Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2024 00:07
Static task
static1
Behavioral task
behavioral1
Sample
Awb_Tracking_App_original_invoice_bl_packinglist_shipment_29_09_2024_00000000000000000000.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Awb_Tracking_App_original_invoice_bl_packinglist_shipment_29_09_2024_00000000000000000000.exe
Resource
win10v2004-20240910-en
Behavioral task
behavioral3
Sample
Dumperfrernes/Multiversities.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Dumperfrernes/Multiversities.ps1
Resource
win10v2004-20240802-en
General
-
Target
Awb_Tracking_App_original_invoice_bl_packinglist_shipment_29_09_2024_00000000000000000000.exe
-
Size
637KB
-
MD5
ff4eb87d1d1b7be863e3d3ebacabd016
-
SHA1
d87f89c5bcc66d4861b8d4654cac9b5f50dda1d4
-
SHA256
c427e3abb88e7f09b05e5bdf03a1b7e4a8dd938d22d310556f12f2a54d880da0
-
SHA512
53ea12baf38f793011bdb026cbfda1c510b199e8a137537d82449939426c1b4748764bf050fff61aca89760d398f783a63a6c5478464584014e66fd8083ab558
-
SSDEEP
12288:zNiR660vPkyuY/J/ptZA9h7z13KXGWj4XXdN6+:xu0Hkg/lLSlrWj4Xn6+
Malware Config
Extracted
remcos
GIMMEWEALTH
janbours92harbu03.duckdns.org:3980
janbours92harbu04.duckdns.org:3981
janbours92harbu007.duckdns.org:3981
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-DZYYYQ
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Detected Nirsoft tools 3 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral2/memory/100-95-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral2/memory/3948-91-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/1940-89-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/100-95-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/1940-89-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2516 powershell.exe -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts msiexec.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Hyperventilate = "%Appet% -windowstyle 1 $kravls=(gp -Path 'HKCU:\\Software\\Hreapparater\\').Logaritmes;%Appet% ($kravls)" reg.exe -
Blocklisted process makes network request 7 IoCs
flow pid Process 37 5100 msiexec.exe 39 5100 msiexec.exe 41 5100 msiexec.exe 52 5100 msiexec.exe 55 5100 msiexec.exe 58 5100 msiexec.exe 60 5100 msiexec.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 5100 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2516 powershell.exe 5100 msiexec.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 5100 set thread context of 1940 5100 msiexec.exe 105 PID 5100 set thread context of 100 5100 msiexec.exe 107 PID 5100 set thread context of 3948 5100 msiexec.exe 108 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Fonts\Lysestagers\ulvernnen.ini Awb_Tracking_App_original_invoice_bl_packinglist_shipment_29_09_2024_00000000000000000000.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Awb_Tracking_App_original_invoice_bl_packinglist_shipment_29_09_2024_00000000000000000000.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1144 reg.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 2516 powershell.exe 2516 powershell.exe 2516 powershell.exe 2516 powershell.exe 2516 powershell.exe 2516 powershell.exe 2516 powershell.exe 2516 powershell.exe 2516 powershell.exe 1940 msiexec.exe 1940 msiexec.exe 3948 msiexec.exe 3948 msiexec.exe 1940 msiexec.exe 1940 msiexec.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2516 powershell.exe 2516 powershell.exe 5100 msiexec.exe 5100 msiexec.exe 5100 msiexec.exe 5100 msiexec.exe 5100 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 2516 powershell.exe Token: SeIncreaseQuotaPrivilege 2516 powershell.exe Token: SeSecurityPrivilege 2516 powershell.exe Token: SeTakeOwnershipPrivilege 2516 powershell.exe Token: SeLoadDriverPrivilege 2516 powershell.exe Token: SeSystemProfilePrivilege 2516 powershell.exe Token: SeSystemtimePrivilege 2516 powershell.exe Token: SeProfSingleProcessPrivilege 2516 powershell.exe Token: SeIncBasePriorityPrivilege 2516 powershell.exe Token: SeCreatePagefilePrivilege 2516 powershell.exe Token: SeBackupPrivilege 2516 powershell.exe Token: SeRestorePrivilege 2516 powershell.exe Token: SeShutdownPrivilege 2516 powershell.exe Token: SeDebugPrivilege 2516 powershell.exe Token: SeSystemEnvironmentPrivilege 2516 powershell.exe Token: SeRemoteShutdownPrivilege 2516 powershell.exe Token: SeUndockPrivilege 2516 powershell.exe Token: SeManageVolumePrivilege 2516 powershell.exe Token: 33 2516 powershell.exe Token: 34 2516 powershell.exe Token: 35 2516 powershell.exe Token: 36 2516 powershell.exe Token: SeDebugPrivilege 3948 msiexec.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5100 msiexec.