Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
14-11-2024 06:57
Static task
static1
Behavioral task
behavioral1
Sample
POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe
Resource
win10v2004-20241007-en
General
-
Target
POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe
-
Size
920KB
-
MD5
837245dd0067f14b51b01c3ec2abd1e2
-
SHA1
050af9b128d86975c8afa6d62b1bedec0d6f20b0
-
SHA256
972d31f6bff6eed33197d77be4cf2027535bd64d42965c207c6e541257a4e112
-
SHA512
b0372c59246b7263fa213cf341af74aab174205d8ba6f06cfa18b92c16a8aed16b889fb2c37ffe27e1aa79f41c2a6be02e756dee6bad86d8ade27797d80a91c7
-
SSDEEP
24576:jMyQZrc+IbxyYMv5KXgoNV8LCZacnu4Z1aNR3:PQ9c+IFrnemod46d
Malware Config
Extracted
remcos
RemoteHost
172.245.123.14:2404
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-3DXQCZ
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
POSparepartsandlistoftheprodcutsURGENTSUPPLY.exedescription pid process target process PID 2900 set thread context of 2932 2900 POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
POSparepartsandlistoftheprodcutsURGENTSUPPLY.exepowershell.exeschtasks.exePOSparepartsandlistoftheprodcutsURGENTSUPPLY.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
POSparepartsandlistoftheprodcutsURGENTSUPPLY.exepowershell.exepid process 2900 POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe 2900 POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe 2900 POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe 2900 POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe 2816 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
POSparepartsandlistoftheprodcutsURGENTSUPPLY.exepowershell.exedescription pid process Token: SeDebugPrivilege 2900 POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe Token: SeDebugPrivilege 2816 powershell.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
POSparepartsandlistoftheprodcutsURGENTSUPPLY.exedescription pid process target process PID 2900 wrote to memory of 2816 2900 POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe powershell.exe PID 2900 wrote to memory of 2816 2900 POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe powershell.exe PID 2900 wrote to memory of 2816 2900 POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe powershell.exe PID 2900 wrote to memory of 2816 2900 POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe powershell.exe PID 2900 wrote to memory of 2792 2900 POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe schtasks.exe PID 2900 wrote to memory of 2792 2900 POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe schtasks.exe PID 2900 wrote to memory of 2792 2900 POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe schtasks.exe PID 2900 wrote to memory of 2792 2900 POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe schtasks.exe PID 2900 wrote to memory of 2812 2900 POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe PID 2900 wrote to memory of 2812 2900 POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe PID 2900 wrote to memory of 2812 2900 POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe PID 2900 wrote to memory of 2812 2900 POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe PID 2900 wrote to memory of 2932 2900 POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe PID 2900 wrote to memory of 2932 2900 POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe PID 2900 wrote to memory of 2932 2900 POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe PID 2900 wrote to memory of 2932 2900 POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe PID 2900 wrote to memory of 2932 2900 POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe PID 2900 wrote to memory of 2932 2900 POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe PID 2900 wrote to memory of 2932 2900 POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe PID 2900 wrote to memory of 2932 2900 POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe PID 2900 wrote to memory of 2932 2900 POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe PID 2900 wrote to memory of 2932 2900 POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe PID 2900 wrote to memory of 2932 2900 POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe"C:\Users\Admin\AppData\Local\Temp\POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ppcjCFk.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ppcjCFk" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB78C.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2792
-
-
C:\Users\Admin\AppData\Local\Temp\POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe"C:\Users\Admin\AppData\Local\Temp\POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe"2⤵PID:2812
-
-
C:\Users\Admin\AppData\Local\Temp\POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe"C:\Users\Admin\AppData\Local\Temp\POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a60e84ff344bdea796d96449f9757c17
SHA1e55efe9487c8908f85eee4ca619e6ba9dacb35d4
SHA25624920384ae77f5c31957b6cf3dfc57db0b12063c1959062268399a08d6dbd86e
SHA512cbc68a5bfc1894d8a857628732e24fed361a9919e6d5a3c7ba18185a60d5e35d56abcfb7aade2a19401e68c5324ae0a467a384bac5308fe8e0b6d72042ac819b