Malware Analysis Report

2024-12-01 02:55

Sample ID 241108-n6v4hssanc
Target rIMGCY46473567583458675867864894698467458.exe
SHA256 c9388e1b5951abc41c9c01323d6b09f2349f0235df638fc57b7e17ef29cc837b
Tags
remcos lonewolf collection discovery persistence rat spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

c9388e1b5951abc41c9c01323d6b09f2349f0235df638fc57b7e17ef29cc837b

Threat Level: Known bad

The file rIMGCY46473567583458675867864894698467458.exe was found to be: Known bad.

Malicious Activity Summary

remcos lonewolf collection discovery persistence rat spyware stealer

Remcos family

Remcos

NirSoft WebBrowserPassView

NirSoft MailPassView

Detected Nirsoft tools

Loads dropped DLL

Reads user/profile data of web browsers

Adds Run key to start application

Accesses Microsoft Outlook accounts

Drops file in System32 directory

Suspicious use of SetThreadContext

Suspicious use of NtSetInformationThreadHideFromDebugger

Suspicious use of NtCreateThreadExHideFromDebugger

Drops file in Windows directory

Program crash

System Location Discovery: System Language Discovery

Enumerates physical storage devices

Unsigned PE

NSIS installer

Suspicious behavior: MapViewOfSection

Suspicious use of AdjustPrivilegeToken

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-08 12:01

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

NSIS installer

installer
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-08 12:01

Reported

2024-11-08 12:03

Platform

win10v2004-20241007-en

Max time kernel

147s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe"

Signatures

Remcos

rat remcos

Remcos family

remcos

Detected Nirsoft tools

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

NirSoft MailPassView

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

NirSoft WebBrowserPassView

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Reads user/profile data of web browsers

spyware stealer

Accesses Microsoft Outlook accounts

collection
Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Startup key = "C:\\Users\\Admin\\AppData\\Local\\Temp\\subfolder1\\Geoginas.exe" C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\genbrugsflaske\tidsglose.ini C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe N/A

Suspicious use of NtCreateThreadExHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe N/A

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\Catallactic.sep C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe N/A
File opened for modification C:\Windows\resources\concento\Vedkend.Sei205 C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 904 wrote to memory of 4424 N/A C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe
PID 904 wrote to memory of 4424 N/A C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe
PID 904 wrote to memory of 4424 N/A C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe
PID 904 wrote to memory of 4424 N/A C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe
PID 904 wrote to memory of 4424 N/A C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe
PID 4424 wrote to memory of 4400 N/A C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe
PID 4424 wrote to memory of 4400 N/A C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe
PID 4424 wrote to memory of 4400 N/A C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe
PID 4424 wrote to memory of 4392 N/A C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe
PID 4424 wrote to memory of 4392 N/A C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe
PID 4424 wrote to memory of 4392 N/A C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe
PID 4424 wrote to memory of 3020 N/A C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe
PID 4424 wrote to memory of 3020 N/A C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe
PID 4424 wrote to memory of 3020 N/A C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe

Processes

C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe

"C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe"

C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe

"C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe"

C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe

C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe /stext "C:\Users\Admin\AppData\Local\Temp\wchttnaexmhxcpuwbpaavp"

C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe

C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe /stext "C:\Users\Admin\AppData\Local\Temp\ywmdufkyluzcnviikzmuycgrf"

C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe

C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe /stext "C:\Users\Admin\AppData\Local\Temp\jyswvyvazcrgpjembkhvjhaigwycg"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 75.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 evesecret.ma udp
GB 37.230.62.86:80 evesecret.ma tcp
US 8.8.8.8:53 212.20.149.52.in-addr.arpa udp
US 8.8.8.8:53 86.62.230.37.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 odumegwu.duckdns.org udp
UA 143.244.46.150:51525 odumegwu.duckdns.org tcp
UA 143.244.46.150:51525 odumegwu.duckdns.org tcp
US 8.8.8.8:53 geoplugin.net udp
NL 178.237.33.50:80 geoplugin.net tcp
US 8.8.8.8:53 150.46.244.143.in-addr.arpa udp
US 8.8.8.8:53 50.33.237.178.in-addr.arpa udp
US 8.8.8.8:53 102.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 29.243.111.52.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\nswBD66.tmp\System.dll

