Analysis
-
max time kernel
148s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-09-2024 19:07
Static task
static1
Behavioral task
behavioral1
Sample
HSBCPaymentAdvicepdf.exe
Resource
win7-20240903-en
General
-
Target
HSBCPaymentAdvicepdf.exe
-
Size
993KB
-
MD5
d0da590b7edbc0da19fb22989e74094a
-
SHA1
96ebe02b6e7499acdf741aa1a770511345532cf3
-
SHA256
fd9c0fb6f463cee4975445c4ff19301daeed95a081f0428c5ef7aad815dd7277
-
SHA512
6f7547230d5e005b6a9f04db0cb0c64c501dacf6f4836b1061f6dc2135ab8a06f06a1c5d7f90bd87491b534e4bfc20068d498b55bf896d63058ec8035df03a9b
-
SSDEEP
24576:SUobyDHF8HpzkLmV4ZDeLnmx/E/oLZT2nGr4oI6:DZKJILmVmeKx8gZlI
Malware Config
Extracted
remcos
udu
UDUM.WORK.GD:2431
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
vlc
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
sos
-
mouse_option
false
-
mutex
udm-2WYU92
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2008 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3020 set thread context of 2116 3020 HSBCPaymentAdvicepdf.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HSBCPaymentAdvicepdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HSBCPaymentAdvicepdf.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2280 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3020 HSBCPaymentAdvicepdf.exe 3020 HSBCPaymentAdvicepdf.exe 2008 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3020 HSBCPaymentAdvicepdf.exe Token: SeDebugPrivilege 2008 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2116 HSBCPaymentAdvicepdf.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2116 HSBCPaymentAdvicepdf.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2116 HSBCPaymentAdvicepdf.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2008 3020 HSBCPaymentAdvicepdf.exe 31 PID 3020 wrote to memory of 2008 3020 HSBCPaymentAdvicepdf.exe 31 PID 3020 wrote to memory of 2008 3020 HSBCPaymentAdvicepdf.exe 31 PID 3020 wrote to memory of 2008 3020 HSBCPaymentAdvicepdf.exe 31 PID 3020 wrote to memory of 2280 3020 HSBCPaymentAdvicepdf.exe 33 PID 3020 wrote to memory of 2280 3020 HSBCPaymentAdvicepdf.exe 33 PID 3020 wrote to memory of 2280 3020 HSBCPaymentAdvicepdf.exe 33 PID 3020 wrote to memory of 2280 3020 HSBCPaymentAdvicepdf.exe 33 PID 3020 wrote to memory of 2116 3020 HSBCPaymentAdvicepdf.exe 35 PID 3020 wrote to memory of 2116 3020 HSBCPaymentAdvicepdf.exe 35 PID 3020 wrote to memory of 2116 3020 HSBCPaymentAdvicepdf.exe 35 PID 3020 wrote to memory of 2116 3020 HSBCPaymentAdvicepdf.exe 35 PID 3020 wrote to memory of 2116 3020 HSBCPaymentAdvicepdf.exe 35 PID 3020 wrote to memory of 2116 3020 HSBCPaymentAdvicepdf.exe 35 PID 3020 wrote to memory of 2116 3020 HSBCPaymentAdvicepdf.exe 35 PID 3020 wrote to memory of 2116 3020 HSBCPaymentAdvicepdf.exe 35 PID 3020 wrote to memory of 2116 3020 HSBCPaymentAdvicepdf.exe 35 PID 3020 wrote to memory of 2116 3020 HSBCPaymentAdvicepdf.exe 35 PID 3020 wrote to memory of 2116 3020 HSBCPaymentAdvicepdf.exe 35 PID 3020 wrote to memory of 2116 3020 HSBCPaymentAdvicepdf.exe 35 PID 3020 wrote to memory of 2116 3020 HSBCPaymentAdvicepdf.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\HSBCPaymentAdvicepdf.exe"C:\Users\Admin\AppData\Local\Temp\HSBCPaymentAdvicepdf.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\FuWEVfUSU.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2008
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FuWEVfUSU" /XML "C:\Users\Admin\AppData\Local\Temp\tmpDAA6.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2280
-
-
C:\Users\Admin\AppData\Local\Temp\HSBCPaymentAdvicepdf.exe"C:\Users\Admin\AppData\Local\Temp\HSBCPaymentAdvicepdf.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
230B
MD547119da63b9b375f5f1ea14ef5212916
SHA17d1235832288d38cf59f88e97be002ad45bc818b
SHA2562b0d03d8fe1dbb04da23caff20823ef378020192882a7f98e1edbfbc1a7a78c5
SHA512dcd6b4d74d65036160836e7f1741c79bc5720cf256e8c7fc14b2c69915edfa37bd0620b0f53ea6e333daed6930ba7d27b721a58b452ecff6548d6c83ddcc23d0
-
Filesize
1KB
MD53fd3721ca4e9e6d610d41474769f317b
SHA1bd4f4260e20708338dc3e0ecea2f9a73539a505a
SHA256b5f83eee112b9149583e0e4068f32e3eae3cc8c11a1027303bbeaf3d29422d0e
SHA5128e3b8713d0d80fdd229154e23bb1b4a70d894e6426dc5c3bfd5e94519f9a575583b514aff5adf3064ae9ddb5a33cffc961bd5e99e01ad432dea802b955980bfc