Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2024 10:01
Static task
static1
Behavioral task
behavioral1
Sample
P.O_Qouts_t87E90Y-E4R7G-PDF.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
P.O_Qouts_t87E90Y-E4R7G-PDF.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/BgImage.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/BgImage.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
General
-
Target
P.O_Qouts_t87E90Y-E4R7G-PDF.exe
-
Size
636KB
-
MD5
c1c571c4f8f69d3c8aa0ec091173bd5e
-
SHA1
a36ac174f8ee2ed2254f69a21799837af58071f2
-
SHA256
d7cf40360b1dd35e6a20b8639f0fe9cc918157de07ff248983db6f0ee1472dbb
-
SHA512
08b540ab5ebb986cc43add736aee38d11a5f0da5252384bb30c7ca7f7b464e63debab4cec5a3dd122e3280f26e57e5ac8adc171e237a681d0e95239bddc11a1d
-
SSDEEP
12288:5rRo7TKXllTfhmiKdHEHPSXbOp/NoJnYRlXO3iBM4ILaa+Brt:JC7TKXlFfsiMEHPSq8YfMiBMh+ht
Malware Config
Extracted
remcos
RemoteHost
45.95.169.18:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-HP1D61
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Detected Nirsoft tools 3 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral2/memory/4608-66-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral2/memory/3280-65-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral2/memory/1512-72-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/4608-66-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/3280-65-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Loads dropped DLL 1 IoCs
pid Process 852 P.O_Qouts_t87E90Y-E4R7G-PDF.exe -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts wab.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Startup key = "%Risikofriestes% -windowstyle minimized $Follikler=(Get-ItemProperty -Path 'HKCU:\\Reattach237\\').Kkkenredskab;%Risikofriestes% ($Follikler)" reg.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2220 wab.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4952 powershell.exe 2220 wab.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4952 set thread context of 2220 4952 powershell.exe 96 PID 2220 set thread context of 3280 2220 wab.exe 104 PID 2220 set thread context of 4608 2220 wab.exe 106 PID 2220 set thread context of 1512 2220 wab.exe 109 -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Detrainment90\strenuosity.pot P.O_Qouts_t87E90Y-E4R7G-PDF.exe -
pid Process 4952 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language P.O_Qouts_t87E90Y-E4R7G-PDF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wab.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4800 reg.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 4952 powershell.exe 4952 powershell.exe 4952 powershell.exe 4952 powershell.exe 4952 powershell.exe 4952 powershell.exe 4952 powershell.exe 4952 powershell.exe 4952 powershell.exe 3280 wab.exe 3280 wab.exe 1512 wab.exe 1512 wab.exe 3280 wab.exe 3280 wab.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 4952 powershell.exe 2220 wab.exe 2220 wab.exe 2220 wab.exe 2220 wab.exe 2220 wab.exe 2220 wab.exe 2220 wab.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4952 powershell.exe Token: SeDebugPrivilege 1512 wab.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2220 wab.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 852 wrote to memory of 4952 852 P.O_Qouts_t87E90Y-E4R7G-PDF.exe 84 PID 852 wrote to memory of 4952 852 P.O_Qouts_t87E90Y-E4R7G-PDF.exe 84 PID 852 wrote to memory of 4952 852 P.O_Qouts_t87E90Y-E4R7G-PDF.exe 84 PID 4952 wrote to memory of 2220 4952 powershell.exe 96 PID 4952 wrote to memory of 2220 4952 powershell.exe 96 PID 4952 wrote to memory of 2220 4952 powershell.exe 96 PID 4952 wrote to memory of 2220 4952 powershell.exe 96 PID 4952 wrote to memory of 2220 4952 powershell.exe 96 PID 2220 wrote to memory of 4792 2220 wab.exe 97 PID 2220 wrote to memory of 4792 2220 wab.exe 97 PID 2220 wrote to memory of 4792 2220 wab.exe 97 PID 4792 wrote to memory of 4800 4792 cmd.exe 99 PID 4792 wrote to memory of 4800 4792 cmd.exe 99 PID 4792 wrote to memory of 4800 4792 cmd.exe 99 PID 2220 wrote to memory of 4436 2220 wab.exe 103 PID 2220 wrote to memory of 4436 2220 wab.exe 103 PID 2220 wrote to memory of 4436 2220 wab.exe 103 PID 2220 wrote to memory of 3280 2220 wab.exe 