MD5 12b140583e3273ee1f65016becea58c4
SHA1 92df24d11797fefd2e1f8d29be9dfd67c56c1ada
SHA256 014f1dfeb842cf7265a3644bc6903c592abe9049bfc7396829172d3d72c4d042
SHA512 49ffdfa1941361430b6acb3555fd3aa05e4120f28cbdf7ceaa2af5937d0b8cccd84471cf63f06f97cf203b4aa20f226bdad082e9421b8e6b62ab6e1e9fc1e68a

C:\Users\Admin\AppData\Local\Temp\nsaBAC5.tmp

MD5 16d513397f3c1f8334e8f3e4fc49828f
SHA1 4ee15afca81ca6a13af4e38240099b730d6931f0
SHA256 d3c781a1855c8a70f5aca88d9e2c92afffa80541334731f62caa9494aa8a0c36
SHA512 4a350b790fdd2fe957e9ab48d5969b217ab19fc7f93f3774f1121a5f140ff9a9eaaa8fa30e06a9ef40ad776e698c2e65a05323c3adf84271da1716e75f5183c3

C:\Users\Admin\AppData\Local\Temp\nsmBD77.tmp

MD5 9b198a2aaf063ff060bb24b6fa5bb5df
SHA1 90b3670750dba26a0a1015b9403232ab9d4dd07e
SHA256 714144b6001dc56c1d3286dfd64909ca592a11aec7fdab9d290397d5393ab8f6
SHA512 840d6d9f4db234e94aefb8b82a0ae406a22aba078ace2199d61a21d7e06190c44a38e2d5857f117de8b2019d90d382d1ce4f17204925951374f34d47fd99b1f7

C:\Users\Admin\AppData\Local\Temp\nscBF5C.tmp

MD5 8ce4b16b22b58894aa86c421e8759df3
SHA1 13fbd79c3d390e5d6585a21e11ff5ec1970cff0c
SHA256 8254c329a92850f6d539dd376f4816ee2764517da5e0235514af433164480d7a
SHA512 2af8a9104b3f64ed640d8c7e298d2d480f03a3610cbc2b33474321ec59024a48592ea8545e41e09d5d1108759df48ede0054f225df39d4f0f312450e0aa9dd25

C:\Users\Admin\AppData\Local\Temp\nscBF5C.tmp

MD5 25bc6654798eb508fa0b6343212a74fe
SHA1 15d5e1d3b948fd5986aaff7d9419b5e52c75fc93
SHA256 8e5202705183bd3a20a29e224499b0f77a8273ee33cd93cca71043c57ad4bdfc
SHA512 5868c6241ed3cfcc5c34bfe42e4b9f5c69e74975e524771d8c9f35cafc13fd01cd943ec4d8caefee79a1f4a457e69d20b7a86f88db83a5bc3e6bd8a619972898

C:\Users\Admin\AppData\Local\Temp\nscBF5C.tmp

MD5 4e27f2226785e9abbe046fc592668860
SHA1 28b18a7f383131df509f7191f946a32c5a2e410c
SHA256 01a219245e1501fee01ce0baea8f6065ce5162cea12fa570689a07c9717be81d
SHA512 2a23585835bdb5db8175cab265566042282841efdcee8aaba8b9b5d466b0f165c0c5973033ce94bb9a8f07a956689247981ea07ac5a51408263e1653d9710adb

