Analysis
-
max time kernel
41s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 09:06
Behavioral task
behavioral1
Sample
8b7d3d96cf4ddcaac7987def486448b0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8b7d3d96cf4ddcaac7987def486448b0N.exe
Resource
win10v2004-20240802-en
General
-
Target
8b7d3d96cf4ddcaac7987def486448b0N.exe
-
Size
2.9MB
-
MD5
8b7d3d96cf4ddcaac7987def486448b0
-
SHA1
522d00b0bce708e4d0fa6c85674967dc69067bdc
-
SHA256
f983f49476e4553938fe10aaf92c44e797d56be702e2ecaeeb65781b00fbf3ef
-
SHA512
b4730b4e110c7ec471d48b6a36ccebd0f698685d056a95dbd8489d0d3513dd9d3b55a95dfad3286821a2f5a157675e3cd16194b4ad61e51b062191b8b33702f6
-
SSDEEP
49152:hh+ZkldoPK8Yad7cwj644Mh+ZkldoPK8YaLDNc2:C2cPK8YwjE2cPK8b
Malware Config
Extracted
webmonitor
snpandey4659.wm01.to:443
-
config_key
sFitr5r1ExCJl86X6inyc4qxlzwyw8fK
-
private_key
t1wG88poq
-
url_path
/recv4.php
Extracted
remcos
2.3.0 Pro
RemoteHost
daya4659.ddns.net:8282
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
3
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-S1KNPZ
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Signatures
-
RevcodeRat, WebMonitorRat
WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.
-
WebMonitor payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/440-20-0x0000000000400000-0x00000000004C0000-memory.dmp family_webmonitor behavioral2/memory/440-19-0x0000000000400000-0x00000000004C0000-memory.dmp family_webmonitor -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
8b7d3d96cf4ddcaac7987def486448b0N.exeremcos_agent_Protected.exeremcos_agent_Protected.exeWScript.exeremcos.exesfc.exedriverquery.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation 8b7d3d96cf4ddcaac7987def486448b0N.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation remcos_agent_Protected.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation remcos_agent_Protected.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation remcos.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation sfc.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation driverquery.exe -
Executes dropped EXE 13 IoCs
Processes:
remcos_agent_Protected.exeremcos_agent_Protected.exeremcos.exeremcos.exesfc.exesfc.exedriverquery.exedriverquery.exedriverquery.exedriverquery.exedriverquery.exedriverquery.exedriverquery.exepid Process 2288 remcos_agent_Protected.exe 1432 remcos_agent_Protected.exe 808 remcos.exe 4152 remcos.exe 592 sfc.exe 3600 sfc.exe 1680 driverquery.exe 4876 driverquery.exe 652 driverquery.exe 3540 driverquery.exe 952 driverquery.exe 4860 driverquery.exe 4840 driverquery.exe -
Processes:
resource yara_rule behavioral2/memory/440-13-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral2/memory/440-18-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral2/memory/440-20-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral2/memory/440-19-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral2/memory/440-17-0x0000000000400000-0x00000000004C0000-memory.dmp upx -
Unexpected DNS network traffic destination 11 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 1.2.4.8 Destination IP 185.141.152.26 Destination IP 185.141.152.26 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 185.141.152.26 Destination IP 114.114.114.114 Destination IP 185.141.152.26 Destination IP 1.2.4.8 Destination IP 185.141.152.26 Destination IP 1.2.4.8 -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
