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tPbnVzkURocjXA" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE30D.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
PID:1224 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe /stext "C:\Users\Admin\AppData\Local\Temp\sfeylq"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3192 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe /stext "C:\Users\Admin\AppData\Local\Temp\vhjrmiwqm"3⤵PID:4524
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe /stext "C:\Users\Admin\AppData\Local\Temp\vhjrmiwqm"3⤵PID:4664
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe /stext "C:\Users\Admin\AppData\Local\Temp\vhjrmiwqm"3⤵
- Accesses Microsoft Outlook accounts
PID:460 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe /stext "C:\Users\Admin\AppData\Local\Temp\fcxbnsgraogci"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3776 -
C:\Users\Admin\AppData\Local\Temp\a.exe"C:\Users\Admin\AppData\Local\Temp\a.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\a.exe"C:\Users\Admin\AppData\Local\Temp\a.exe"4⤵
- Executes dropped EXE
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\a.exe"C:\Users\Admin\AppData\Local\Temp\a.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2236
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5008f21a284fabbccd2f29b416cb0619c
SHA1f55d60cb5b33549205fb76ba89d118e27705fbc3
SHA256668b062d0d953b4e48cac50e02a480bb6c5a7a3a72a51b6f7085ad1d3f14427c
SHA51202493a8dabc5768287feb95de53fb2c65b6c236c8b85e36adc2dfa85391a74a4f2d91bc57daa2737254ffad042af5ac378f23d0e8331cab8e5b5cf6d5db1ee6b
-
Filesize
1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
623KB
MD57166bb20971fd3ea0214675b80d6dce2
SHA1c6bb92b860375a05a54465b9a2b53c4210d88042
SHA256b6fcf56c757a74ebf781c794d629965dc94bc256ebeb502c2a948681789d5044
SHA5120b3e8569c171f1f95e3c5ad724ee02cb81c8c0af3a384058de9578930fd56dcf00e92f76818501537d91aa8d905375a8f179224ce08b4917989622901a97eb64
-
Filesize
4KB
MD560e30555becdb968406edb87fff512ef
SHA165551417f6371c40e6d5dab38fe87ab634f9446e
SHA2569e347aa1a363532c72d7728abe1afdc48b9418fae8cbf8bcbc50c9c22dfefa57
SHA512cbe1aebf171b54f481028208aa85fb04145cc40772cc30e67107caa5cc70c73f274da362766f125093c1fab1416c687744e53e0f7c30b6ead866c6f6ba671449
-
Filesize
1KB
MD5e4d9eab23d0f74f92db70b0490a03f88
SHA1bd1a82b936a6759ac69d6cf5a6b09b3100c59226
SHA256205390d09aa84de905b230d0d9e522909b3d7ebb58fbb93bd51b868cfc3d7dc0
SHA512d5f6daf0d742a4d463a9ed61320d4fed29d34be3170917d74e4040450beb6e17e48c75e8f80e662ea5cf88ee812bbeea47a7431e14348f6ae2d4133ac422c6cd