C:\Users\Admin\AppData\Local\Temp\nscBF5C.tmp

MD5 cde63b34c142af0a38cbe83791c964f8
SHA1 ece2b194b486118b40ad12c1f0e9425dd0672424
SHA256 65e2d70166c9a802b7ad2a87129b8945f083e5f268878790a9d1f1c03f47938d
SHA512 0559d3d34ad64ccc27e685431c24fc6ead0f645db14fa0e125a64fb67dbd158c15432c1fc5407811aac8a3486090dfbcfcbc3c6bf5aa0ec73f979ef62d14853c

C:\Users\Admin\AppData\Local\Temp\nscBF5C.tmp

MD5 e2fecc970546c3418917879fe354826c
SHA1 63f1c1dd01b87704a6b6c99fd9f141e0a3064f16
SHA256 ff91566d755f5d038ae698a2cc0a7d4d14e5273afafc37b6f03afda163768fa0
SHA512 3c4a68cbaee94f986515f43305a0e7620c14c30213d4a17db4a3e8a1b996764eb688bf733f472fc52073c2c80bb5229bb29411d7601aefe1c4370e230c341a0a

C:\Users\Admin\AppData\Local\Temp\nscBF5C.tmp

MD5 50484c19f1afdaf3841a0d821ed393d2
SHA1 c65a0fb7e74ffd2c9fc3a0f9aacb0f6a24b0a68b
SHA256 6923dd1bc0460082c5d55a831908c24a282860b7f1cd6c2b79cf1bc8857c639c
SHA512 d51a20d67571fe70bcd6c36e1382a3c342f42671c710090b75fcfc2405ce24488e03a7131eefe4751d0bd3aeaad816605ad10c8e3258d72fcf379e32416cbf3b

C:\Users\Admin\AppData\Local\Temp\nscBF5C.tmp

MD5 67cfa7364c4cf265b047d87ff2e673ae
SHA1 56e27889277981a9b63fcf5b218744a125bbc2fa
SHA256 639b68bd180b47d542dd001d03557ee2d5b3065c3c783143bc9fb548f3fd7713
SHA512 17f28a136b20b89e9c3a418b08fd8e6fcaac960872dc33b2481af2d872efc44228f420759c57724f5d953c7ba98f2283e2acc7dfe5a58cbf719c6480ec7a648b

C:\Users\Admin\AppData\Local\Temp\nscBF5C.tmp

MD5 c3cb69218b85c3260387fb582cb518dd
SHA1 961c892ded09a4cbb5392097bb845ccba65902ad
SHA256 1c329924865741e0222d3ead23072cfbed14f96e2b0432573068eb0640513101
SHA512 2402fffeb89c531db742bf6f5466eee8fe13edf97b8ecfc2cace3522806b322924d1ca81dda25e59b4047b8f40ad11ae9216e0a0d5c7fc6beef4368eb9551422

C:\Users\Admin\AppData\Local\Temp\nsdC180.tmp

MD5 2b3884fe02299c565e1c37ee7ef99293
SHA1 d8e2ef2a52083f6df210109fea53860ea227af9c
SHA256 ae789a65914ed002efb82dad89e5a4d4b9ec8e7faae30d0ed6e3c0d20f7d3858
SHA512 aeb9374a52d0ad99336bfd4ec7bb7c5437b827845b8784d9c21f7d96a931693604689f6adc3ca25fad132a0ad6123013211ff550f427fa86e4f26c122ac6a0fe

