Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 13:38
Static task
static1
Behavioral task
behavioral1
Sample
Deposit 47800 USD.png.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Deposit 47800 USD.png.exe
Resource
win10v2004-20240802-en
General
-
Target
Deposit 47800 USD.png.exe
-
Size
903KB
-
MD5
ede0315b2253c133fb9fb6c32c1b4d24
-
SHA1
4c11d887e2fa02dd967a4a723f1b92253d738411
-
SHA256
c4e002e24dc01a9ec412049b3ee298bf7ede32caf604a7a0cf61711d9d3f2bd7
-
SHA512
a1e105987b844947c448b3b08228368464daa160810fd9cd3100bede7dead786308c6f4da20e21203726795e1b2f21762339b42304a2ee91f417799e4555cb0d
-
SSDEEP
12288:mznnX1BNRZ9v1H5SutQJ9NNzRF/AIyDQTt+C6UUmcPBUDoD5zluKiS59GmMi1s6X:+BfR5SutmXRFY9rJUUm+BPV4CRTkE
Malware Config
Extracted
remcos
RemoteHost
103.186.116.111:4440
google-com-site-backup.duckdns.org:4440
103.186.116.111:5656
codingoffensive.duckdns.org:5656
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
ssl
-
mouse_option
false
-
mutex
Rmc-XHK5L2
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2256 powershell.exe 2408 powershell.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2124 set thread context of 2188 2124 Deposit 47800 USD.png.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Deposit 47800 USD.png.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Deposit 47800 USD.png.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2404 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2124 Deposit 47800 USD.png.exe 2124 Deposit 47800 USD.png.exe 2408 powershell.exe 2256 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2124 Deposit 47800 USD.png.exe Token: SeDebugPrivilege 2256 powershell.exe Token: SeDebugPrivilege 2408 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2188 Deposit 47800 USD.png.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2256 2124 Deposit 47800 USD.png.exe 28 PID 2124 wrote to memory of 2256 2124 Deposit 47800 USD.png.exe 28 PID 2124 wrote to memory of 2256 2124 Deposit 47800 USD.png.exe 28 PID 2124 wrote to memory of 2256 2124 Deposit 47800 USD.png.exe 28 PID 2124 wrote to memory of 2408 2124 Deposit 47800 USD.png.exe 30 PID 2124 wrote to memory of 2408 2124 Deposit 47800 USD.png.exe 30 PID 2124 wrote to memory of 2408 2124 Deposit 47800 USD.png.exe 30 PID 2124 wrote to memory of 2408 2124 Deposit 47800 USD.png.exe 30 PID 2124 wrote to memory of 2404 2124 Deposit 47800 USD.png.exe 31 PID 2124 wrote to memory of 2404 2124 Deposit 47800 USD.png.exe 31 PID 2124 wrote to memory of 2404 2124 Deposit 47800 USD.png.exe 31 PID 2124 wrote to memory of 2404 2124 Deposit 47800 USD.png.exe 31 PID 2124 wrote to memory of 2188 2124 Deposit 47800 USD.png.exe 34 PID 2124 wrote to memory of 2188 2124 Deposit 47800 USD.png.exe 34 PID 2124 wrote to memory of 2188 2124 Deposit 47800 USD.png.exe 34 PID 2124 wrote to memory of 2188 2124 Deposit 47800 USD.png.exe 34 PID 2124 wrote to memory of 2188 2124 Deposit 47800 USD.png.exe 34 PID 2124 wrote to memory of 2188 2124 Deposit 47800 USD.png.exe 34 PID 2124 wrote to memory of 2188 2124 Deposit 47800 USD.png.exe 34 PID 2124 wrote to memory of 2188 2124 Deposit 47800 USD.png.exe 34 PID 2124 wrote to memory of 2188 2124 Deposit 47800 USD.png.exe 34 PID 2124 wrote to memory of 2188 2124 Deposit 47800 USD.png.exe 34 PID 2124 wrote to memory of 2188 2124 Deposit 47800 USD.png.exe 34 PID 2124 wrote to memory of 2188 2124 Deposit 47800 USD.png.exe 34 PID 2124 wrote to memory of 2188 2124 Deposit 47800 USD.png.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\Deposit 47800 USD.png.exe"C:\Users\Admin\AppData\Local\Temp\Deposit 47800 USD.png.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Deposit 47800 USD.png.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ZldrOZt.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZldrOZt" /XML "C:\Users\Admin\AppData\Local\Temp\tmpBDB4.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2404
-
-
C:\Users\Admin\AppData\Local\Temp\Deposit 47800 USD.png.exe"C:\Users\Admin\AppData\Local\Temp\Deposit 47800 USD.png.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5a0d41b8adbcce6fbec0be5908f43c14e
SHA18129512e91a93b9e83ea32f4624f2f53512527cd
SHA256ea1bec5eb369e4bc995333ece2748ac26ea07f91e88ecd60f5dfa88d3e1e22b9
SHA512762776eaba4c9650f8740b9a65f589dcd36a17acfb94d76570e7648a693d61d26f4d724fe2cfcf8723481e91282ca8b3e3d65b22353110f51310d9deb544e81f
-
Filesize
1KB
MD58c603737ac432642d61c3a97da6ff34f
SHA1ae35b475336a2966c134a1d6a5135b0fa4b7c4b9
SHA25658e97e5865e56cc28ce85fbccc9923675adfb6ed4f2cb400d597b190a744a009
SHA512e9474d3886b689a578177c2b129c00423e35e3154267690878506feba8c0ed1cda98a26deb447267d5e4f7a815f181b7fd5c087f81723892bec796dcd7b723ab
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\51ST4M0FVC5CEPA17EUC.temp
Filesize7KB
MD5acf6b577edcc4b396d4ca5c611da3f30
SHA153bf7726c4efdcd181887c1d6f273fc9507a67eb
SHA25602f537d4ba364f8138d668b368fd8e249e7d8e31d0fddfc24cb4fe27eecd0cb9
SHA5125967b2477d661554c3a238e622265776a0fc2288a42b2e3fb2aee9cdeded7acf50a58479631693202a27a7bf360c3ff337441b560e6f709bda95c76dfc0c9300