Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 02:19
Static task
static1
Behavioral task
behavioral1
Sample
9d64923557fd189c8f045db5f7ebdf23ca6afe0ed48d4b5a9f9398548ef848f8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9d64923557fd189c8f045db5f7ebdf23ca6afe0ed48d4b5a9f9398548ef848f8.exe
Resource
win10v2004-20241007-en
General
-
Target
9d64923557fd189c8f045db5f7ebdf23ca6afe0ed48d4b5a9f9398548ef848f8.exe
-
Size
1.2MB
-
MD5
71a5c22358684ea0359d9e20c12cbfd0
-
SHA1
904946890793b72889b04a8d85d7427cbb374ede
-
SHA256
9d64923557fd189c8f045db5f7ebdf23ca6afe0ed48d4b5a9f9398548ef848f8
-
SHA512
e5cdfeabc6b857d68df3a3f730ebb998f74e8d528ee90e96965dcb08590350da1e5f5c3f25cc012ce836517b415120038ac728b3c5327c48f101af7f17655dd2
-
SSDEEP
24576:veZnxqTKr6Suh2q1R+1ixZdZm5efPMM6+D1gH3R:veZaKuEAXd7UM6cUR
Malware Config
Extracted
remcos
chika dibia
185.150.191.117:4609
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-QGLBE0
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Detected Nirsoft tools 7 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral2/memory/3492-98-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/3492-97-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/4068-94-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral2/memory/4068-93-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral2/memory/4068-87-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral2/memory/4972-85-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral2/memory/4972-102-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft -
NirSoft MailPassView 3 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/4068-94-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView behavioral2/memory/4068-93-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView behavioral2/memory/4068-87-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 2 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/4972-85-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView behavioral2/memory/4972-102-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation lftebevgelserne.exe -
Executes dropped EXE 3 IoCs
pid Process 4972 lftebevgelserne.exe 4068 lftebevgelserne.exe 3492 lftebevgelserne.exe -
Loads dropped DLL 1 IoCs
pid Process 2304 lftebevgelserne.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts lftebevgelserne.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Startup key = "%Wende% -windowstyle 1 $Pertline=(gp -Path 'HKCU:\\Software\\Platanus\\').Grundtankerne;%Wende% ($Pertline)" reg.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2304 lftebevgelserne.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1668 powershell.exe 2304 lftebevgelserne.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2304 set thread context of 4972 2304 lftebevgelserne.exe 101 PID 2304 set thread context of 4068 2304 lftebevgelserne.exe 102 PID 2304 set thread context of 3492 2304 lftebevgelserne.exe 103 -
pid Process 1668 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lftebevgelserne.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9d64923557fd189c8f045db5f7ebdf23ca6afe0ed48d4b5a9f9398548ef848f8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lftebevgelserne.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lftebevgelserne.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lftebevgelserne.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4356 reg.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 1668 powershell.exe 1668 powershell.exe 1668 powershell.exe 1668 powershell.exe 1668 powershell.exe 1668 powershell.exe 1668 powershell.exe 1668 powershell.exe 1668 powershell.exe 4972 lftebevgelserne.exe 4972 lftebevgelserne.exe 3492 lftebevgelserne.exe 3492 lftebevgelserne.exe 4972 lftebevgelserne.exe 4972 lftebevgelserne.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 1668 powershell.exe 2304 lftebevgelserne.exe 2304 lftebevgelserne.exe 2304 lftebevgelserne.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 1668 powershell.exe Token: SeIncreaseQuotaPrivilege 1668 powershell.exe Token: SeSecurityPrivilege 1668 powershell.exe Token: SeTakeOwnershipPrivilege 1668 powershell.exe Token: SeLoadDriverPrivilege 1668 powershell.exe Token: SeSystemProfilePrivilege 1668 powershell.exe Token: SeSystemtimePrivilege 1668 powershell.exe Token: SeProfSingleProcessPrivilege 1668 powershell.exe Token: SeIncBasePriorityPrivilege 1668 powershell.exe Token: SeCreatePagefilePrivilege 1668 powershell.exe Token: SeBackupPrivilege 1668 powershell.exe Token: SeRestorePrivilege 1668 powershell.exe Token: SeShutdownPrivilege 1668 powershell.exe Token: SeDebugPrivilege 1668 powershell.exe Token: SeSystemEnvironmentPrivilege 1668 powershell.exe Token: SeRemoteShutdownPrivilege 1668 powershell.exe Token: SeUndockPrivilege 1668 powershell.exe Token: SeManageVolumePrivilege 1668 powershell.exe Token: 33 1668 powershell.exe Token: 34 1668 powershell.exe Token: 35 1668 powershell.exe Token: 36 1668 powershell.exe Token: SeDebugPrivilege 3492 lftebevgelserne.