remcos_agent_Protected.exeremcos.exe8b7d3d96cf4ddcaac7987def486448b0N.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" remcos_agent_Protected.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" remcos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" remcos.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WebMonitor-73ed = "C:\\Users\\Admin\\AppData\\Roaming\\WebMonitor-73ed.exe" 8b7d3d96cf4ddcaac7987def486448b0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" remcos_agent_Protected.exe -
AutoIT Executable 21 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/files/0x00090000000233db-4.dat autoit_exe behavioral2/memory/1884-56-0x0000000000400000-0x0000000000526000-memory.dmp autoit_exe behavioral2/memory/1884-57-0x0000000000400000-0x0000000000526000-memory.dmp autoit_exe behavioral2/memory/1508-85-0x0000000000400000-0x0000000000526000-memory.dmp autoit_exe behavioral2/memory/796-88-0x0000000000400000-0x0000000000526000-memory.dmp autoit_exe behavioral2/memory/1524-90-0x0000000000400000-0x0000000000526000-memory.dmp autoit_exe behavioral2/memory/2732-92-0x0000000000400000-0x0000000000526000-memory.dmp autoit_exe behavioral2/memory/2264-100-0x0000000000400000-0x0000000000526000-memory.dmp autoit_exe behavioral2/memory/1788-133-0x0000000000400000-0x0000000000526000-memory.dmp autoit_exe behavioral2/memory/3912-194-0x0000000000400000-0x0000000000526000-memory.dmp autoit_exe behavioral2/memory/1472-196-0x0000000000400000-0x0000000000526000-memory.dmp autoit_exe behavioral2/memory/440-197-0x0000000000EE0000-0x00000000011CB000-memory.dmp autoit_exe behavioral2/memory/3652-199-0x0000000000400000-0x0000000000526000-memory.dmp autoit_exe behavioral2/memory/4596-202-0x0000000000400000-0x0000000000526000-memory.dmp autoit_exe behavioral2/memory/4440-204-0x0000000000400000-0x0000000000526000-memory.dmp autoit_exe behavioral2/memory/1060-206-0x0000000000400000-0x0000000000526000-memory.dmp autoit_exe behavioral2/memory/3924-211-0x0000000000400000-0x0000000000526000-memory.dmp autoit_exe behavioral2/memory/3484-213-0x0000000000400000-0x0000000000526000-memory.dmp autoit_exe behavioral2/memory/3424-216-0x0000000000400000-0x0000000000526000-memory.dmp autoit_exe behavioral2/files/0x0007000000023447-219.dat autoit_exe behavioral2/files/0x0007000000023444-229.dat autoit_exe -
Suspicious use of SetThreadContext 21 IoCs
Processes:
8b7d3d96cf4ddcaac7987def486448b0N.exeremcos_agent_Protected.exeremcos.exeremcos.exesfc.exedescription pid Process procid_target PID 1796 set thread context of 440 1796 8b7d3d96cf4ddcaac7987def486448b0N.exe 93 PID 2288 set thread context of 1432 2288 remcos_agent_Protected.exe 96 PID 808 set thread context of 4152 808 remcos.exe 104 PID 4152 set thread context of 1884 4152 remcos.exe 105 PID 4152 set thread context of 1508 4152 remcos.exe 117 PID 4152 set thread context of 796 4152 remcos.exe 120 PID 4152 set thread context of 1524 4152 remcos.exe 124 PID 4152 set thread context of 2732 4152 remcos.exe 127 PID 4152 set thread context of 2264 4152 remcos.exe 130 PID 4152 set thread context of 1788 4152 remcos.exe 137 PID 4152 set thread context of 3912 4152 remcos.exe 142 PID 4152 set thread context of 1472 4152 remcos.exe 146 PID 4152 set thread context of 3652 4152 remcos.exe 151 PID 4152 set thread context of 4596 4152 remcos.exe 155 PID 4152 set thread context of 4440 4152 remcos.exe 158 PID 4152 set thread context of 1060 4152 remcos.exe 162 PID 4152 set thread context of 3924 4152 remcos.exe 166 PID 4152 set thread context of 3484 4152 remcos.exe 169 PID 4152 set thread context of 3424 4152 remcos.exe 172 PID 4152 set thread context of 4560 4152 remcos.exe 175 PID 592 set thread context of 3600 592 sfc.exe 179 -
HTTP links in PDF interactive object 2 IoCs
Detects HTTP links in interactive objects within PDF files.