C:\Users\Admin\AppData\Local\Temp\nsdC180.tmp

MD5 9a53fc1d7126c5e7c81bb5c15b15537b
SHA1 e2d13e0fa37de4c98f30c728210d6afafbb2b000
SHA256 a7de06c22e4e67908840ec3f00ab8fe9e04ae94fb16a74136002afbaf607ff92
SHA512 b0bffbb8072dbdcfc68f0e632f727c08fe3ef936b2ef332c08486553ff2cef7b0bcdb400e421a117e977bb0fac17ce4706a8097e32d558a918433646b6d5f1a1

memory/904-569-0x0000000077A31000-0x0000000077B51000-memory.dmp

memory/904-570-0x0000000074715000-0x0000000074716000-memory.dmp

memory/4424-571-0x0000000077AB8000-0x0000000077AB9000-memory.dmp

memory/4424-572-0x0000000077A31000-0x0000000077B51000-memory.dmp

memory/4424-575-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-579-0x0000000077A31000-0x0000000077B51000-memory.dmp

memory/4424-580-0x0000000000483000-0x0000000000484000-memory.dmp

memory/4424-581-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-582-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-583-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-584-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-585-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-587-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-588-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-589-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4400-591-0x0000000000400000-0x0000000000478000-memory.dmp

memory/4400-592-0x0000000000400000-0x0000000000478000-memory.dmp

memory/3020-598-0x0000000000400000-0x0000000000424000-memory.dmp

memory/3020-605-0x0000000000400000-0x0000000000424000-memory.dmp

memory/4392-604-0x0000000000400000-0x0000000000462000-memory.dmp

memory/3020-600-0x0000000000400000-0x0000000000424000-memory.dmp

memory/3020-599-0x0000000000400000-0x0000000000424000-memory.dmp

memory/4424-597-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4392-596-0x0000000000400000-0x0000000000462000-memory.dmp

memory/4392-595-0x0000000000400000-0x0000000000462000-memory.dmp

memory/4400-594-0x0000000000400000-0x0000000000478000-memory.dmp

memory/4392-593-0x0000000000400000-0x0000000000462000-memory.dmp

memory/4400-609-0x0000000000400000-0x0000000000478000-memory.dmp

memory/4424-610-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-617-0x00000000360C0000-0x00000000360D9000-memory.dmp

memory/4424-616-0x00000000360C0000-0x00000000360D9000-memory.dmp

memory/4424-613-0x00000000360C0000-0x00000000360D9000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\wchttnaexmhxcpuwbpaavp

MD5 75379d3dcbcea6a69bc75b884816dd40
SHA1 7e073a03c3bdbbc60375ddbe56bba211c3d412a6
SHA256 cab559f3bbe4a0beb194dffca723b3072184b92687100462eaab04d66fff8de9
SHA512 710c2cee369a57a0039fc0d0c59de6118780210ef60ad0daf374f03ba94ab08039bc2aff821f7c99a0ecd0e16189c52e5b6d630b3d541f7b11375f134b985e8c

memory/4424-618-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-620-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-621-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-622-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-624-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-625-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-626-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-627-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-628-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-629-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-630-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-631-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-632-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-633-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-635-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-636-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-637-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-638-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-640-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-642-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-643-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-644-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-645-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-646-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-647-0x0000000000450000-0x00000000016A4000-memory.dmp

C:\ProgramData\remcos\logs.dat

MD5 fcbdfb650bc4ef9e27788a4be25ed88b
SHA1 e5f54cf54799c2c5a9381142b2ce04bdc03271bf
SHA256 3d346d7dbdf3ac3322723f4f7c1c5610530e9e404b372550fe9823ee03c4d01f
SHA512 da633bc1a0e2bbb19df7d24df9a2daef6680aaaaf3aff43c8a4ba08460e27e9e7d843b00622118390e46953a2627faf02d291383f4de11a0a662bcfd96c78d12

memory/4424-649-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-651-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-652-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-653-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-654-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-655-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-656-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-657-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-658-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-659-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-660-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-661-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-662-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-663-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-666-0x0000000077A31000-0x0000000077B51000-memory.dmp

memory/4424-669-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-670-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-672-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-673-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-674-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-676-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-678-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-679-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-680-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-681-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-682-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-683-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-684-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-685-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-686-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-687-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-688-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-689-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-690-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-691-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-693-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-695-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-696-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-697-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-698-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-699-0x0000000000450000-0x00000000016A4000-memory.dmp

