Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2024 06:15
Static task
static1
Behavioral task
behavioral1
Sample
Order8938.exe
Resource
win7-20240708-en
General
-
Target
Order8938.exe
-
Size
1.1MB
-
MD5
d3fff3f1d4f8d5b93f8ee6ef9de88b81
-
SHA1
cebcaf2839acba54a8d37fa6b85ccdd82d6b85b1
-
SHA256
f1e379ba6ef730a30192c591a00410fc174136c7eb71fed2596586b14f29551c
-
SHA512
00b9d1aa659929827f6e27e1d02d1409edb1f337bbb8a6972163d5be9df42d5e1b45d1e6b9912e836ad77ca0a8269970e317e6c6abb756eec1d693f43cd79aa6
-
SSDEEP
24576:fv5f66t1rUT6fdMjWo+Dq2MyXKr5B5l3no53lQ9ZynYQHtd19X:H5xy4Gjr+Dqz5do5C9Zy3d11
Malware Config
Extracted
remcos
AUG - 21
sungito2.ddns.net:5055
154.216.19.222:7088
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-9KM8RM
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2564 powershell.exe 4484 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Order8938.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 220 set thread context of 2384 220 Order8938.exe 110 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Order8938.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Order8938.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1932 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2564 powershell.exe 2564 powershell.exe 220 Order8938.exe 220 Order8938.exe 4484 powershell.exe 4484 powershell.exe 220 Order8938.exe 220 Order8938.exe 4484 powershell.exe 2564 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2564 powershell.exe Token: SeDebugPrivilege 4484 powershell.exe Token: SeDebugPrivilege 220 Order8938.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2384 Order8938.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 220 wrote to memory of 2564 220 Order8938.exe 102 PID 220 wrote to memory of 2564 220 Order8938.exe 102 PID 220 wrote to memory of 2564 220 Order8938.exe 102 PID 220 wrote to memory of 4484 220 Order8938.exe 104 PID 220 wrote to memory of 4484 220 Order8938.exe 104 PID 220 wrote to memory of 4484 220 Order8938.exe 104 PID 220 wrote to memory of 1932 220 Order8938.exe 106 PID 220 wrote to memory of 1932 220 Order8938.exe 106 PID 220 wrote to memory of 1932 220 Order8938.exe 106 PID 220 wrote to memory of 5056 220 Order8938.exe 108 PID 220 wrote to memory of 5056 220 Order8938.exe 108 PID 220 wrote to memory of 5056 220 Order8938.exe 108 PID 220 wrote to memory of 4536 220 Order8938.exe 109 PID 220 wrote to memory of 4536 220 Order8938.exe 109 PID 220 wrote to memory of 4536 220 Order8938.exe 109 PID 220 wrote to memory of 2384 220 Order8938.exe 110 PID 220 wrote to memory of 2384 220 Order8938.exe 110 PID 220 wrote to memory of 2384 220 Order8938.exe 110 PID 220 wrote to memory of 2384 220 Order8938.exe 110 PID 220 wrote to memory of 2384 220 Order8938.exe 110 PID 220 wrote to memory of 2384 220 Order8938.exe 110 PID 220 wrote to memory of 2384 220 Order8938.exe 110 PID 220 wrote to memory of 2384 220 Order8938.exe 110 PID 220 wrote to memory of 2384 220 Order8938.exe 110 PID 220 wrote to memory of 2384 220 Order8938.exe 110 PID 220 wrote to memory of 2384 220 Order8938.exe 110 PID 220 wrote to memory of 2384 220 Order8938.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\Order8938.exe"C:\Users\Admin\AppData\Local\Temp\Order8938.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Order8938.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\TlLBve.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4484
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TlLBve" /XML "C:\Users\Admin\AppData\Local\Temp\tmp89DC.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1932
-
-
C:\Users\Admin\AppData\Local\Temp\Order8938.exe"C:\Users\Admin\AppData\Local\Temp\Order8938.exe"2⤵PID:5056
-
-
C:\Users\Admin\AppData\Local\Temp\Order8938.exe"C:\Users\Admin\AppData\Local\Temp\Order8938.exe"2⤵PID:4536
-
-
C:\Users\Admin\AppData\Local\Temp\Order8938.exe"C:\Users\Admin\AppData\Local\Temp\Order8938.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4088,i,1828333185976713750,7918646547767660928,262144 --variations-seed-version --mojo-platform-channel-handle=4384 /prefetch:81⤵PID:3856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD546fdc95a0812f2a3ab76f56a4682cfc7
SHA1b7449ffda9ba0de63f1ab510d78cffc35f882a60
SHA256dbc07a395bd737d1c0ab296dd8b7101946c6e6e0a46e93cbab6fe26e1409eb99
SHA51205d8d70d1cbb2ff429da3ee68d78e37c784a38de1496e0b0d55c044e5f70793f4f0fbe01f5e9871688f4d08f6e4b4eba0ccc578eb1a42cc96092010ab38045be
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5b7a12ce46d2a0eeda58101516736726c
SHA1edbd8db6a7c801e1ab316d18abe58788d0c9fdfb
SHA2565c9455d9e61a3c03c8121369a28e36fa1d46c119eaac61f5b0679d0f8a1105ff
SHA5120d53b369df2233111bad5b37dbc7559eab7da32db83bb69f79b8b1606d44affa305737b6f4c1aa7e0474b356ca0d325cfe51e68193b302961dc67c7034c3a4ec