Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 18:00
Static task
static1
Behavioral task
behavioral1
Sample
MalwareBazaar.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
MalwareBazaar.exe
Resource
win10v2004-20240709-en
General
-
Target
MalwareBazaar.exe
-
Size
2.2MB
-
MD5
6c3b88c4675ff6cad62702925a3390f1
-
SHA1
d7c0fdc2b3b92df96b5bcd7a390aa7312df086a5
-
SHA256
a8e25a2520c09dd71e17afbde126f58514921c6d967a786bde096fafda08701a
-
SHA512
ee611d1b240a25a02d8ea9ecca3deb943da34dfcb03a38c2e5d8b40a2cea60d4d4446f968b4af6dc6c9f21bd951b3023e16939ebd1fe0a3fd0867f6a0d143e4a
-
SSDEEP
49152:qB1BRf3rOSzOzrFNj8e1KbWF8K7Vk3SZTH4OWOEkw/R8jDYWg16pb67Wy/Zz:aaRrFCI4v7p
Malware Config
Extracted
remcos
RemoteHost
103.198.26.25:96
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-IPUJM4
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Detected Nirsoft tools 5 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral2/memory/3732-37-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral2/memory/772-39-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral2/memory/3732-38-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral2/memory/4860-36-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/3732-44-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/772-39-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 3 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/3732-37-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView behavioral2/memory/3732-38-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView behavioral2/memory/3732-44-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4784 powershell.exe -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts installutil.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 552 set thread context of 2616 552 MalwareBazaar.exe 87 PID 2616 set thread context of 3732 2616 installutil.exe 94 PID 2616 set thread context of 772 2616 installutil.exe 96 PID 2616 set thread context of 4860 2616 installutil.exe 98 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language installutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language installutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language installutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language installutil.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4784 powershell.exe 4784 powershell.exe 3732 installutil.exe 4860 installutil.exe 3732 installutil.exe 4860 installutil.exe 3732 installutil.exe 3732 installutil.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2616 installutil.exe 2616 installutil.exe 2616 installutil.exe 2616 installutil.exe 2616 installutil.exe 2616 installutil.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4784 powershell.exe Token: SeDebugPrivilege 4860 installutil.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 552 wrote to memory of 4784 552 MalwareBazaar.exe 85 PID 552 wrote to memory of 4784 552 MalwareBazaar.exe 85 PID 552 wrote to memory of 2616 552 MalwareBazaar.exe 87 PID 552 wrote to memory of 2616 552 MalwareBazaar.exe 87 PID 552 wrote to memory of 2616 552 MalwareBazaar.exe 87 PID 552 wrote to memory of 2616 552 MalwareBazaar.exe 87 PID 552 wrote to memory of 2616 552 MalwareBazaar.exe 87 PID 552 wrote to memory of 2616 552 MalwareBazaar.exe 87 PID 552 wrote to memory of 2616 552 MalwareBazaar.exe 87 PID 552 wrote to memory of 2616 552 MalwareBazaar.exe 87 PID 552 wrote to memory of 2616 552 MalwareBazaar.exe 87 PID 552 wrote to memory of 2616 552 MalwareBazaar.exe 87 PID 552 wrote to memory of 2616 552 MalwareBazaar.exe 87 PID 552 wrote to memory of 2616 552 MalwareBazaar.exe 87 PID 2616 wrote to memory of 2544 2616 installutil.exe 93 PID 2616 wrote to memory of 2544 2616 installutil.exe 93 PID 2616 wrote to memory of 2544 2616 installutil.exe 93 PID 2616 wrote to memory of 3732 2616 installutil.exe 94 PID 2616 wrote to memory of 3732 2616 installutil.exe 94 PID 2616 wrote to memory of 3732 2616 installutil.exe 94 PID 2616 wrote to memory of 3732 2616 installutil.exe 94 PID 2616 wrote to memory of 2644 2616 installutil.exe 95 PID 2616 wrote to memory of 2644 2616 installutil.exe 95 PID 2616 wrote to memory of 2644 2616 installutil.exe 95 PID 2616 wrote to memory of 772 2616 installutil.exe 96 PID 2616 wrote to memory of 772 2616 installutil.exe 96 PID 2616 wrote to memory of 772 2616 installutil.exe 96 PID 2616 wrote to memory of 772 2616 installutil.exe 96 PID 2616 wrote to memory of 4244 2616 installutil.exe 97 PID 2616 wrote to memory of 4244 2616 installutil.exe 97 PID 2616 wrote to memory of 4244 2616 installutil.exe 97 PID 2616 wrote to memory of 4860 2616 installutil.exe 98 PID 2616 wrote to memory of 4860 2616 installutil.exe 98 PID 2616 wrote to memory of 4860 2616 installutil.exe 98 PID 2616 wrote to memory of 4860 2616 installutil.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath $env:UserProfile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4784
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe /stext "C:\Users\Admin\AppData\Local\Temp\uheqdmcarrjcxxvqmynseujzsnzpuwr"3⤵PID:2544
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe /stext "C:\Users\Admin\AppData\Local\Temp\uheqdmcarrjcxxvqmynseujzsnzpuwr"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3732
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe /stext "C:\Users\Admin\AppData\Local\Temp\ebkjwfnbfhbhhdjudjaupgeistrqvhphdr"3⤵PID:2644
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe /stext "C:\Users\Admin\AppData\Local\Temp\ebkjwfnbfhbhhdjudjaupgeistrqvhphdr"3⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:772
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe /stext "C:\Users\Admin\AppData\Local\Temp\odpbxx"3⤵PID:4244
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe /stext "C:\Users\Admin\AppData\Local\Temp\odpbxx"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4860
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4KB
MD55f9f645ff4e46b384ac7a261904aabcb
SHA1203a1216e576f93c2236a833b93c32c4fd8a0d3b
SHA256887d93e6cbd14afa0cdf26f303b89cc1963ca5c5d7faba6c91ae87be183273b3
SHA512b679e91072a1c3fa59e40ff6565c23549f33520c9c6bc8d1f4e055d65dddec3a8e93c165060668fbabae9f27de28985cc826b23f8402caa5d7bd4455165acbde