Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 16:31
Behavioral task
behavioral1
Sample
a.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a.exe
Resource
win10v2004-20240802-en
General
-
Target
a.exe
-
Size
453KB
-
MD5
02d693c186871b0aba2101233ee64173
-
SHA1
f5786f6346286e9e61f2c4cde7cf0dd877d103da
-
SHA256
ec8ecee61aeab54e0622706710e9cbe56cdda7d2b47c5d13ef343092c868120c
-
SHA512
aa2948a490ed50dbfc8568ee9c521ab52e136894cb5f012d0879640cda5af5de1c41579dbe463bfe15580c51b892155e39bf0bfa883f5fd79d37285b2abeb768
-
SSDEEP
12288:Emnk7iLJbpIpiRL6I2WhSKQ9ZsfZQSbn9:8iLJbpI7I2WhQqZ7b9
Malware Config
Extracted
remcos
New
173.212.217.108:1050
zab4ever.no-ip.org:1050
1zab4ever.no-ip.org:1050
1zab4ever.duckdns.org:1050
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
BrowseUpdt.exe
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
nobita.dat
-
keylog_flag
false
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
khruioprs-T021C4
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
BrowseUpdt
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
notepad;solitaire;
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2840 BrowseUpdt.exe -
Loads dropped DLL 2 IoCs
pid Process 2724 cmd.exe 2724 cmd.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\BrowseUpdt = "\"C:\\Users\\Admin\\AppData\\Roaming\\BrowseUpdt.exe\"" BrowseUpdt.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\BrowseUpdt = "\"C:\\Users\\Admin\\AppData\\Roaming\\BrowseUpdt.exe\"" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\BrowseUpdt = "\"C:\\Users\\Admin\\AppData\\Roaming\\BrowseUpdt.exe\"" a.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2840 set thread context of 2588 2840 BrowseUpdt.exe 35 PID 2588 set thread context of 2640 2588 iexplore.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BrowseUpdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2840 BrowseUpdt.exe 2588 iexplore.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2588 iexplore.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2704 wrote to memory of 2892 2704 a.exe 31 PID 2704 wrote to memory of 2892 2704 a.exe 31 PID 2704 wrote to memory of 2892 2704 a.exe 31 PID 2704 wrote to memory of 2892 2704 a.exe 31 PID 2892 wrote to memory of 2724 2892 WScript.exe 32 PID 2892 wrote to memory of 2724 2892 WScript.exe 32 PID 2892 wrote to memory of 2724 2892 WScript.exe 32 PID 2892 wrote to memory of 2724 2892 WScript.exe 32 PID 2724 wrote to memory of 2840 2724 cmd.exe 34 PID 2724 wrote to memory of 2840 2724 cmd.exe 34 PID 2724 wrote to memory of 2840 2724 cmd.exe 34 PID 2724 wrote to memory of 2840 2724 cmd.exe 34 PID 2840 wrote to memory of 2588 2840 BrowseUpdt.exe 35 PID 2840 wrote to memory of 2588 2840 BrowseUpdt.exe 35 PID 2840 wrote to memory of 2588 2840 BrowseUpdt.exe 35 PID 2840 wrote to memory of 2588 2840 BrowseUpdt.exe 35 PID 2840 wrote to memory of 2588 2840 BrowseUpdt.exe 35 PID 2588 wrote to memory of 2640 2588 iexplore.exe 36 PID 2588 wrote to memory of 2640 2588 iexplore.exe 36 PID 2588 wrote to memory of 2640 2588 iexplore.exe 36 PID 2588 wrote to memory of 2640 2588 iexplore.exe 36 PID 2588 wrote to memory of 2640 2588 iexplore.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\a.exe"C:\Users\Admin\AppData\Local\Temp\a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\BrowseUpdt.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Roaming\BrowseUpdt.exeC:\Users\Admin\AppData\Roaming\BrowseUpdt.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2840 -
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"5⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:2640
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412B
MD5983609782eefdfb08a07ef630996dc0c
SHA147d060bf4d7ce66d807aa246e4a78ce3c1ac29b0
SHA25638b85ad30d0626119e9e2f40b5b5a4279ae2f1929bf623083568cd3b1c3bf935
SHA512ebadf7e339214da369e25ab6ca2bc19799d99e2e4fffc9b79d57e747eacdb62aa3fd41d1efae4250ac0536a0b60e541b4a5b2323ea59c09f2fdb8fdee248733d
-
Filesize
453KB
MD502d693c186871b0aba2101233ee64173
SHA1f5786f6346286e9e61f2c4cde7cf0dd877d103da
SHA256ec8ecee61aeab54e0622706710e9cbe56cdda7d2b47c5d13ef343092c868120c
SHA512aa2948a490ed50dbfc8568ee9c521ab52e136894cb5f012d0879640cda5af5de1c41579dbe463bfe15580c51b892155e39bf0bfa883f5fd79d37285b2abeb768