Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-09-2024 14:29
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Purchase Order.exe
Resource
win10v2004-20240802-en
General
-
Target
Purchase Order.exe
-
Size
902KB
-
MD5
171f8a0f5bba2ba4fab8d479c65f6651
-
SHA1
a7e8546d3b1dc9482e5800497eb482518efd4427
-
SHA256
cd76524a5a1a193336ce0a72efa54af99367743c2d380d0416a1d09a516fad8b
-
SHA512
3e113f1f1afd56c9ba8ae44f24480f89a60db7f62432cfbf9b77320747f48881ac81bfa692c18692a92906372de70bd8538eea4a88c253fa7f4a6b67d4b5915c
-
SSDEEP
24576:TlFCHP+tB+XNpYpKwiQgAG5FgfsmW1bp9xDe6:pFEtXopK1QVG0fUpT
Malware Config
Extracted
remcos
RemoteHost
127.0.0.1:59321
nnamoo.duckdns.org:59321
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-41EVS0
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2060 powershell.exe 2320 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1928 set thread context of 2604 1928 Purchase Order.exe 39 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Purchase Order.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2720 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1928 Purchase Order.exe 2060 powershell.exe 2320 powershell.exe 1928 Purchase Order.exe 1928 Purchase Order.exe 1928 Purchase Order.exe 1928 Purchase Order.exe 1928 Purchase Order.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1928 Purchase Order.exe Token: SeDebugPrivilege 2060 powershell.exe Token: SeDebugPrivilege 2320 powershell.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1928 wrote to memory of 2060 1928 Purchase Order.exe 31 PID 1928 wrote to memory of 2060 1928 Purchase Order.exe 31 PID 1928 wrote to memory of 2060 1928 Purchase Order.exe 31 PID 1928 wrote to memory of 2060 1928 Purchase Order.exe 31 PID 1928 wrote to memory of 2320 1928 Purchase Order.exe 33 PID 1928 wrote to memory of 2320 1928 Purchase Order.exe 33 PID 1928 wrote to memory of 2320 1928 Purchase Order.exe 33 PID 1928 wrote to memory of 2320 1928 Purchase Order.exe 33 PID 1928 wrote to memory of 2720 1928 Purchase Order.exe 35 PID 1928 wrote to memory of 2720 1928 Purchase Order.exe 35 PID 1928 wrote to memory of 2720 1928 Purchase Order.exe 35 PID 1928 wrote to memory of 2720 1928 Purchase Order.exe 35 PID 1928 wrote to memory of 2796 1928 Purchase Order.exe 37 PID 1928 wrote to memory of 2796 1928 Purchase Order.exe 37 PID 1928 wrote to memory of 2796 1928 Purchase Order.exe 37 PID 1928 wrote to memory of 2796 1928 Purchase Order.exe 37 PID 1928 wrote to memory of 2932 1928 Purchase Order.exe 38 PID 1928 wrote to memory of 2932 1928 Purchase Order.exe 38 PID 1928 wrote to memory of 2932 1928 Purchase Order.exe 38 PID 1928 wrote to memory of 2932 1928 Purchase Order.exe 38 PID 1928 wrote to memory of 2604 1928 Purchase Order.exe 39 PID 1928 wrote to memory of 2604 1928 Purchase Order.exe 39 PID 1928 wrote to memory of 2604 1928 Purchase Order.exe 39 PID 1928 wrote to memory of 2604 1928 Purchase Order.exe 39 PID 1928 wrote to memory of 2604 1928 Purchase Order.exe 39 PID 1928 wrote to memory of 2604 1928 Purchase Order.exe 39 PID 1928 wrote to memory of 2604 1928 Purchase Order.exe 39 PID 1928 wrote to memory of 2604 1928 Purchase Order.exe 39 PID 1928 wrote to memory of 2604 1928 Purchase Order.exe 39 PID 1928 wrote to memory of 2604 1928 Purchase Order.exe 39 PID 1928 wrote to memory of 2604 1928 Purchase Order.exe 39 PID 1928 wrote to memory of 2604 1928 Purchase Order.exe 39 PID 1928 wrote to memory of 2604 1928 Purchase Order.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2060
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\YzFfWxw.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2320
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YzFfWxw" /XML "C:\Users\Admin\AppData\Local\Temp\tmp657.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2720
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:2796
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:2932
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c4fef8d1c9fca32ff04de17aebf0b2fa
SHA141dedb51a1061e57679d065742ac7b432399d80d
SHA2560a60fa85ed53927e9139b2b20b6588a796fac8a94e030e6f16aaecba335f26eb
SHA51225ca31e3ce513f5c8191b75fbc4a7ed2d471bc086b575db6f5507c67b990e16f593ead6a7d65938fb6ecae31b9656d0a7e259f7f3af9a90048102821c880135b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5c1a7db9737a829d6a9f03c83a1d38f1c
SHA11a2ed62ffb2aebbb5d2febe3e7208911ebea6544
SHA256dba2d774885805392996081738a0dfa215d2591e95025a026e773f4554f3e4b1
SHA512e40b4ca8194709bd342baa2de9dfa159df5e9183258f3bc31e63cc973bd1a36d253c58eaf1427aec11cd2a3d3772040174c42a333a5098328663813242ed111f