Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 02:46
Static task
static1
Behavioral task
behavioral1
Sample
3B84DCE82113710E5AE3F379EBD9FA13.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
3B84DCE82113710E5AE3F379EBD9FA13.exe
Resource
win10v2004-20241007-en
General
-
Target
3B84DCE82113710E5AE3F379EBD9FA13.exe
-
Size
1.1MB
-
MD5
3b84dce82113710e5ae3f379ebd9fa13
-
SHA1
26df2f5f9ba223ce4848586582172c9c20516416
-
SHA256
b25e19cd5dc45047c4ad68fbe940dd1f923800201666adf9164ec5fe5d74f6e4
-
SHA512
299ed1e965189ff3d25bd6e12790d93648c0d69959eeab8d5d7c4563c3488764eadf968855782d50d68c98d67a6a63be80828367ec704a102c407ebd7a2fa871
-
SSDEEP
24576:wHeZDOyc0wCqMXY1nhtFUSU6xNP1cQYY:wHbLm4ftFzx7c
Malware Config
Extracted
remcos
RemoteHost
45.149.241.204:435
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-DX92V7
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Detected Nirsoft tools 3 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral1/memory/2292-47-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral1/memory/1800-49-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral1/memory/1436-46-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/2292-47-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral1/memory/1436-46-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2776 powershell.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts 3B84DCE82113710E5AE3F379EBD9FA13.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2108 set thread context of 2572 2108 3B84DCE82113710E5AE3F379EBD9FA13.exe 35 PID 2572 set thread context of 1436 2572 3B84DCE82113710E5AE3F379EBD9FA13.exe 36 PID 2572 set thread context of 2292 2572 3B84DCE82113710E5AE3F379EBD9FA13.exe 38 PID 2572 set thread context of 1800 2572 3B84DCE82113710E5AE3F379EBD9FA13.exe 39 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3B84DCE82113710E5AE3F379EBD9FA13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3B84DCE82113710E5AE3F379EBD9FA13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3B84DCE82113710E5AE3F379EBD9FA13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3B84DCE82113710E5AE3F379EBD9FA13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3B84DCE82113710E5AE3F379EBD9FA13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2924 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2776 powershell.exe 1436 3B84DCE82113710E5AE3F379EBD9FA13.exe 1436 3B84DCE82113710E5AE3F379EBD9FA13.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 2572 3B84DCE82113710E5AE3F379EBD9FA13.exe 2572 3B84DCE82113710E5AE3F379EBD9FA13.exe 2572 3B84DCE82113710E5AE3F379EBD9FA13.exe 2572 3B84DCE82113710E5AE3F379EBD9FA13.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2776 powershell.exe Token: SeDebugPrivilege 1800 3B84DCE82113710E5AE3F379EBD9FA13.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2776 2108 3B84DCE82113710E5AE3F379EBD9FA13.exe 31 PID 2108 wrote to memory of 2776 2108 3B84DCE82113710E5AE3F379EBD9FA13.exe 31 PID 2108 wrote to memory of 2776 2108 3B84DCE82113710E5AE3F379EBD9FA13.exe 31 PID 2108 wrote to memory of 2776 2108 3B84DCE82113710E5AE3F379EBD9FA13.exe 31 PID 2108 wrote to memory of 2924 2108 3B84DCE82113710E5AE3F379EBD9FA13.exe 33 PID 2108 wrote to memory of 2924 2108 3B84DCE82113710E5AE3F379EBD9FA13.exe 33 PID 2108 wrote to memory of 2924 2108 3B84DCE82113710E5AE3F379EBD9FA13.exe 33 PID 2108 wrote to memory of 2924 2108 3B84DCE82113710E5AE3F379EBD9FA13.exe 33 PID 2108 wrote to memory of 2572 2108 3B84DCE82113710E5AE3F379EBD9FA13.exe 35 PID 2108 wrote to memory of 2572 2108 3B84DCE82113710E5AE3F379EBD9FA13.exe 35 PID 2108 wrote to memory of 2572 2108 3B84DCE82113710E5AE3F379EBD9FA13.exe 35 PID 2108 wrote to memory of 2572 2108 3B84DCE82113710E5AE3F379EBD9FA13.exe 35 PID 2108 wrote to memory of 2572 2108 3B84DCE82113710E5AE3F379EBD9FA13.exe 35 PID 2108 wrote to memory of 2572 