Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2024 05:44
Static task
static1
Behavioral task
behavioral1
Sample
Document SWIFT Payment Copy Ref#8374837293.exe
Resource
win7-20240708-en
General
-
Target
Document SWIFT Payment Copy Ref#8374837293.exe
-
Size
1.3MB
-
MD5
e3504f07ea46e8c5ce1321b44e752556
-
SHA1
e5c612e6de7696296a13a5c59ee1712084559919
-
SHA256
dfc8e10de69f490f19664c753862ed95466195dfc45dae4f8b43a11565b2cc8e
-
SHA512
5aeb6baa9d02cdcfed6a02301bce02460b4b68c06ef3e9038bb4b1ba01ce3ad4884a5271653352527c625801519cfcfffdd9c1d03e005dbe3c21d3b460c4db5d
-
SSDEEP
24576:qAHnh+eWsN3skA4RV1Hom2KXMmHaYMCcRJjERtK/cfrWIlcf6NyEi5:9h+ZkldoPK8YaYrc/jYK/cf6YcCM
Malware Config
Extracted
remcos
dorobumajor
84.38.132.40:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
testhostex.exe
-
copy_folder
dorbion
-
delete_file
true
-
hide_file
true
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-WBALP5
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 3512 set thread context of 2028 3512 Document SWIFT Payment Copy Ref#8374837293.exe 89 PID 2028 set thread context of 5116 2028 svchost.exe 92 PID 2028 set thread context of 2676 2028 svchost.exe 96 PID 2028 set thread context of 3240 2028 svchost.exe 99 PID 2028 set thread context of 4472 2028 svchost.exe 101 PID 2028 set thread context of 3336 2028 svchost.exe 102 PID 2028 set thread context of 3876 2028 svchost.exe 105 PID 2028 set thread context of 3728 2028 svchost.exe 106 PID 2028 set thread context of 3280 2028 svchost.exe 107 PID 2028 set thread context of 1460 2028 svchost.exe 108 PID 2028 set thread context of 884 2028 svchost.exe 109 PID 2028 set thread context of 4484 2028 svchost.exe 110 PID 2028 set thread context of 2036 2028 svchost.exe 111 PID 2028 set thread context of 1976 2028 svchost.exe 112 PID 2028 set thread context of 4676 2028 svchost.exe 113 PID 2028 set thread context of 2716 2028 svchost.exe 114 PID 2028 set thread context of 2496 2028 svchost.exe 116 PID 2028 set thread context of 3028 2028 svchost.exe 117 PID 2028 set thread context of 1636 2028 svchost.exe 121 PID 2028 set thread context of 4148 2028 svchost.exe 122 PID 2028 set thread context of 1564 2028 svchost.exe 123 PID 2028 set thread context of 5112 2028 svchost.exe 128 PID 2028 set thread context of 3116 2028 svchost.exe 130 PID 2028 set thread context of 4296 2028 svchost.exe 131 PID 2028 set thread context of 1872 2028 svchost.exe 132 PID 2028 set thread context of 3180 2028 svchost.exe 133 PID 2028 set thread context of 4444 2028 svchost.exe 134 PID 2028 set thread context of 3132 2028 svchost.exe 135 PID 2028 set thread context of 1820 2028 svchost.exe 136 PID 2028 set thread context of 5020 2028 svchost.exe 137 PID 2028 set thread context of 1936 2028 svchost.exe 138 PID 2028 set thread context of 3032 2028 svchost.exe 139 PID 2028 set thread context of 4548 2028 svchost.exe 140 PID 2028 set thread context of 552 2028 svchost.exe 141 PID 2028 set thread context of 2092 2028 svchost.exe 142 PID 2028 set thread context of 2416 2028 svchost.exe 143 PID 2028 set thread context of 3444 2028 svchost.exe 144 PID 2028 set thread context of 4024 2028 svchost.exe 146 PID 2028 set thread context of 1572 2028 svchost.exe 147 PID 2028 set thread context of 1452 2028 svchost.exe 148 PID 2028 set thread context of 1000 2028 svchost.exe 149 PID 2028 set thread context of 4896 2028 svchost.exe 150 PID 2028 set thread context of 888 2028 svchost.exe 151 PID 2028 set thread context of 4688 2028 svchost.exe 152 PID 2028 set thread context of 4876 2028 svchost.exe 153 PID 2028 set thread context of 3688 2028 svchost.exe 154 PID 2028 set thread context of 2560 2028 svchost.exe 155 PID 2028 set thread context of 956 2028 svchost.exe 156 PID 2028 set thread context of 1368 2028 svchost.exe 157 PID 2028 set thread context of 1984 2028 svchost.exe 158 PID 2028 set thread context of 4500 2028 svchost.exe 159 PID 2028 set thread context of 3264 2028 svchost.exe 160 PID 2028 set thread context of 4964 2028 svchost.exe 161 PID 2028 set thread context of 2444 2028 svchost.exe 162 PID 2028 set thread context of 2088 2028 svchost.exe 163 PID 2028 set thread context of 2132 2028 svchost.exe 164 PID 2028 set thread context of 2580 2028 svchost.exe 165 PID 2028 set thread context of 2228 2028 svchost.exe 166 PID 2028 set thread context of 384 2028 svchost.exe 167 PID 2028 set thread context of 4312 2028 svchost.exe 168 PID 2028 set thread context of 3188 2028 svchost.exe 169 PID 2028 set thread context of 3084 2028 svchost.exe 170 PID 2028 set thread context of 1568 2028 svchost.exe 171 PID 2028 set thread context of 992 2028 svchost.exe 172 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Document SWIFT Payment Copy Ref#8374837293.