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 1696 wrote to memory of 2516 1696 Awb_Tracking_App_original_invoice_bl_packinglist_shipment_29_09_2024_00000000000000000000.exe 89 PID 1696 wrote to memory of 2516 1696 Awb_Tracking_App_original_invoice_bl_packinglist_shipment_29_09_2024_00000000000000000000.exe 89 PID 1696 wrote to memory of 2516 1696 Awb_Tracking_App_original_invoice_bl_packinglist_shipment_29_09_2024_00000000000000000000.exe 89 PID 2516 wrote to memory of 1172 2516 powershell.exe 96 PID 2516 wrote to memory of 1172 2516 powershell.exe 96 PID 2516 wrote to memory of 1172 2516 powershell.exe 96 PID 2516 wrote to memory of 5100 2516 powershell.exe 97 PID 2516 wrote to memory of 5100 2516 powershell.exe 97 PID 2516 wrote to memory of 5100 2516 powershell.exe 97 PID 2516 wrote to memory of 5100 2516 powershell.exe 97 PID 5100 wrote to memory of 2096 5100 msiexec.exe 99 PID 5100 wrote to memory of 2096 5100 msiexec.exe 99 PID 5100 wrote to memory of 2096 5100 msiexec.exe 99 PID 2096 wrote to memory of 1144 2096 cmd.exe 101 PID 2096 wrote to memory of 1144 2096 cmd.exe 101 PID 2096 wrote to memory of 1144 2096 cmd.exe 101 PID 5100 wrote to memory of 684 5100 msiexec.exe 104 PID 5100 wrote to memory of 684 5100 msiexec.exe 104 PID 5100 wrote to memory of 684 5100 msiexec.exe 104 PID 5100 wrote to memory of 1940 5100 msiexec.exe 105 PID 5100 wrote to memory of 1940 5100 msiexec.exe 105 PID 5100 wrote to memory of 1940 5100 msiexec.exe 105 PID 5100 wrote to memory of 1940 5100 msiexec.exe 105 PID 5100 wrote to memory of 832 5100 msiexec.exe 106 PID 5100 wrote to memory of 832 5100 msiexec.exe 106 PID 5100 wrote to memory of 832 5100 msiexec.exe 106 PID 5100 wrote to memory of 100 5100 msiexec.exe 107 PID 5100 wrote to memory of 100 5100 msiexec.exe 107 PID 5100 wrote to memory of 100 5100 msiexec.exe 107 PID 5100 wrote to memory of 100 5100 msiexec.exe 107 PID 5100 wrote to memory of 3948 5100 msiexec.exe 108 PID 5100 wrote to memory of 3948 5100 msiexec.exe 108 PID 5100 wrote to memory of 3948 5100 msiexec.exe 108 PID 5100 wrote to memory of 3948 5100 msiexec.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\Awb_Tracking_App_original_invoice_bl_packinglist_shipment_29_09_2024_00000000000000000000.exe"C:\Users\Admin\AppData\Local\Temp\Awb_Tracking_App_original_invoice_bl_packinglist_shipment_29_09_2024_00000000000000000000.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Nonrealizations=Get-Content -Raw 'C:\Users\Admin\AppData\Local\Temp\disconformity\workbench\perinephria\Dumperfrernes\Multiversities.Bek';$Shrite=$Nonrealizations.SubString(2892,3);.$Shrite($Nonrealizations) "2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\syswow64\msiexec.exe"3⤵PID:1172
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\syswow64\msiexec.exe"3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Hyperventilate" /t REG_EXPAND_SZ /d "%Appet% -windowstyle 1 $kravls=(gp -Path 'HKCU:\Software\Hreapparater\').Logaritmes;%Appet% ($kravls)"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Hyperventilate" /t REG_EXPAND_SZ /d "%Appet% -windowstyle 1 $kravls=(gp -Path 'HKCU:\Software\Hreapparater\').Logaritmes;%Appet% ($kravls)"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1144
-
-
-
C:\Windows\SysWOW64\msiexec.exeC:\Windows\SysWOW64\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\tlzoyqkvkhts"4⤵PID:684
-
-
C:\Windows\SysWOW64\msiexec.exeC:\Windows\SysWOW64\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\tlzoyqkvkhts"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1940
-
-
C:\Windows\SysWOW64\msiexec.exeC:\Windows\SysWOW64\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\efezrivxgplxynbz"4⤵PID:832
-
-
C:\Windows\SysWOW64\msiexec.exeC:\Windows\SysWOW64\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\efezrivxgplxynbz"4⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:100
-
-
C:\Windows\SysWOW64\msiexec.exeC:\Windows\SysWOW64\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\ohkrrbgrtxdbjtpdxam"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3948
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
300KB
MD5eb9b1277f694813afcb20aa13bcf666c
SHA1d83e252bc07bac01cb559df7f00269dce16e1990
SHA2563b8d733962acda0bbffe82d282398eed4be9870256712db02be7e2ea55ca2dcc
SHA5120bc9dcfe1338aa9bc2d5733d8076bb6b0fe4181479502059ed153c2400ff253ac81eb0982e9fcb969b8f50d38dafd440570eb310362bdd7098f6fd4f625627b5
-
C:\Users\Admin\AppData\Local\Temp\disconformity\workbench\perinephria\Dumperfrernes\Multiversities.Bek
Filesize52KB
MD59f75d1ca6c6a219e26ceea78a6f6b218
SHA1688f14dea57c5989cdb6b29d2d2f5d6a07a460ef
SHA256203ef2d3c9984cadb87801dc09f084acf7d6f078855ba6300c6e2da79d3a23e9
SHA512a337e7288f0ed129ae27357914af9af67080835c2b15cc1000566b39f3a30756b2d9e17c910429ecdda936a0e91608ceffa75725e4f5ef3efb1bf9e6b5b6666e
-
Filesize
4KB
MD505d209dc2e52f4877b0210319d699d7c
SHA1f80b9ea3164019831fa0b5cffc864c0d496a002b
SHA256278f3fd9076c23dc3d397375c5f586aa23b15c9e42b22139748e20f70f127160
SHA512701f72884bf941ec3e60f6f8bb98c26743447c276de2d15ca27a406ccc6a39dafeef9a6f83264d52ebb93923af738fa7b16f617fb33dc54e5a7ed93b188aee9a