Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-08-2024 02:19
Static task
static1
Behavioral task
behavioral1
Sample
d7cf40360b1dd35e6a20b8639f0fe9cc918157de07ff248983db6f0ee1472dbb.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d7cf40360b1dd35e6a20b8639f0fe9cc918157de07ff248983db6f0ee1472dbb.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/BgImage.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/BgImage.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
General
-
Target
d7cf40360b1dd35e6a20b8639f0fe9cc918157de07ff248983db6f0ee1472dbb.exe
-
Size
636KB
-
MD5
c1c571c4f8f69d3c8aa0ec091173bd5e
-
SHA1
a36ac174f8ee2ed2254f69a21799837af58071f2
-
SHA256
d7cf40360b1dd35e6a20b8639f0fe9cc918157de07ff248983db6f0ee1472dbb
-
SHA512
08b540ab5ebb986cc43add736aee38d11a5f0da5252384bb30c7ca7f7b464e63debab4cec5a3dd122e3280f26e57e5ac8adc171e237a681d0e95239bddc11a1d
-
SSDEEP
12288:5rRo7TKXllTfhmiKdHEHPSXbOp/NoJnYRlXO3iBM4ILaa+Brt:JC7TKXlFfsiMEHPSq8YfMiBMh+ht
Malware Config
Extracted
remcos
RemoteHost
45.95.169.18:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-HP1D61
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Detected Nirsoft tools 3 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral2/memory/4800-65-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral2/memory/4176-70-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral2/memory/2760-69-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/4800-65-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/4176-70-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Loads dropped DLL 1 IoCs
pid Process 5104 d7cf40360b1dd35e6a20b8639f0fe9cc918157de07ff248983db6f0ee1472dbb.exe -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts wab.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Startup key = "%Risikofriestes% -windowstyle minimized $Follikler=(Get-ItemProperty -Path 'HKCU:\\Reattach237\\').Kkkenredskab;%Risikofriestes% ($Follikler)" reg.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 180 wab.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2212 powershell.exe 180 wab.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2212 set thread context of 180 2212 powershell.exe 96 PID 180 set thread context of 4176 180 wab.exe 103 PID 180 set thread context of 4800 180 wab.exe 105 PID 180 set thread context of 2760 180 wab.exe 106 -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Detrainment90\strenuosity.pot d7cf40360b1dd35e6a20b8639f0fe9cc918157de07ff248983db6f0ee1472dbb.exe -
pid Process 2212 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d7cf40360b1dd35e6a20b8639f0fe9cc918157de07ff248983db6f0ee1472dbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 708 reg.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 2212 powershell.exe 2212 powershell.exe 2212 powershell.exe 2212 powershell.exe 2212 powershell.exe 2212 powershell.exe 2212 powershell.exe 2212 powershell.exe 2212 powershell.exe 2760 wab.exe 2760 wab.exe 4176 wab.exe 4176 wab.exe 4176 wab.exe 4176 wab.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2212 powershell.exe 180 wab.exe 180 wab.exe 180 wab.exe 180 wab.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2212 powershell.exe Token: SeDebugPrivilege 2760 wab.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 180 wab.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 5104 wrote to memory of 2212 5104 d7cf40360b1dd35e6a20b8639f0fe9cc918157de07ff248983db6f0ee1472dbb.exe 85 PID 5104 wrote to memory of 2212 5104 d7cf40360b1dd35e6a20b8639f0fe9cc918157de07ff248983db6f0ee1472dbb.exe 85 PID 5104 wrote to memory of 2212 5104 d7cf40360b1dd35e6a20b8639f0fe9cc918157de07ff248983db6f0ee1472dbb.exe 85 PID 2212 wrote to memory of 180 2212 powershell.exe 96 PID 2212 wrote to memory of 180 2212 powershell.exe 96 PID 2212 wrote to memory of 180 2212 powershell.exe 96 PID 2212 wrote to memory of 180 2212 powershell.exe 96 PID 2212 wrote to memory of 180 2212 powershell.exe 96 PID 180 wrote to memory of 5020 180 wab.exe 97 