Processes:
resource yara_rule behavioral2/files/0x0007000000023443-21.dat pdf_with_link_action behavioral2/files/0x0007000000023444-229.dat pdf_with_link_action -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 17 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target Process procid_target 3108 1884 WerFault.exe 105 2268 1508 WerFault.exe 117 2472 796 WerFault.exe 120 3192 1524 WerFault.exe 124 548 2732 WerFault.exe 127 3100 2264 WerFault.exe 130 1580 1788 WerFault.exe 137 2740 3912 WerFault.exe 142 4048 1472 WerFault.exe 146 5040 3652 WerFault.exe 151 4560 4596 WerFault.exe 155 1216 4440 WerFault.exe 158 432 1060 WerFault.exe 162 1800 3924 WerFault.exe 166 1056 3484 WerFault.exe 169 452 3424 WerFault.exe 172 4976 4560 WerFault.exe 175 -
System Location Discovery: System Language Discovery 1 TTPs 40 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
RdrCEF.exeRdrCEF.exesvchost.exesvchost.exesvchost.exeAcroRd32.execmd.exeRdrCEF.exesfc.exeschtasks.exesvchost.exesvchost.exeremcos.exeRdrCEF.exesvchost.exe8b7d3d96cf4ddcaac7987def486448b0N.exesvchost.exedriverquery.exeRdrCEF.exesvchost.exesvchost.exeschtasks.exeschtasks.exeschtasks.exesvchost.exesvchost.exesvchost.exeschtasks.exe8b7d3d96cf4ddcaac7987def486448b0N.exeRdrCEF.exeremcos.exesvchost.exesvchost.exesvchost.exeremcos_agent_Protected.exesvchost.exesvchost.exeremcos_agent_Protected.exeWScript.exeRdrCEF.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sfc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b7d3d96cf4ddcaac7987def486448b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language driverquery.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b7d3d96cf4ddcaac7987def486448b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos_agent_Protected.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos_agent_Protected.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
Processes:
AcroRd32.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 2 IoCs
Processes:
8b7d3d96cf4ddcaac7987def486448b0N.exeremcos_agent_Protected.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings 8b7d3d96cf4ddcaac7987def486448b0N.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings remcos_agent_Protected.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid Process 1192 schtasks.exe 876 schtasks.exe 1624 schtasks.exe 4384 schtasks.exe 100 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
AcroRd32.exepid Process 3776 AcroRd32.exe 3776 AcroRd32.exe 3776 AcroRd32.exe 3776 AcroRd32.exe 3776 AcroRd32.exe 3776 AcroRd32.exe 3776 AcroRd32.exe 3776 AcroRd32.exe 3776 AcroRd32.exe 3776 AcroRd32.exe 3776 AcroRd32.exe 3776 AcroRd32.exe 3776 AcroRd32.exe 3776 AcroRd32.exe 3776 AcroRd32.exe 3776 AcroRd32.exe 3776 AcroRd32.exe 3776 AcroRd32.exe 3776 AcroRd32.exe 3776 AcroRd32.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
8b7d3d96cf4ddcaac7987def486448b0N.exepid Process 440 8b7d3d96cf4ddcaac7987def486448b0N.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AcroRd32.exepid Process 3776 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
AcroRd32.exeremcos.exepid Process 3776 AcroRd32.exe 3776 AcroRd32.exe 3776 AcroRd32.exe 3776 AcroRd32.exe 4152 remcos.exe 3776 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
8b7d3d96cf4ddcaac7987def486448b0N.exeremcos_agent_Protected.exeremcos_agent_Protected.exeWScript.execmd.exeAcroRd32.exeremcos.exeremcos.exeRdrCEF.exedescription pid Process procid_target PID 1796 wrote to memory of 2288 1796 8b7d3d96cf4ddcaac7987def486448b0N.exe 88 PID 1796 wrote to memory of 2288 1796 8b7d3d96cf4ddcaac7987def486448b0N.exe 88 PID 1796 wrote to memory of 2288 1796 8b7d3d96cf4ddcaac7987def486448b0N.exe 88 PID 1796 wrote to memory of 3776 1796 8b7d3d96cf4ddcaac7987def486448b0N.exe 90 PID 1796 wrote to memory of 3776 1796 8b7d3d96cf4ddcaac7987def486448b0N.exe 90 PID 1796 wrote to memory of 3776 1796 8b7d3d96cf4ddcaac7987def486448b0N.exe 90 PID 1796 wrote to memory of 960 1796 8b7d3d96cf4ddcaac7987def486448b0N.exe 91 PID 1796 wrote to memory of 960 1796 8b7d3d96cf4ddcaac7987def486448b0N.exe 