2108 3B84DCE82113710E5AE3F379EBD9FA13.exe 35 PID 2108 wrote to memory of 2572 2108 3B84DCE82113710E5AE3F379EBD9FA13.exe 35 PID 2108 wrote to memory of 2572 2108 3B84DCE82113710E5AE3F379EBD9FA13.exe 35 PID 2108 wrote to memory of 2572 2108 3B84DCE82113710E5AE3F379EBD9FA13.exe 35 PID 2108 wrote to memory of 2572 2108 3B84DCE82113710E5AE3F379EBD9FA13.exe 35 PID 2108 wrote to memory of 2572 2108 3B84DCE82113710E5AE3F379EBD9FA13.exe 35 PID 2572 wrote to memory of 1436 2572 3B84DCE82113710E5AE3F379EBD9FA13.exe 36 PID 2572 wrote to memory of 1436 2572 3B84DCE82113710E5AE3F379EBD9FA13.exe 36 PID 2572 wrote to memory of 1436 2572 3B84DCE82113710E5AE3F379EBD9FA13.exe 36 PID 2572 wrote to memory of 1436 2572 3B84DCE82113710E5AE3F379EBD9FA13.exe 36 PID 2572 wrote to memory of 1436 2572 3B84DCE82113710E5AE3F379EBD9FA13.exe 36 PID 2572 wrote to memory of 2604 2572 3B84DCE82113710E5AE3F379EBD9FA13.exe 37 PID 2572 wrote to memory of 2604 2572 3B84DCE82113710E5AE3F379EBD9FA13.exe 37 PID 2572 wrote to memory of 2604 2572 3B84DCE82113710E5AE3F379EBD9FA13.exe 37 PID 2572 wrote to memory of 2604 2572 3B84DCE82113710E5AE3F379EBD9FA13.exe 37 PID 2572 wrote to memory of 2292 2572 3B84DCE82113710E5AE3F379EBD9FA13.exe 38 PID 2572 wrote to memory of 2292 2572 3B84DCE82113710E5AE3F379EBD9FA13.exe 38 PID 2572 wrote to memory of 2292 2572 3B84DCE82113710E5AE3F379EBD9FA13.exe 38 PID 2572 wrote to memory of 2292 2572 3B84DCE82113710E5AE3F379EBD9FA13.exe 38 PID 2572 wrote to memory of 2292 2572 3B84DCE82113710E5AE3F379EBD9FA13.exe 38 PID 2572 wrote to memory of 1800 2572 3B84DCE82113710E5AE3F379EBD9FA13.exe 39 PID 2572 wrote to memory of 1800 2572 3B84DCE82113710E5AE3F379EBD9FA13.exe 39 PID 2572 wrote to memory of 1800 2572 3B84DCE82113710E5AE3F379EBD9FA13.exe 39 PID 2572 wrote to memory of 1800 2572 3B84DCE82113710E5AE3F379EBD9FA13.exe 39 PID 2572 wrote to memory of 1800 2572 3B84DCE82113710E5AE3F379EBD9FA13.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\3B84DCE82113710E5AE3F379EBD9FA13.exe"C:\Users\Admin\AppData\Local\Temp\3B84DCE82113710E5AE3F379EBD9FA13.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\OZIxXQGIP.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OZIxXQGIP" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7B19.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2924
-
-
C:\Users\Admin\AppData\Local\Temp\3B84DCE82113710E5AE3F379EBD9FA13.exe"C:\Users\Admin\AppData\Local\Temp\3B84DCE82113710E5AE3F379EBD9FA13.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\3B84DCE82113710E5AE3F379EBD9FA13.exeC:\Users\Admin\AppData\Local\Temp\3B84DCE82113710E5AE3F379EBD9FA13.exe /stext "C:\Users\Admin\AppData\Local\Temp\qxeaveiyhbmqeiosapzwbrscghpbi"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1436
-
-
C:\Users\Admin\AppData\Local\Temp\3B84DCE82113710E5AE3F379EBD9FA13.exeC:\Users\Admin\AppData\Local\Temp\3B84DCE82113710E5AE3F379EBD9FA13.exe /stext "C:\Users\Admin\AppData\Local\Temp\brjtvxssukevhpcwkslpeenlhogkbiip"3⤵PID:2604
-
-
C:\Users\Admin\AppData\Local\Temp\3B84DCE82113710E5AE3F379EBD9FA13.exeC:\Users\Admin\AppData\Local\Temp\3B84DCE82113710E5AE3F379EBD9FA13.exe /stext "C:\Users\Admin\AppData\Local\Temp\brjtvxssukevhpcwkslpeenlhogkbiip"3⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:2292
-
-
C:\Users\Admin\AppData\Local\Temp\3B84DCE82113710E5AE3F379EBD9FA13.exeC:\Users\Admin\AppData\Local\Temp\3B84DCE82113710E5AE3F379EBD9FA13.exe /stext "C:\Users\Admin\AppData\Local\Temp\llpew"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1800
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
1KB
MD52e4117bd9c9d3dffd390918ca00f454f
SHA1eac3c179f8737111043438ab07bcc07d58fc2eea
SHA256bc97bf4cb6021a63b797550caf53855470540c6d2342240d71010bfc60e1c4d6
SHA512a5d42fb5c3c7e9476633df416b9f401bbf289cfb8da275a2568dee14ee57f2bdcca230dddad7abb59ab89d21fd801d3153ee4feba7a1bae7731b4ddc98df4a06