Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 09:20
Static task
static1
Behavioral task
behavioral1
Sample
DOCUMENT5885588081366766.pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
DOCUMENT5885588081366766.pdf.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Tredjelandes.ps1
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
Tredjelandes.ps1
Resource
win10v2004-20241007-en
General
-
Target
DOCUMENT5885588081366766.pdf.exe
-
Size
512KB
-
MD5
053184cbad166da8d6065e1fb934b964
-
SHA1
54fa68f4233ab168238ea71af23eec2436552a0b
-
SHA256
c877c021f20392b5c63533b4e59522f17d060d20341a47c76f24b7430c72ad54
-
SHA512
b6402e9b634cee834db92edfe02f39a77fecfef3ff2836605c2f1276424287e5559a34306a4d376ea999fe0850c27c45d3d16ce00a91d9a65f27ba04c3d6ea69
-
SSDEEP
12288:1BRxKL/cM4jJL3O80+E3DzGpiOZWWiawo9fv6MIfGYfmBBWMM:JwLkPjJLO6pilWva/fPmo
Malware Config
Extracted
remcos
WOW
eweo9264gtuiorta1.duckdns.org:2879
eweo9264gtuiorta1.duckdns.org:2889
surit2948estoat02.duckdns.org:2879
lafours8tursot2.duckdns.org:2879
lafours8tursot3.duckdns.org:2879
lafours8tursot4.duckdns.org:2879
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
hajoest.dat
-
keylog_flag
false
-
mouse_option
false
-
mutex
fsgthdjtru-5Y7T6I
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 1952 powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Overraekkelsen73 = "%Indstraaling164% -windowstyle 1 $Prioristic54=(gp -Path 'HKCU:\\Software\\storkors\\').Angili;%Indstraaling164% ($Prioristic54)" reg.exe -
Blocklisted process makes network request 7 IoCs
flow pid Process 22 4292 msiexec.exe 27 4292 msiexec.exe 31 4292 msiexec.exe 33 4292 msiexec.exe 37 4292 msiexec.exe 46 4292 msiexec.exe 48 4292 msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 21 drive.google.com 22 drive.google.com -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 4292 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1952 powershell.exe 4292 msiexec.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\resources\figursyedes.lnk DOCUMENT5885588081366766.pdf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DOCUMENT5885588081366766.pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2544 reg.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1952 powershell.exe 1952 powershell.exe 1952 powershell.exe 1952 powershell.exe 1952 powershell.exe 1952 powershell.exe 1952 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1952 powershell.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 1952 powershell.exe Token: SeIncreaseQuotaPrivilege 1952 powershell.exe Token: SeSecurityPrivilege 1952 powershell.exe Token: SeTakeOwnershipPrivilege 1952 powershell.exe Token: SeLoadDriverPrivilege 1952 powershell.exe Token: SeSystemProfilePrivilege 1952 powershell.exe Token: SeSystemtimePrivilege 1952 powershell.exe Token: SeProfSingleProcessPrivilege 1952 powershell.exe Token: SeIncBasePriorityPrivilege 1952 powershell.exe Token: SeCreatePagefilePrivilege 1952 powershell.exe Token: SeBackupPrivilege 1952 powershell.exe Token: SeRestorePrivilege 1952 powershell.exe Token: SeShutdownPrivilege 1952 powershell.exe Token: SeDebugPrivilege 1952 powershell.exe Token: SeSystemEnvironmentPrivilege 1952 powershell.exe Token: SeRemoteShutdownPrivilege 1952 powershell.exe Token: SeUndockPrivilege 1952 powershell.exe Token: SeManageVolumePrivilege 1952 powershell.exe Token: 33 1952 powershell.exe Token: 34 1952 powershell.exe Token: 35 1952 powershell.exe Token: 36 1952 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4292 msiexec.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4044 wrote to memory of 1952 4044 DOCUMENT5885588081366766.pdf.exe 83 PID 4044 wrote to memory of 1952 4044 DOCUMENT5885588081366766.pdf.exe 83 PID 4044 wrote to memory of 1952 4044 DOCUMENT5885588081366766.pdf.exe 83 PID 1952 wrote to memory of 4292 1952 powershell.exe 98 PID 1952 wrote to memory of 4292 1952 powershell.exe 98 PID 1952 wrote to memory of 4292 1952 powershell.exe 98 PID 1952 wrote to memory of 4292 1952 powershell.exe 98 PID 4292 wrote to memory of 1532 4292 msiexec.exe 101 PID 4292 wrote to memory of 1532 4292 msiexec.exe 101 PID 4292 wrote to memory of 1532 4292 msiexec.exe 101 PID 1532 wrote to memory of 2544 1532 cmd.exe 104 PID 1532 wrote to memory of 2544 1532 cmd.exe 104 PID 1532 wrote to memory of 2544 1532 cmd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\DOCUMENT5885588081366766.pdf.exe"C:\Users\Admin\AppData\Local\Temp\DOCUMENT5885588081366766.pdf.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden "$Effeminacies=Get-Content -raw 'C:\Users\Admin\AppData\Local\parkeringsforholdet\Irrational\Tredjelandes.Sel';$Gizeh4=$Effeminacies.SubString(2147,3);.$Gizeh4($Effeminacies)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Overraekkelsen73" /t REG_EXPAND_SZ /d "%Indstraaling164% -windowstyle 1 $Prioristic54=(gp -Path 'HKCU:\Software\storkors\').Angili;%Indstraaling164% ($Prioristic54)"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Overraekkelsen73" /t REG_EXPAND_SZ /d "%Indstraaling164% -windowstyle 1 $Prioristic54=(gp -Path 'HKCU:\Software\storkors\').Angili;%Indstraaling164% ($Prioristic54)"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2544
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
287KB
MD5f20bfd077f96d3b5f57cce52c6fa8ebe
SHA1b2bc4ec3384f6402687deb55c73c8bb904f8b7c4
SHA256c96b45939261aae0e7b2f439ff96ea7f8a188ceb9f8528cb3d274419cc7dfc91
SHA512a836d407668a815f890494d89d9a4d5bfc01896799a185471fb2939028955c61e03c932acc06af3418540ccd2521f160769d29ec5aea96c1b61e5164d9f47c59
-
Filesize
52KB
MD585edb7354ba656bbb556d21c8e68831c
SHA1e01c029026be5e5d7e17cdd191360d9bbd9d9e27
SHA256d9b3298dafafc8f85e167c0c739d94cf6671f017e1a0cf7e759ff6158b5921ed
SHA512b86b8ee9f4f0f0421074de62c439ef5cf63b441f44b95c9a1ca28b357c9fd52c85ba00af70e975f4e5aa4601829026ee2ebec143fb9357815e76635fdf3a28d5