memory/4424-700-0x0000000000450000-0x00000000016A4000-memory.dmp

Analysis: behavioral3

Detonation Overview

Submitted

2024-11-08 12:01

Reported

2024-11-08 12:03

Platform

win7-20240903-en

Max time kernel

117s

Max time network

120s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1868 -s 220

Network

N/A

Files

N/A

Analysis: behavioral4

Detonation Overview

Submitted

2024-11-08 12:01

Reported

2024-11-08 12:03

Platform

win10v2004-20241007-en

Max time kernel

92s

Max time network

140s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 228 wrote to memory of 2004 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 228 wrote to memory of 2004 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 228 wrote to memory of 2004 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2004 -ip 2004

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2004 -s 612

Network

Country Destination Domain Proto
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 138.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 197.87.175.4.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 28.117.19.2.in-addr.arpa udp
US 8.8.8.8:53 104.209.201.84.in-addr.arpa udp

Files

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-08 12:01

Reported

2024-11-08 12:03

Platform

win7-20240903-en

Max time kernel

119s

Max time network

121s

Command Line

"C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe"

Signatures

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\genbrugsflaske\tidsglose.ini C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\Catallactic.sep C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe N/A
File opened for modification C:\Windows\resources\concento\Vedkend.Sei205 C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe

"C:\Users\Admin\AppData\Local\Temp\rIMGCY46473567583458675867864894698467458.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2068 -s 536

Network

N/A

Files

\Users\Admin\AppData\Local\Temp\nsjD951.tmp\System.dll

MD5 12b140583e3273ee1f65016becea58c4
SHA1 92df24d11797fefd2e1f8d29be9dfd67c56c1ada
SHA256 014f1dfeb842cf7265a3644bc6903c592abe9049bfc7396829172d3d72c4d042
SHA512 49ffdfa1941361430b6acb3555fd3aa05e4120f28cbdf7ceaa2af5937d0b8cccd84471cf63f06f97cf203b4aa20f226bdad082e9421b8e6b62ab6e1e9fc1e68a

C:\Users\Admin\AppData\Local\Temp\nsjDB75.tmp

MD5 8ce4b16b22b58894aa86c421e8759df3
SHA1 13fbd79c3d390e5d6585a21e11ff5ec1970cff0c
SHA256 8254c329a92850f6d539dd376f4816ee2764517da5e0235514af433164480d7a
SHA512 2af8a9104b3f64ed640d8c7e298d2d480f03a3610cbc2b33474321ec59024a48592ea8545e41e09d5d1108759df48ede0054f225df39d4f0f312450e0aa9dd25

C:\Users\Admin\AppData\Local\Temp\nsjDB75.tmp

MD5 25bc6654798eb508fa0b6343212a74fe
SHA1 15d5e1d3b948fd5986aaff7d9419b5e52c75fc93
SHA256 8e5202705183bd3a20a29e224499b0f77a8273ee33cd93cca71043c57ad4bdfc
SHA512 5868c6241ed3cfcc5c34bfe42e4b9f5c69e74975e524771d8c9f35cafc13fd01cd943ec4d8caefee79a1f4a457e69d20b7a86f88db83a5bc3e6bd8a619972898

C:\Users\Admin\AppData\Local\Temp\nsjDB75.tmp

MD5 4e27f2226785e9abbe046fc592668860
SHA1 28b18a7f383131df509f7191f946a32c5a2e410c
SHA256 01a219245e1501fee01ce0baea8f6065ce5162cea12fa570689a07c9717be81d
SHA512 2a23585835bdb5db8175cab265566042282841efdcee8aaba8b9b5d466b0f165c0c5973033ce94bb9a8f07a956689247981ea07ac5a51408263e1653d9710adb