91 PID 1796 wrote to memory of 960 1796 8b7d3d96cf4ddcaac7987def486448b0N.exe 91 PID 1796 wrote to memory of 2268 1796 8b7d3d96cf4ddcaac7987def486448b0N.exe 92 PID 1796 wrote to memory of 2268 1796 8b7d3d96cf4ddcaac7987def486448b0N.exe 92 PID 1796 wrote to memory of 2268 1796 8b7d3d96cf4ddcaac7987def486448b0N.exe 92 PID 1796 wrote to memory of 440 1796 8b7d3d96cf4ddcaac7987def486448b0N.exe 93 PID 1796 wrote to memory of 440 1796 8b7d3d96cf4ddcaac7987def486448b0N.exe 93 PID 1796 wrote to memory of 440 1796 8b7d3d96cf4ddcaac7987def486448b0N.exe 93 PID 1796 wrote to memory of 440 1796 8b7d3d96cf4ddcaac7987def486448b0N.exe 93 PID 1796 wrote to memory of 440 1796 8b7d3d96cf4ddcaac7987def486448b0N.exe 93 PID 1796 wrote to memory of 1192 1796 8b7d3d96cf4ddcaac7987def486448b0N.exe 94 PID 1796 wrote to memory of 1192 1796 8b7d3d96cf4ddcaac7987def486448b0N.exe 94 PID 1796 wrote to memory of 1192 1796 8b7d3d96cf4ddcaac7987def486448b0N.exe 94 PID 2288 wrote to memory of 1432 2288 remcos_agent_Protected.exe 96 PID 2288 wrote to memory of 1432 2288 remcos_agent_Protected.exe 96 PID 2288 wrote to memory of 1432 2288 remcos_agent_Protected.exe 96 PID 2288 wrote to memory of 1432 2288 remcos_agent_Protected.exe 96 PID 2288 wrote to memory of 1432 2288 remcos_agent_Protected.exe 96 PID 1432 wrote to memory of 1472 1432 remcos_agent_Protected.exe 97 PID 1432 wrote to memory of 1472 1432 remcos_agent_Protected.exe 97 PID 1432 wrote to memory of 1472 1432 remcos_agent_Protected.exe 97 PID 2288 wrote to memory of 876 2288 remcos_agent_Protected.exe 98 PID 2288 wrote to memory of 876 2288 remcos_agent_Protected.exe 98 PID 2288 wrote to memory of 876 2288 remcos_agent_Protected.exe 98 PID 1472 wrote to memory of 4836 1472 WScript.exe 100 PID 1472 wrote to memory of 4836 1472 WScript.exe 100 PID 1472 wrote to memory of 4836 1472 WScript.exe 100 PID 4836 wrote to memory of 808 4836 cmd.exe 102 PID 4836 wrote to memory of 808 4836 cmd.exe 102 PID 4836 wrote to memory of 808 4836 cmd.exe 102 PID 3776 wrote to memory of 4136 3776 AcroRd32.exe 103 PID 3776 wrote to memory of 4136 3776 AcroRd32.exe 103 PID 3776 wrote to memory of 4136 3776 AcroRd32.exe 103 PID 808 wrote to memory of 4152 808 remcos.exe 104 PID 808 wrote to memory of 4152 808 remcos.exe 104 PID 808 wrote to memory of 4152 808 remcos.exe 104 PID 808 wrote to memory of 4152 808 remcos.exe 104 PID 808 wrote to memory of 4152 808 remcos.exe 104 PID 4152 wrote to memory of 1884 4152 remcos.exe 105 PID 4152 wrote to memory of 1884 4152 remcos.exe 105 PID 4152 wrote to memory of 1884 4152 remcos.exe 105 PID 4152 wrote to memory of 1884 4152 remcos.exe 105 PID 4152 wrote to memory of 1884 4152 remcos.exe 105 PID 4152 wrote to memory of 1884 4152 remcos.exe 105 PID 4152 wrote to memory of 1884 4152 remcos.exe 105 PID 4152 wrote to memory of 1884 4152 remcos.exe 105 PID 4152 wrote to memory of 1884 4152 remcos.exe 105 PID 4152 wrote to memory of 1884 4152 remcos.exe 105 PID 4136 wrote to memory of 1528 4136 RdrCEF.exe 109 PID 4136 wrote to memory of 1528 4136 RdrCEF.exe 109 PID 4136 wrote to memory of 1528 4136 RdrCEF.exe 109 PID 4136 wrote to memory of 1528 4136 RdrCEF.exe 109 PID 4136 wrote to memory of 1528 4136 RdrCEF.exe 109 PID 4136 wrote to memory of 1528 4136 RdrCEF.exe 109 PID 4136 wrote to memory of 1528 4136 RdrCEF.exe 109 PID 4136 wrote to memory of 1528 4136 RdrCEF.exe 109 PID 4136 wrote to memory of 1528 4136 RdrCEF.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b7d3d96cf4ddcaac7987def486448b0N.exe"C:\Users\Admin\AppData\Local\Temp\8b7d3d96cf4ddcaac7987def486448b0N.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Roaming\remcos_agent_Protected.exe"C:\Users\Admin\AppData\Roaming\remcos_agent_Protected.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Roaming\remcos_agent_Protected.exe"C:\Users\Admin\AppData\Roaming\remcos_agent_Protected.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"7⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe8⤵
- System Location Discovery: System Language Discovery