104 PID 2220 wrote to memory of 3280 2220 wab.exe 104 PID 2220 wrote to memory of 3280 2220 wab.exe 104 PID 2220 wrote to memory of 3280 2220 wab.exe 104 PID 2220 wrote to memory of 2900 2220 wab.exe 105 PID 2220 wrote to memory of 2900 2220 wab.exe 105 PID 2220 wrote to memory of 2900 2220 wab.exe 105 PID 2220 wrote to memory of 4608 2220 wab.exe 106 PID 2220 wrote to memory of 4608 2220 wab.exe 106 PID 2220 wrote to memory of 4608 2220 wab.exe 106 PID 2220 wrote to memory of 4608 2220 wab.exe 106 PID 2220 wrote to memory of 3448 2220 wab.exe 107 PID 2220 wrote to memory of 3448 2220 wab.exe 107 PID 2220 wrote to memory of 3448 2220 wab.exe 107 PID 2220 wrote to memory of 4196 2220 wab.exe 108 PID 2220 wrote to memory of 4196 2220 wab.exe 108 PID 2220 wrote to memory of 4196 2220 wab.exe 108 PID 2220 wrote to memory of 1512 2220 wab.exe 109 PID 2220 wrote to memory of 1512 2220 wab.exe 109 PID 2220 wrote to memory of 1512 2220 wab.exe 109 PID 2220 wrote to memory of 1512 2220 wab.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\P.O_Qouts_t87E90Y-E4R7G-PDF.exe"C:\Users\Admin\AppData\Local\Temp\P.O_Qouts_t87E90Y-E4R7G-PDF.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle minimized " $Fretum=Get-Content 'C:\Users\Admin\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Ravelproof29\Wabeno.phy';$Llebrdsbarmhjertighedens42=$Fretum.SubString(56238,3);.$Llebrdsbarmhjertighedens42($Fretum)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"3⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Risikofriestes% -windowstyle minimized $Follikler=(Get-ItemProperty -Path 'HKCU:\Reattach237\').Kkkenredskab;%Risikofriestes% ($Follikler)"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Risikofriestes% -windowstyle minimized $Follikler=(Get-ItemProperty -Path 'HKCU:\Reattach237\').Kkkenredskab;%Risikofriestes% ($Follikler)"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4800
-
-
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\cfqqcfkbvdjwmwoibggbmeaicrwfcqzja"4⤵PID:4436
-
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\cfqqcfkbvdjwmwoibggbmeaicrwfcqzja"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3280
-
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\nadad"4⤵PID:2900
-
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\nadad"4⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:4608
-
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\xuiteifw"4⤵PID:3448
-
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\xuiteifw"4⤵PID:4196
-
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\xuiteifw"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1512
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD55ad111ec2df070179346e4f43419bfb7
SHA15c6bad3bc3b4bd20374c44292300a83d3b372e4a
SHA2565285092faff2182ff5fb33e95423603145b780834691190b1b9f45b10dab420c
SHA5125c3697eef17e7de611ee403f943ad6c788b82cc9dd79c480817a8cfe712447076333c519f9e9170a971dc24f962ca4b3a354f71926083461e28dbbbba37498c9
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4KB
MD5c0ab2847671ed5375328c5127a02cc72
SHA1dc2bcb51562fb17e5c8787833bc0181d88a5b75e
SHA256e961f466a0638bc99182d0056245e2d8bf1ccc13a189b802aada981f379e2384
SHA5120b8b634d21ac71e02cef86687bf84b6fcecfd24dafab8130f42ce8b4b3f308a2e1b1fa7bf8d37f2eda76efae2b30b8d39f41d808d771562d8545ed144241924f
-
Filesize
9KB
MD5eb2c74e05b30b29887b3219f4ea3fdab
SHA191173d46b34e7bae57acabdbd239111b5bcc4d9e
SHA256d253ca5aba34b925796777893f114cc741b015af7868022ab1db2341288c55ed
SHA5121bb035260223ec585170f891c2624b9ae98671f225e74b913b40bb77b66e3b9c2016037bc8e4b0ae16367d82590a60a0a3bd95d05139ea2454f02020d1b54dae
-
Filesize
364KB
MD54f7bc22100b0ce9f5392bb0b43ab22c9
SHA1322f410d7c94a5f400656e1c49b5d4cef6dde8f2
SHA25667e85d9212594f2e8be65a3a6a3c8625ca5efe8070050c390e918bcd1da16f3a
SHA512dfc1ba12d84c489d6f6417c1c2f775ba107076b48f2f57b0a565070a88f91334187734463f895b17de46acb620347a1fc36c1deef55969942cf4663de48a347b
-
Filesize
54KB
MD54bb55c98fcfab7c0706cf43af638c89e
SHA158f5ec920e25fa95c47a826e34736d1159232efd
SHA256fafe02f6852b01802bbfe61fe7bb3de41e3d32dfd7b7054e8da7774cecbb3d8d
SHA512591fb17f2d78e25ef91eeb48d8fee5d09de00e553fa0710c28c84f3f1bc657cc8b4d2a4f6e982e4409d8e3450f60d13e6dbce473d33b3fab3d0eed3b489e5e27