C:\Users\Admin\AppData\Local\Temp\nsjDB75.tmp

MD5 cde63b34c142af0a38cbe83791c964f8
SHA1 ece2b194b486118b40ad12c1f0e9425dd0672424
SHA256 65e2d70166c9a802b7ad2a87129b8945f083e5f268878790a9d1f1c03f47938d
SHA512 0559d3d34ad64ccc27e685431c24fc6ead0f645db14fa0e125a64fb67dbd158c15432c1fc5407811aac8a3486090dfbcfcbc3c6bf5aa0ec73f979ef62d14853c

C:\Users\Admin\AppData\Local\Temp\nsjDB75.tmp

MD5 e2fecc970546c3418917879fe354826c
SHA1 63f1c1dd01b87704a6b6c99fd9f141e0a3064f16
SHA256 ff91566d755f5d038ae698a2cc0a7d4d14e5273afafc37b6f03afda163768fa0
SHA512 3c4a68cbaee94f986515f43305a0e7620c14c30213d4a17db4a3e8a1b996764eb688bf733f472fc52073c2c80bb5229bb29411d7601aefe1c4370e230c341a0a

C:\Users\Admin\AppData\Local\Temp\nsjDB75.tmp

MD5 50484c19f1afdaf3841a0d821ed393d2
SHA1 c65a0fb7e74ffd2c9fc3a0f9aacb0f6a24b0a68b
SHA256 6923dd1bc0460082c5d55a831908c24a282860b7f1cd6c2b79cf1bc8857c639c
SHA512 d51a20d67571fe70bcd6c36e1382a3c342f42671c710090b75fcfc2405ce24488e03a7131eefe4751d0bd3aeaad816605ad10c8e3258d72fcf379e32416cbf3b

C:\Users\Admin\AppData\Local\Temp\nsjDB75.tmp

MD5 67cfa7364c4cf265b047d87ff2e673ae
SHA1 56e27889277981a9b63fcf5b218744a125bbc2fa
SHA256 639b68bd180b47d542dd001d03557ee2d5b3065c3c783143bc9fb548f3fd7713
SHA512 17f28a136b20b89e9c3a418b08fd8e6fcaac960872dc33b2481af2d872efc44228f420759c57724f5d953c7ba98f2283e2acc7dfe5a58cbf719c6480ec7a648b

C:\Users\Admin\AppData\Local\Temp\nsjDB75.tmp

MD5 c3cb69218b85c3260387fb582cb518dd
SHA1 961c892ded09a4cbb5392097bb845ccba65902ad
SHA256 1c329924865741e0222d3ead23072cfbed14f96e2b0432573068eb0640513101
SHA512 2402fffeb89c531db742bf6f5466eee8fe13edf97b8ecfc2cace3522806b322924d1ca81dda25e59b4047b8f40ad11ae9216e0a0d5c7fc6beef4368eb9551422

C:\Users\Admin\AppData\Local\Temp\nsjDB75.tmp

MD5 2b3884fe02299c565e1c37ee7ef99293
SHA1 d8e2ef2a52083f6df210109fea53860ea227af9c
SHA256 ae789a65914ed002efb82dad89e5a4d4b9ec8e7faae30d0ed6e3c0d20f7d3858
SHA512 aeb9374a52d0ad99336bfd4ec7bb7c5437b827845b8784d9c21f7d96a931693604689f6adc3ca25fad132a0ad6123013211ff550f427fa86e4f26c122ac6a0fe

C:\Users\Admin\AppData\Local\Temp\nsjDB75.tmp

MD5 9a53fc1d7126c5e7c81bb5c15b15537b
SHA1 e2d13e0fa37de4c98f30c728210d6afafbb2b000
SHA256 a7de06c22e4e67908840ec3f00ab8fe9e04ae94fb16a74136002afbaf607ff92
SHA512 b0bffbb8072dbdcfc68f0e632f727c08fe3ef936b2ef332c08486553ff2cef7b0bcdb400e421a117e977bb0fac17ce4706a8097e32d558a918433646b6d5f1a1