Analysis
-
max time kernel
148s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-09-2024 09:44
Static task
static1
Behavioral task
behavioral1
Sample
PurchaseOrder.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PurchaseOrder.exe
Resource
win10v2004-20240802-en
General
-
Target
PurchaseOrder.exe
-
Size
902KB
-
MD5
171f8a0f5bba2ba4fab8d479c65f6651
-
SHA1
a7e8546d3b1dc9482e5800497eb482518efd4427
-
SHA256
cd76524a5a1a193336ce0a72efa54af99367743c2d380d0416a1d09a516fad8b
-
SHA512
3e113f1f1afd56c9ba8ae44f24480f89a60db7f62432cfbf9b77320747f48881ac81bfa692c18692a92906372de70bd8538eea4a88c253fa7f4a6b67d4b5915c
-
SSDEEP
24576:TlFCHP+tB+XNpYpKwiQgAG5FgfsmW1bp9xDe6:pFEtXopK1QVG0fUpT
Malware Config
Extracted
remcos
RemoteHost
127.0.0.1:59321
nnamoo.duckdns.org:59321
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-41EVS0
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2688 powershell.exe 3056 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1856 set thread context of 2616 1856 PurchaseOrder.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PurchaseOrder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 992 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1856 PurchaseOrder.exe 3056 powershell.exe 2688 powershell.exe 1856 PurchaseOrder.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1856 PurchaseOrder.exe Token: SeDebugPrivilege 3056 powershell.exe Token: SeDebugPrivilege 2688 powershell.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1856 wrote to memory of 2688 1856 PurchaseOrder.exe 31 PID 1856 wrote to memory of 2688 1856 PurchaseOrder.exe 31 PID 1856 wrote to memory of 2688 1856 PurchaseOrder.exe 31 PID 1856 wrote to memory of 2688 1856 PurchaseOrder.exe 31 PID 1856 wrote to memory of 3056 1856 PurchaseOrder.exe 33 PID 1856 wrote to memory of 3056 1856 PurchaseOrder.exe 33 PID 1856 wrote to memory of 3056 1856 PurchaseOrder.exe 33 PID 1856 wrote to memory of 3056 1856 PurchaseOrder.exe 33 PID 1856 wrote to memory of 992 1856 PurchaseOrder.exe 34 PID 1856 wrote to memory of 992 1856 PurchaseOrder.exe 34 PID 1856 wrote to memory of 992 1856 PurchaseOrder.exe 34 PID 1856 wrote to memory of 992 1856 PurchaseOrder.exe 34 PID 1856 wrote to memory of 2616 1856 PurchaseOrder.exe 37 PID 1856 wrote to memory of 2616 1856 PurchaseOrder.exe 37 PID 1856 wrote to memory of 2616 1856 PurchaseOrder.exe 37 PID 1856 wrote to memory of 2616 1856 PurchaseOrder.exe 37 PID 1856 wrote to memory of 2616 1856 PurchaseOrder.exe 37 PID 1856 wrote to memory of 2616 1856 PurchaseOrder.exe 37 PID 1856 wrote to memory of 2616 1856 PurchaseOrder.exe 37 PID 1856 wrote to memory of 2616 1856 PurchaseOrder.exe 37 PID 1856 wrote to memory of 2616 1856 PurchaseOrder.exe 37 PID 1856 wrote to memory of 2616 1856 PurchaseOrder.exe 37 PID 1856 wrote to memory of 2616 1856 PurchaseOrder.exe 37 PID 1856 wrote to memory of 2616 1856 PurchaseOrder.exe 37 PID 1856 wrote to memory of 2616 1856 PurchaseOrder.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\PurchaseOrder.exe"C:\Users\Admin\AppData\Local\Temp\PurchaseOrder.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\PurchaseOrder.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\YzFfWxw.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3056
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YzFfWxw" /XML "C:\Users\Admin\AppData\Local\Temp\tmpEE07.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:992
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD528433c5909bff634976413daec9ae8ca
SHA1aad7654939b0f6e57c71e11568ea7b2bebee989d
SHA256ecfd6622692919fbd62a08bd97248b605274ae19b110fca05b8863663c072238
SHA512ac4c0a53c0bcae7e3c6e558ea80424d9ead2dff0410f04ccbf73dbddcbcc069ee98ce3ab2950474b5de90889a60ee1c2162ec329dd7861d3529cd62ad47c42b1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\Z39W6PCJG77XAFGW751H.temp
Filesize7KB
MD51cd552ab1078850274ad59a244257087
SHA13ab19a7ccfe41b5c13552509916a03eb98d2395f
SHA256e8d8b83f2c6b53fe9668280a6db5ac4b7050a319c3c50bc767ed22324a2368e6
SHA5125cc7983687c13dee2efb8d09d99c522a88e883f6d04d73d10e531fee87e4490bfb17885ee6fcbfe94e0cdd7c97e5ce2906d6dba052c5621c4990ad845ee47ec8