Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-08-2024 10:20
Static task
static1
Behavioral task
behavioral1
Sample
02bd0ebaf5baff24369602f3057591e0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
02bd0ebaf5baff24369602f3057591e0N.exe
Resource
win10v2004-20240802-en
General
-
Target
02bd0ebaf5baff24369602f3057591e0N.exe
-
Size
1005KB
-
MD5
02bd0ebaf5baff24369602f3057591e0
-
SHA1
e7698ec849ae4a68f90d412b0deedd7af95cfacd
-
SHA256
e783db94296b76ad76fd327eb96fa7171aaf39265fe91e72a03a78babe1dd734
-
SHA512
3371187a1f14c9261bf7675a8d748eea42a629114079a930aacbce861d5d694ce8c79030ed1d6e6b9a50beae4bec4576b64b54973bade269f728f075380faee9
-
SSDEEP
24576:ZWC/qaSu5K+5ImKmirxp9bWJxbcQNB2A+nE2+qOQtEZvpNpifum:oiUuGpmc+lh2ASE2HgHNpi2m
Malware Config
Extracted
remcos
Aug 20C
method8888.ddns.net:6902
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-4ZC3PQ
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Detected Nirsoft tools 3 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral2/memory/1068-86-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral2/memory/1496-88-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/536-81-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/1068-86-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/536-81-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4792 powershell.exe 1428 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation 02bd0ebaf5baff24369602f3057591e0N.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts 02bd0ebaf5baff24369602f3057591e0N.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1060 set thread context of 3056 1060 02bd0ebaf5baff24369602f3057591e0N.exe 100 PID 3056 set thread context of 536 3056 02bd0ebaf5baff24369602f3057591e0N.exe 101 PID 3056 set thread context of 1068 3056 02bd0ebaf5baff24369602f3057591e0N.exe 102 PID 3056 set thread context of 1496 3056 02bd0ebaf5baff24369602f3057591e0N.exe 103 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02bd0ebaf5baff24369602f3057591e0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02bd0ebaf5baff24369602f3057591e0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02bd0ebaf5baff24369602f3057591e0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02bd0ebaf5baff24369602f3057591e0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02bd0ebaf5baff24369602f3057591e0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2912 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 4792 powershell.exe 1428 powershell.exe 1428 powershell.exe 4792 powershell.exe 1428 powershell.exe 536 02bd0ebaf5baff24369602f3057591e0N.exe 536 02bd0ebaf5baff24369602f3057591e0N.exe 1496 02bd0ebaf5baff24369602f3057591e0N.exe 1496 02bd0ebaf5baff24369602f3057591e0N.exe 536 02bd0ebaf5baff24369602f3057591e0N.exe 536 02bd0ebaf5baff24369602f3057591e0N.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 3056 02bd0ebaf5baff24369602f3057591e0N.exe 3056 02bd0ebaf5baff24369602f3057591e0N.exe 3056 02bd0ebaf5baff24369602f3057591e0N.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4792 powershell.exe Token: SeDebugPrivilege 1428 powershell.exe Token: SeDebugPrivilege 1496 02bd0ebaf5baff24369602f3057591e0N.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3056 02bd0ebaf5baff24369602f3057591e0N.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1060 wrote to memory of 4792 1060 02bd0ebaf5baff24369602f3057591e0N.exe 94 PID 1060 wrote to memory of 4792 1060 02bd0ebaf5baff24369602f3057591e0N.exe 94 PID 1060 wrote to memory of 4792 1060 02bd0ebaf5baff24369602f3057591e0N.exe 94 PID 1060 wrote to memory of 1428 1060 02bd0ebaf5baff24369602f3057591e0N.exe 96 PID 1060 wrote to memory of 1428 1060 02bd0ebaf5baff24369602f3057591e0N.exe 96 PID 1060 wrote to memory of 1428 1060 02bd0ebaf5baff24369602f3057591e0N.exe 96 PID 1060 wrote to memory of 2912 1060 02bd0ebaf5baff24369602f3057591e0N.exe 98 PID 1060 wrote to memory of 2912 1060 02bd0ebaf5baff24369602f3057591e0N.exe 98 PID 1060 wrote to memory of 2912 1060 02bd0ebaf5baff24369602f3057591e0N.exe 98 PID 1060 wrote to memory of 3056 1060 02bd0ebaf5baff24369602f3057591e0N.exe 100 PID 1060 wrote to memory of 3056 1060 02bd0ebaf5baff24369602f3057591e0N.exe 100 PID 1060 wrote to memory of 3056 1060 02bd0ebaf5baff24369602f3057591e0N.exe 100 PID 1060 wrote to memory of 3056 1060 02bd0ebaf5baff24369602f3057591e0N.exe 100 PID 1060 wrote to memory of 3056 1060 02bd0ebaf5baff24369602f3057591e0N.exe 100 PID 1060 