PID:1884 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1884 -s 5609⤵
- Program crash
PID:3108
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe8⤵
- System Location Discovery: System Language Discovery
PID:1508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1508 -s 5609⤵
- Program crash
PID:2268
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe8⤵
- System Location Discovery: System Language Discovery
PID:796 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 796 -s 5609⤵
- Program crash
PID:2472
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe8⤵PID:2032
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe8⤵
- System Location Discovery: System Language Discovery
PID:1524 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1524 -s 2129⤵
- Program crash
PID:3192
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe8⤵
- System Location Discovery: System Language Discovery
PID:2732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 1969⤵
- Program crash
PID:548
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe8⤵
- System Location Discovery: System Language Discovery
PID:2264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 5609⤵
- Program crash
PID:3100
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe8⤵
- System Location Discovery: System Language Discovery
PID:1788 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1788 -s 5609⤵
- Program crash
PID:1580
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe8⤵PID:1960
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe8⤵PID:3872
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe8⤵
- System Location Discovery: System Language Discovery
PID:3912 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 5609⤵
- Program crash
PID:2740
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe8⤵
- System Location Discovery: System Language Discovery
PID:1472 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 5609⤵
- Program crash
PID:4048
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe8⤵
- System Location Discovery: System Language Discovery
PID:3652 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3652 -s 5609⤵
- Program crash
PID:5040
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe8⤵PID:664
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe8⤵
- System Location Discovery: System Language Discovery
PID:4596 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 5809⤵
- Program crash
PID:4560
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe8⤵
- System Location Discovery: System Language Discovery
PID:4440 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4440 -s 5609⤵
- Program crash
PID:1216
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe8⤵PID:4276
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe8⤵
- System Location Discovery: System Language Discovery
PID:1060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1060 -s 5649⤵
- Program crash
PID:432
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe8⤵
- System Location Discovery: System Language Discovery
PID:3924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3924 -s 5729⤵
- Program crash
PID:1800
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe8⤵
- System Location Discovery: System Language Discovery
PID:3484 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3484 -s 1969⤵
- Program crash
PID:1056
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe8⤵
- System Location Discovery: System Language Discovery
PID:3424 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 5609⤵
- Program crash
PID:452
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe8⤵
- System Location Discovery: System Language Discovery
PID:4560 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4560 -s 5609⤵
- Program crash
PID:4976
-
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn setx /tr "C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exe" /sc minute /mo 1 /F7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1624
-
