Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
23-09-2024 14:28
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Purchase Order.exe
Resource
win10v2004-20240802-en
General
-
Target
Purchase Order.exe
-
Size
902KB
-
MD5
171f8a0f5bba2ba4fab8d479c65f6651
-
SHA1
a7e8546d3b1dc9482e5800497eb482518efd4427
-
SHA256
cd76524a5a1a193336ce0a72efa54af99367743c2d380d0416a1d09a516fad8b
-
SHA512
3e113f1f1afd56c9ba8ae44f24480f89a60db7f62432cfbf9b77320747f48881ac81bfa692c18692a92906372de70bd8538eea4a88c253fa7f4a6b67d4b5915c
-
SSDEEP
24576:TlFCHP+tB+XNpYpKwiQgAG5FgfsmW1bp9xDe6:pFEtXopK1QVG0fUpT
Malware Config
Extracted
remcos
RemoteHost
127.0.0.1:59321
nnamoo.duckdns.org:59321
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-41EVS0
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2472 powershell.exe 2836 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2336 set thread context of 2808 2336 Purchase Order.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Purchase Order.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2860 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2336 Purchase Order.exe 2472 powershell.exe 2836 powershell.exe 2336 Purchase Order.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2336 Purchase Order.exe Token: SeDebugPrivilege 2472 powershell.exe Token: SeDebugPrivilege 2836 powershell.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2472 2336 Purchase Order.exe 31 PID 2336 wrote to memory of 2472 2336 Purchase Order.exe 31 PID 2336 wrote to memory of 2472 2336 Purchase Order.exe 31 PID 2336 wrote to memory of 2472 2336 Purchase Order.exe 31 PID 2336 wrote to memory of 2836 2336 Purchase Order.exe 33 PID 2336 wrote to memory of 2836 2336 Purchase Order.exe 33 PID 2336 wrote to memory of 2836 2336 Purchase Order.exe 33 PID 2336 wrote to memory of 2836 2336 Purchase Order.exe 33 PID 2336 wrote to memory of 2860 2336 Purchase Order.exe 34 PID 2336 wrote to memory of 2860 2336 Purchase Order.exe 34 PID 2336 wrote to memory of 2860 2336 Purchase Order.exe 34 PID 2336 wrote to memory of 2860 2336 Purchase Order.exe 34 PID 2336 wrote to memory of 2808 2336 Purchase Order.exe 37 PID 2336 wrote to memory of 2808 2336 Purchase Order.exe 37 PID 2336 wrote to memory of 2808 2336 Purchase Order.exe 37 PID 2336 wrote to memory of 2808 2336 Purchase Order.exe 37 PID 2336 wrote to memory of 2808 2336 Purchase Order.exe 37 PID 2336 wrote to memory of 2808 2336 Purchase Order.exe 37 PID 2336 wrote to memory of 2808 2336 Purchase Order.exe 37 PID 2336 wrote to memory of 2808 2336 Purchase Order.exe 37 PID 2336 wrote to memory of 2808 2336 Purchase Order.exe 37 PID 2336 wrote to memory of 2808 2336 Purchase Order.exe 37 PID 2336 wrote to memory of 2808 2336 Purchase Order.exe 37 PID 2336 wrote to memory of 2808 2336 Purchase Order.exe 37 PID 2336 wrote to memory of 2808 2336 Purchase Order.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2472
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\YzFfWxw.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YzFfWxw" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2FD.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2860
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD570ae3b214d0c6ba737f5b8b3b45d539f
SHA1c4d31ec247a8a54ab956aa5bcebabc27e52d762f
SHA2564ac6b3bf077c9478549c619fcbbd558824533e98bdc6b92340f6721fc86821e1
SHA512fc7e0f4c36039f583b6fb91a123c846bc564294768eecbd3b3caa7610e50568673aedbccffdc045784bc2858da4d238a7a1bff243fc1ecd865cc787593fa8d47
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\OKGGXY4M55PWFYU2MXKY.temp
Filesize7KB
MD525c8a59c2e0a7d12b008394d15bfd23a
SHA1d701f3039465207d4e34001662282d5fb2efea1d
SHA256d84587dbad17838b6fcc04db45e084cb0a0741ba9facb56c2518c5fddca384c4
SHA512020a431f07c79701f04f182edf2249c4850ee04858b145c69a8b5962be5a443d682d5f685f66857e8a8f0000a133571505f0946f5e76c429809091a1d5aaeb3e