wrote to memory of 3056 1060 02bd0ebaf5baff24369602f3057591e0N.exe 100 PID 1060 wrote to memory of 3056 1060 02bd0ebaf5baff24369602f3057591e0N.exe 100 PID 1060 wrote to memory of 3056 1060 02bd0ebaf5baff24369602f3057591e0N.exe 100 PID 1060 wrote to memory of 3056 1060 02bd0ebaf5baff24369602f3057591e0N.exe 100 PID 1060 wrote to memory of 3056 1060 02bd0ebaf5baff24369602f3057591e0N.exe 100 PID 1060 wrote to memory of 3056 1060 02bd0ebaf5baff24369602f3057591e0N.exe 100 PID 1060 wrote to memory of 3056 1060 02bd0ebaf5baff24369602f3057591e0N.exe 100 PID 3056 wrote to memory of 536 3056 02bd0ebaf5baff24369602f3057591e0N.exe 101 PID 3056 wrote to memory of 536 3056 02bd0ebaf5baff24369602f3057591e0N.exe 101 PID 3056 wrote to memory of 536 3056 02bd0ebaf5baff24369602f3057591e0N.exe 101 PID 3056 wrote to memory of 536 3056 02bd0ebaf5baff24369602f3057591e0N.exe 101 PID 3056 wrote to memory of 1068 3056 02bd0ebaf5baff24369602f3057591e0N.exe 102 PID 3056 wrote to memory of 1068 3056 02bd0ebaf5baff24369602f3057591e0N.exe 102 PID 3056 wrote to memory of 1068 3056 02bd0ebaf5baff24369602f3057591e0N.exe 102 PID 3056 wrote to memory of 1068 3056 02bd0ebaf5baff24369602f3057591e0N.exe 102 PID 3056 wrote to memory of 1496 3056 02bd0ebaf5baff24369602f3057591e0N.exe 103 PID 3056 wrote to memory of 1496 3056 02bd0ebaf5baff24369602f3057591e0N.exe 103 PID 3056 wrote to memory of 1496 3056 02bd0ebaf5baff24369602f3057591e0N.exe 103 PID 3056 wrote to memory of 1496 3056 02bd0ebaf5baff24369602f3057591e0N.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\02bd0ebaf5baff24369602f3057591e0N.exe"C:\Users\Admin\AppData\Local\Temp\02bd0ebaf5baff24369602f3057591e0N.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\02bd0ebaf5baff24369602f3057591e0N.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4792
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\IAVsylTuejD.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1428
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IAVsylTuejD" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE4A3.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2912
-
-
C:\Users\Admin\AppData\Local\Temp\02bd0ebaf5baff24369602f3057591e0N.exe"C:\Users\Admin\AppData\Local\Temp\02bd0ebaf5baff24369602f3057591e0N.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\02bd0ebaf5baff24369602f3057591e0N.exeC:\Users\Admin\AppData\Local\Temp\02bd0ebaf5baff24369602f3057591e0N.exe /stext "C:\Users\Admin\AppData\Local\Temp\sqraptxulikpccjuuvqgsqfu"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:536
-
-
C:\Users\Admin\AppData\Local\Temp\02bd0ebaf5baff24369602f3057591e0N.exeC:\Users\Admin\AppData\Local\Temp\02bd0ebaf5baff24369602f3057591e0N.exe /stext "C:\Users\Admin\AppData\Local\Temp\cswlplinhqccmqxylflidvaluwgd"3⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:1068
-
-
C:\Users\Admin\AppData\Local\Temp\02bd0ebaf5baff24369602f3057591e0N.exeC:\Users\Admin\AppData\Local\Temp\02bd0ebaf5baff24369602f3057591e0N.exe /stext "C:\Users\Admin\AppData\Local\Temp\nnceqespuyugoxtcviyboiuuvcpmxoo"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1496
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD57639c00c819ff1d7f66b079f13c03110
SHA1f7b40e0c5dd2dc5bcc937702ed2f4fea74d99504
SHA256e8bcb2f458d9f929970cca981a33cf8074aeef7f463c712e92d6fbc47d11bc63
SHA512e82489fbc2fe01490dabce8a7809d3cf6e8166112995e6879fd9293069d43424d7b716af1937c6fc88aaf3936e9fe4503df2e33b64d02d2540ff41c7dabb8abb
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD5dc9ad89778792a0154d693bfc1fecae5
SHA1d112b0d066702ac35bb627e7586b22a374c2a80b
SHA2565cb976dfec420c9bf829eaac0c6c9a9d553bdf791a09ac94be8c94db4cbde669
SHA51202cc5ae67b8c5f929e4ca4ac368629e7919f055957b81955d1d06a3ad7e272fdfc87d2a431f31797ea15df92e32b7f8aadf88acaadfe7ebe7a04b14b4c899317
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4KB
MD5ea01dd92b15d2f570f6b167dad2d1fd0
SHA17b89141d4c3eb2f29d096f28a9bfe66eb006224a
SHA2560515f49138d74283f9ac1042fd1a384f715b74c2b99193454dbb0cd585097727
SHA5120e7695aea30250a41829fa4abb681b8c3ed4c0955e18f1f9f3a5456bfb3a76f016f538e557bf29b99ab6ab48c846f9fa3c4bccd8cb5fe73099a81b5946029ec8
-
Filesize
1KB
MD55e6f778ad12b1eb6965713d97a9ba3ee
SHA1e2e0691f4c24ec0baa5d89e3c06327a00e94c1d0
SHA256fb959ef895096e9be7728cafd1020a5d9ddfb58d532864bde8ea22e7d4301283
SHA5129239411d5a065694ca003c4cacec2df6deeed9e80e3754964bdf93b9a5c5a079291375d970cdb1f44840bce396b79ba67f155debd940004c05d6d0239b9ad001