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn setx /tr "C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exe" /sc minute /mo 1 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:876
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\medical-application-form.pdf"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=47F89A7DE9F3046CDCE4C9E248706AB3 --mojo-platform-channel-handle=1732 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:1528
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=284C8754D40EAF92D810AD4D9497E0FB --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=284C8754D40EAF92D810AD4D9497E0FB --renderer-client-id=2 --mojo-platform-channel-handle=1744 --allow-no-sandbox-job /prefetch:14⤵
- System Location Discovery: System Language Discovery
PID:4168
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F8098E6748CECCD1CF2C4A9D7C1F816A --mojo-platform-channel-handle=2332 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:3392
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=B9331E8D67D0A269DC362BAA0598236D --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=B9331E8D67D0A269DC362BAA0598236D --renderer-client-id=5 --mojo-platform-channel-handle=2432 --allow-no-sandbox-job /prefetch:14⤵
- System Location Discovery: System Language Discovery
PID:4060
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=C17B83F9566346C5D503CD067AE3E896 --mojo-platform-channel-handle=1852 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:1588
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=2D81F34F490EB4606DEB479AE87CE607 --mojo-platform-channel-handle=2380 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:5016
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\8b7d3d96cf4ddcaac7987def486448b0N.exe"C:\Users\Admin\AppData\Local\Temp\8b7d3d96cf4ddcaac7987def486448b0N.exe"2⤵PID:960
-
-
C:\Users\Admin\AppData\Local\Temp\8b7d3d96cf4ddcaac7987def486448b0N.exe"C:\Users\Admin\AppData\Local\Temp\8b7d3d96cf4ddcaac7987def486448b0N.exe"2⤵PID:2268
-
-
C:\Users\Admin\AppData\Local\Temp\8b7d3d96cf4ddcaac7987def486448b0N.exe"C:\Users\Admin\AppData\Local\Temp\8b7d3d96cf4ddcaac7987def486448b0N.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:440
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn WWAHost /tr "C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe" /sc minute /mo 1 /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1884 -ip 18841⤵PID:2200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1508 -ip 15081⤵PID:3636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 796 -ip 7961⤵PID:4324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1524 -ip 15241⤵PID:876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2732 -ip 27321⤵PID:1556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2264 -ip 22641⤵PID:2064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1788 -ip 17881⤵PID:3392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3912 -ip 39121⤵PID:2188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1472 -ip 14721⤵PID:1760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3652 -ip 36521⤵PID:4508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4596 -ip 45961⤵PID:452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4440 -ip 44401⤵PID:4976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 1060 -ip 10601⤵PID:3428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 3924 -ip 39241⤵PID:3192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 3484 -ip 34841⤵PID:4048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 3424 -ip 34241⤵PID:4148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4560 -ip 45601⤵PID:1592
-
C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exeC:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:592 -
C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exe"C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exe"2⤵
- Executes dropped EXE
PID:3600
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn setx /tr "C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exe" /sc minute /mo 1 /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4384