PID 180 wrote to memory of 5020 180 wab.exe 97 PID 180 wrote to memory of 5020 180 wab.exe 97 PID 5020 wrote to memory of 708 5020 cmd.exe 99 PID 5020 wrote to memory of 708 5020 cmd.exe 99 PID 5020 wrote to memory of 708 5020 cmd.exe 99 PID 180 wrote to memory of 4176 180 wab.exe 103 PID 180 wrote to memory of 4176 180 wab.exe 103 PID 180 wrote to memory of 4176 180 wab.exe 103 PID 180 wrote to memory of 4176 180 wab.exe 103 PID 180 wrote to memory of 5108 180 wab.exe 104 PID 180 wrote to memory of 5108 180 wab.exe 104 PID 180 wrote to memory of 5108 180 wab.exe 104 PID 180 wrote to memory of 4800 180 wab.exe 105 PID 180 wrote to memory of 4800 180 wab.exe 105 PID 180 wrote to memory of 4800 180 wab.exe 105 PID 180 wrote to memory of 4800 180 wab.exe 105 PID 180 wrote to memory of 2760 180 wab.exe 106 PID 180 wrote to memory of 2760 180 wab.exe 106 PID 180 wrote to memory of 2760 180 wab.exe 106 PID 180 wrote to memory of 2760 180 wab.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7cf40360b1dd35e6a20b8639f0fe9cc918157de07ff248983db6f0ee1472dbb.exe"C:\Users\Admin\AppData\Local\Temp\d7cf40360b1dd35e6a20b8639f0fe9cc918157de07ff248983db6f0ee1472dbb.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle minimized " $Fretum=Get-Content 'C:\Users\Admin\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Ravelproof29\Wabeno.phy';$Llebrdsbarmhjertighedens42=$Fretum.SubString(56238,3);.$Llebrdsbarmhjertighedens42($Fretum)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"3⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:180 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Risikofriestes% -windowstyle minimized $Follikler=(Get-ItemProperty -Path 'HKCU:\Reattach237\').Kkkenredskab;%Risikofriestes% ($Follikler)"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Risikofriestes% -windowstyle minimized $Follikler=(Get-ItemProperty -Path 'HKCU:\Reattach237\').Kkkenredskab;%Risikofriestes% ($Follikler)"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:708
-
-
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\naucrpaacwbawdfsanhditwynzxpircaz"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4176
-
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\puznr"4⤵PID:5108
-
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\puznr"4⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:4800
-
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\zxmfsawv"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD515d596db67ae33f92a814c12facd7fbd
SHA1a24ea7235d15bd48b1aa465f12bdd319fef404ca
SHA25694a709da9f3732850b55da7e76f55ec76a8fef807054692f67bc571f53a1fdb3
SHA5122cccb15fcaab8fbd9e2dd4110911eb0ca291aa3e21c929d0f011a980f5f7432e5b83386ebff4306427bd6aeb76fa28a7996934a132166c408b2a87edcf1b2fe7
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4KB
MD52538ec9e8425a905937573069b77d4c2
SHA1ad0c2b7aff4382e23444d26adac96d9697b849f3
SHA25629338949fae4c88a972837aae898529e4c7a2c4df35982eef2f8d7b602c17f4e
SHA512a867a471b837b9c662528ee7a5904e8fe7b1eebb277b8a7fe4d4caf423fae914baf692bb5004c02ddb539b157d63326178467e28b03aa92a533cda19155d501c
-
Filesize
9KB
MD5eb2c74e05b30b29887b3219f4ea3fdab
SHA191173d46b34e7bae57acabdbd239111b5bcc4d9e
SHA256d253ca5aba34b925796777893f114cc741b015af7868022ab1db2341288c55ed
SHA5121bb035260223ec585170f891c2624b9ae98671f225e74b913b40bb77b66e3b9c2016037bc8e4b0ae16367d82590a60a0a3bd95d05139ea2454f02020d1b54dae
-
Filesize
364KB
MD54f7bc22100b0ce9f5392bb0b43ab22c9
SHA1322f410d7c94a5f400656e1c49b5d4cef6dde8f2
SHA25667e85d9212594f2e8be65a3a6a3c8625ca5efe8070050c390e918bcd1da16f3a
SHA512dfc1ba12d84c489d6f6417c1c2f775ba107076b48f2f57b0a565070a88f91334187734463f895b17de46acb620347a1fc36c1deef55969942cf4663de48a347b
-
Filesize
54KB
MD54bb55c98fcfab7c0706cf43af638c89e
SHA158f5ec920e25fa95c47a826e34736d1159232efd
SHA256fafe02f6852b01802bbfe61fe7bb3de41e3d32dfd7b7054e8da7774cecbb3d8d
SHA512591fb17f2d78e25ef91eeb48d8fee5d09de00e553fa0710c28c84f3f1bc657cc8b4d2a4f6e982e4409d8e3450f60d13e6dbce473d33b3fab3d0eed3b489e5e27