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2580 reg.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 3512 Document SWIFT Payment Copy Ref#8374837293.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe 2028 svchost.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3512 Document SWIFT Payment Copy Ref#8374837293.exe 3512 Document SWIFT Payment Copy Ref#8374837293.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3512 Document SWIFT Payment Copy Ref#8374837293.exe 3512 Document SWIFT Payment Copy Ref#8374837293.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3512 wrote to memory of 2028 3512 Document SWIFT Payment Copy Ref#8374837293.exe 89 PID 3512 wrote to memory of 2028 3512 Document SWIFT Payment Copy Ref#8374837293.exe 89 PID 3512 wrote to memory of 2028 3512 Document SWIFT Payment Copy Ref#8374837293.exe 89 PID 3512 wrote to memory of 2028 3512 Document SWIFT Payment Copy Ref#8374837293.exe 89 PID 2028 wrote to memory of 2912 2028 svchost.exe 90 PID 2028 wrote to memory of 2912 2028 svchost.exe 90 PID 2028 wrote to memory of 2912 2028 svchost.exe 90 PID 2028 wrote to memory of 5116 2028 svchost.exe 92 PID 2028 wrote to memory of 5116 2028 svchost.exe 92 PID 2028 wrote to memory of 5116 2028 svchost.exe 92 PID 2028 wrote to memory of 5116 2028 svchost.exe 92 PID 2912 wrote to memory of 2580 2912 cmd.exe 93 PID 2912 wrote to memory of 2580 2912 cmd.exe 93 PID 2912 wrote to memory of 2580 2912 cmd.exe 93 PID 2028 wrote to memory of 2676 2028 svchost.exe 96 PID 2028 wrote to memory of 2676 2028 svchost.exe 96 PID 2028 wrote to memory of 2676 2028 svchost.exe 96 PID 2028 wrote to memory of 2676 2028 svchost.exe 96 PID 2028 wrote to memory of 3240 2028 svchost.exe 99 PID 2028 wrote to memory of 3240 2028 svchost.exe 99 PID 2028 wrote to memory of 3240 2028 svchost.exe 99 PID 2028 wrote to memory of 3240 2028 svchost.exe 99 PID 2028 wrote to memory of 4472 2028 svchost.exe 101 PID 2028 wrote to memory of 4472 2028 svchost.exe 101 PID 2028 wrote to memory of 4472 2028 svchost.exe 101 PID 2028 wrote to memory of 4472 2028 svchost.exe 101 PID 2028 wrote to memory of 3336 2028 svchost.exe 102 PID 2028 wrote to memory of 3336 2028 svchost.exe 102 PID 2028 wrote to memory of 3336 2028 svchost.exe 102 PID 2028 wrote to memory of 3336 2028 svchost.exe 102 PID 2028 wrote to memory of 3876 2028 svchost.exe 105 PID 2028 wrote to memory of 3876 2028 svchost.exe 105 PID 2028 wrote to memory of 3876 2028 svchost.exe 105 PID 2028 wrote to memory of 3876 2028 svchost.exe 105 PID 2028 wrote to memory of 3728 2028 svchost.exe 106 PID 2028 wrote to memory of 3728 2028 svchost.exe 106 PID 2028 wrote to memory of 3728 2028 svchost.exe 106 PID 2028 wrote to memory of 3728 2028 svchost.exe 106 PID 2028 wrote to memory of 3280 2028 svchost.exe 107 PID 2028 wrote to memory of 3280 2028 svchost.exe 107 PID 2028 wrote to memory of 3280 2028 svchost.exe 107 PID 2028 wrote to memory of 3280 2028 svchost.exe 107 PID 2028 wrote to memory of 1460 2028 svchost.exe 108 PID 2028 wrote to memory of 1460 2028 svchost.exe 108 PID 2028 wrote to memory of 1460 2028 svchost.exe 108 PID 2028 wrote to memory of 1460 2028 svchost.exe 108 PID 2028 wrote to memory of 884 2028 svchost.exe 109 PID 2028 wrote to memory of 884 2028 svchost.exe 109 PID 2028 wrote to memory of 884 2028 svchost.exe 109 PID 2028 wrote to memory of 884 2028 svchost.exe 109 PID 2028 wrote to memory of 4484 2028 svchost.exe 110 PID 2028 wrote to memory of 4484 2028 svchost.exe 110 PID 2028 wrote to memory of 4484 2028 svchost.exe 110 PID 2028 wrote to memory of 4484 2028 svchost.exe 110 PID 2028 wrote to memory of 2036 2028 svchost.exe 111 PID 2028 wrote to memory of 2036 2028 svchost.exe 111 PID 2028 wrote to memory of 2036 2028 svchost.exe 111 PID 2028 wrote to memory of 2036 2028 svchost.exe 111 PID 2028 wrote to memory of 1976 2028 svchost.exe 112 PID 2028 wrote to memory of 1976 2028 svchost.exe 112 PID 2028 wrote to memory of 1976 2028 svchost.exe 112 PID 2028 wrote to memory of 1976 2028 svchost.exe 112 PID 2028 wrote to memory of 4676 2028 svchost.exe 113 PID 2028 wrote to memory of 4676 2028 svchost.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\Document SWIFT Payment Copy Ref#8374837293.exe"C:\Users\Admin\AppData\Local\Temp\Document SWIFT Payment Copy Ref#8374837293.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Document SWIFT Payment Copy Ref#8374837293.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2580
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:5116
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2676
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:3240
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:4472
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:3336
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:3876
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:3728
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:3280
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1460
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:884
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:4484
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2036
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1976
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:4676
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2716
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2496
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:3028
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1636
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:4148
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1564
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:5112
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:3116
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:4296
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1872
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:3180
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:4444
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:3132
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1820
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:5020
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1936
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:3032
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:4548
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:552
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2092
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2416
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:3444
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:4024
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1572
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1452
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1000
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:4896
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:888
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:4688
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:4876
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:3688
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2560
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:956
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1368
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1984
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:4500
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:3264
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:4964
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2444
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2088
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2132
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2580
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2228
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:384
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:4312
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:3188
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:3084
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1568
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:992
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1048
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:4844
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:4420
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:3884
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:5056
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:772
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:440
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:4488
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:4032
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2068
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:3460
-
-