-
-
C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exeC:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1680 -
C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe"C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe"2⤵
- Executes dropped EXE
PID:4876
-
-
C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe"C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe"2⤵
- Executes dropped EXE
PID:652
-
-
C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe"C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe"2⤵
- Executes dropped EXE
PID:3540
-
-
C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe"C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe"2⤵
- Executes dropped EXE
PID:952
-
-
C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe"C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe"2⤵
- Executes dropped EXE
PID:4860
-
-
C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe"C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe"2⤵
- Executes dropped EXE
PID:4840
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn WWAHost /tr "C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe" /sc minute /mo 1 /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:100
-
-
C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exeC:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exe1⤵PID:212
-
C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exeC:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe1⤵PID:2156
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5
-
Filesize
64KB
MD5b7ced3ba0ee1a117884163ba039b8ff3
SHA14dcaeb42963fc04fb7010cd02077aae456b7385b
SHA2564f3c1022fea30ba28ae5e9d6af78038c623d0ae9aa6e9ca638b01235cf564a2a
SHA51284f115b1144985e0cbf7602fccef741215fab5e486b380a113411f442e2130070c3f3df8b34756a44f79c68bea0e88b31a6e281542d8ecead4db1806a87f2b07
-
Filesize
12KB
MD5f5d380dab872cbf5ee7004b244dac525
SHA1ab4c5eaae551aa62be1bedc23bf65a0ea20bca75
SHA2561b5c44954209542a4ddb2ad47fa4df8d4c85f7f156881100a65b41355db5a788
SHA512aeac1fc94da19e994a7f4bf92041276346bf4ed2dd6da71acedb1bc88d434cf04de67909ff3aa0338d2524f584d0f1d089f201d855057936176efbb4193eee8c
-
Filesize
418B
MD5ff449f6f7bc5e2d800eb30e2d2c56611
SHA193419ea805b9ce35a766e5c56db50d54c2d3f94b
SHA256655787cf79040ee701963986320556a834d6345e850e03653e4852d94eb09416
SHA51202a17064c837d36ba241fb8edf9266e33479a10eb8652b974158a3227878a801da29db1108413bb2c298a105b3c19bd20c3a3100f19444189f434706825766a6
-
Filesize
340KB
MD5bb0aa1bade4df17033a05d8d682b44d2
SHA1bec4b0a8a7413d158cf6705a3c888bdf36a4371b
SHA25696d6c8c54390b476e8f8f42b99b52efb19eca152bf046c254992bc2f2faba764
SHA5126bfe1b289f9c84d4db5a564ed129f7920775946981d5da5cb7753d63a141d84486ba9e958044e8162fba2eba875e56c358f92091b760e07b8cbe459e4202e4d9
-
Filesize
1.1MB
MD53eeb23e329e33dfccf22052935cdc4b7
SHA1db0e59da27dc590d8ecba955a88d609dfefc8609
SHA2563f6c0ef7978203d44625a6b9750e8fea118e01c8c1bfb72cc38d64fedb8cd469
SHA51216f7f7ef30a30c3c2a2a19b699894249b9d988b6c31da1d84a053c92eac87a5ca2363353333e253aac8e555a732325fc1907a239d433805ba64edb6e4340354e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
2.9MB
MD544e6e3faffffb58f54e8558975850641
SHA1dd403b606411e7eca83b56b4fe352c4d0c8d22a0
SHA25606086e33272f1c2bd4920e7586563d3c617e00b0b0482fc6f1cd0e0541d75991
SHA5124fbb7fd9f8c950641eb92c73ceea382200c4f7b922c105734c19344538bc38c217c8ece6002a038dc5c356ff6173c5afc2eadbb80919e7417cc2ee52e0f58fbd
-
Filesize
118B
MD50335f5316dbd4b56781bfc000393e7ec
SHA1dfca26c2c6dd6488787cb0994718ee53e63ce1e7
SHA25645847b45111ca83bfdf5377adc5265c80f925c2a66edacba187aa57447a06d5e
SHA51254d949db993adcd6f484af3ebcc988c4033bebdc004c5c339aac3dd025e943e8ffe042bb116d98009f6c1fe25c9d3d7571234d51ed61c889107052f3711162c3
-
Filesize
1.1MB
MD5d5581c9db64b399c7d0cdb3f7b78673b
SHA187396211e6468d73c97301fe0b673f64bcd6d17c
SHA2567210f2ca290296d1f6e61da4b3192ad19afd719d6cf77dbb2d6810734b349826
SHA5125a8034902bfd110826aebc8196469f0dea26d94fcb093406342657b9660f400cc495a6a7ce843d32a7541083cfbc3f0fbdf9aab1ad08294729307bffe7c512c6