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 4164 wrote to memory of 1668 4164 9d64923557fd189c8f045db5f7ebdf23ca6afe0ed48d4b5a9f9398548ef848f8.exe 87 PID 4164 wrote to memory of 1668 4164 9d64923557fd189c8f045db5f7ebdf23ca6afe0ed48d4b5a9f9398548ef848f8.exe 87 PID 4164 wrote to memory of 1668 4164 9d64923557fd189c8f045db5f7ebdf23ca6afe0ed48d4b5a9f9398548ef848f8.exe 87 PID 1668 wrote to memory of 2304 1668 powershell.exe 96 PID 1668 wrote to memory of 2304 1668 powershell.exe 96 PID 1668 wrote to memory of 2304 1668 powershell.exe 96 PID 1668 wrote to memory of 2304 1668 powershell.exe 96 PID 2304 wrote to memory of 4608 2304 lftebevgelserne.exe 97 PID 2304 wrote to memory of 4608 2304 lftebevgelserne.exe 97 PID 2304 wrote to memory of 4608 2304 lftebevgelserne.exe 97 PID 4608 wrote to memory of 4356 4608 cmd.exe 99 PID 4608 wrote to memory of 4356 4608 cmd.exe 99 PID 4608 wrote to memory of 4356 4608 cmd.exe 99 PID 2304 wrote to memory of 4972 2304 lftebevgelserne.exe 101 PID 2304 wrote to memory of 4972 2304 lftebevgelserne.exe 101 PID 2304 wrote to memory of 4972 2304 lftebevgelserne.exe 101 PID 2304 wrote to memory of 4068 2304 lftebevgelserne.exe 102 PID 2304 wrote to memory of 4068 2304 lftebevgelserne.exe 102 PID 2304 wrote to memory of 4068 2304 lftebevgelserne.exe 102 PID 2304 wrote to memory of 3492 2304 lftebevgelserne.exe 103 PID 2304 wrote to memory of 3492 2304 lftebevgelserne.exe 103 PID 2304 wrote to memory of 3492 2304 lftebevgelserne.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d64923557fd189c8f045db5f7ebdf23ca6afe0ed48d4b5a9f9398548ef848f8.exe"C:\Users\Admin\AppData\Local\Temp\9d64923557fd189c8f045db5f7ebdf23ca6afe0ed48d4b5a9f9398548ef848f8.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle minimized "$Ketonizes=Get-Content -Raw 'C:\Users\Admin\AppData\Roaming\thrombopenia\Udansk.man';$Stomapod=$Ketonizes.SubString(11239,3);.$Stomapod($Ketonizes)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\lftebevgelserne.exe"C:\Users\Admin\AppData\Local\Temp\lftebevgelserne.exe"3⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Wende% -windowstyle 1 $Pertline=(gp -Path 'HKCU:\Software\Platanus\').Grundtankerne;%Wende% ($Pertline)"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Wende% -windowstyle 1 $Pertline=(gp -Path 'HKCU:\Software\Platanus\').Grundtankerne;%Wende% ($Pertline)"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4356
-
-
-
C:\Users\Admin\AppData\Local\Temp\lftebevgelserne.exeC:\Users\Admin\AppData\Local\Temp\lftebevgelserne.exe /stext "C:\Users\Admin\AppData\Local\Temp\ohcbbapmxkcmuipjbkilpxipwmr"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4972
-
-
C:\Users\Admin\AppData\Local\Temp\lftebevgelserne.exeC:\Users\Admin\AppData\Local\Temp\lftebevgelserne.exe /stext "C:\Users\Admin\AppData\Local\Temp\zbilcsagtsurwwlnkuvnakdgxsbgiu"4⤵
- Executes dropped EXE
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:4068
-
-
C:\Users\Admin\AppData\Local\Temp\lftebevgelserne.exeC:\Users\Admin\AppData\Local\Temp\lftebevgelserne.exe /stext "C:\Users\Admin\AppData\Local\Temp\jenedllihamwgcarbfiodpxpghshbfckr"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3492
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.2MB
MD571a5c22358684ea0359d9e20c12cbfd0
SHA1904946890793b72889b04a8d85d7427cbb374ede
SHA2569d64923557fd189c8f045db5f7ebdf23ca6afe0ed48d4b5a9f9398548ef848f8
SHA512e5cdfeabc6b857d68df3a3f730ebb998f74e8d528ee90e96965dcb08590350da1e5f5c3f25cc012ce836517b415120038ac728b3c5327c48f101af7f17655dd2
-
Filesize
4KB
MD575379d3dcbcea6a69bc75b884816dd40
SHA17e073a03c3bdbbc60375ddbe56bba211c3d412a6
SHA256cab559f3bbe4a0beb194dffca723b3072184b92687100462eaab04d66fff8de9
SHA512710c2cee369a57a0039fc0d0c59de6118780210ef60ad0daf374f03ba94ab08039bc2aff821f7c99a0ecd0e16189c52e5b6d630b3d541f7b11375f134b985e8c
-
Filesize
71KB
MD5e3e1008cc3249f7049dc4a7291632cb3
SHA140d972d10e48e71d9bc0d3f30f506f140f4e18fd
SHA256d80b3dd341fd5947ddbd3e38f671f2b264318399fe5acfccabeeac81981e242a
SHA512ce8f7261887890a61cea58420a3dfb33774f2750ca3e3c7b9c7f4f1eab232544e281b67c47984ba0c5e2f4315c9bfbf08274e0b7da4ccb50fc25588fec369158
-
Filesize
302KB
MD511237e18d598c8c55e562fad04345225
SHA10d2f512bd0dbe5ecdd236c1e4ccce4ebf8759de3
SHA25663bd68b6a2ff50d2761d83c78bdceea068b7a1fd25557111a5e54bafabb1b6b2
SHA512ba29cece8378d2ae7649866d236daf0890a423acd3c9b113d8fdf09461a4c54e26f2a490900e2f6ecc73fe9d8e6e4dc247e1e5a15e004b803684682843e906ad