Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 03:45
Static task
static1
Behavioral task
behavioral1
Sample
PDA ORDER.exe
Resource
win7-20240729-en
General
-
Target
PDA ORDER.exe
-
Size
423KB
-
MD5
d516c57c54c6c65ff050e16e871e71e2
-
SHA1
4ca54d94edec79b304a6b4d85e7d5d0dc87407ac
-
SHA256
74615bedcd52ff089b0ed9dede11c46cd27de39b0b52c309ad71175e79e53868
-
SHA512
e7125e5bc1ec11ab6c2961ca1aecb22de09e194bfad31d0309815522706580aff9acbfaac309aef0a4f4d8de0811e8bd9444ca46d6bd2838f54d1ba84764eddb
-
SSDEEP
6144:IHbY645rq7qbvKZKgOxJY+zzqArh0VuWPzvgY+u3j+B8wsOcBtSoA:gtQTbCKDRaOhGzvdxT+BVsOcD
Malware Config
Extracted
asyncrat
0.5.7B
Default
127.0.0.1:2510
194.5.98.81:2510
AsyncMutex_6SI8OkPnk
-
delay
20
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
Extracted
remcos
1.7 Pro
Host
194.5.98.81:7123
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
mstsc.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
remcos_lfqwkauxufogluh
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Asyncrat family
-
Remcos family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x00090000000175ae-23.dat family_asyncrat -
Executes dropped EXE 4 IoCs
pid Process 1156 Ab.exe 2996 BB.exe 2380 mstsc.exe 3008 svchost.exe -
Loads dropped DLL 6 IoCs
pid Process 2024 PDA ORDER.exe 2024 PDA ORDER.exe 2024 PDA ORDER.exe 2176 cmd.exe 2176 cmd.exe 1952 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\mstsc.exe\"" mstsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\mstsc.exe\"" BB.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2684 set thread context of 2024 2684 PDA ORDER.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PDA ORDER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PDA ORDER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2664 PING.EXE -
Delays execution with timeout.exe 1 IoCs
pid Process 1596 timeout.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2664 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2096 schtasks.exe 2200 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2684 PDA ORDER.exe 1156 Ab.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2684 PDA ORDER.exe Token: SeDebugPrivilege 1156 Ab.exe Token: SeDebugPrivilege 3008 svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2024 PDA ORDER.exe 2380 mstsc.exe -
Suspicious use of WriteProcessMemory 55 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2096 2684 PDA ORDER.exe 30 PID 2684 wrote to memory of 2096 2684 PDA ORDER.exe 30 PID 2684 wrote to memory of 2096 2684 PDA ORDER.exe 30 PID 2684 wrote to memory of 2096 2684 PDA ORDER.exe 30 PID 2684 wrote to memory of 2024 2684 PDA ORDER.exe 32 PID 2684 wrote to memory of 2024 2684 PDA ORDER.exe 32 PID 2684 wrote to memory of 2024 2684 PDA ORDER.exe 32 PID 2684 wrote to memory of 2024 2684 PDA ORDER.exe 32 PID 2684 wrote to memory of 2024 2684 PDA ORDER.exe 32 PID 2684 wrote to memory of 2024 2684 PDA ORDER.exe 32 PID 2684 wrote to memory of 2024 2684 PDA ORDER.exe 32 PID 2684 wrote to memory of 2024 2684 PDA ORDER.exe 32 PID 2024 wrote to memory of 1156 2024 PDA ORDER.exe 33 PID 2024 wrote to memory of 1156 2024 PDA ORDER.exe 33 PID 2024 wrote to memory of 1156 2024 PDA ORDER.exe 33 PID 2024 wrote to memory of 1156 2024 PDA ORDER.exe 33 PID 2024 wrote to memory of 2996 2024 PDA ORDER.exe 34 PID 2024 wrote to memory of 2996 2024 PDA ORDER.exe 34 PID 2024 wrote to memory of 2996 2024 PDA ORDER.exe 34 PID 2024 wrote to memory of 2996 2024 PDA ORDER.exe 34 PID 2996 wrote to memory of 2176 2996 BB.exe 35 PID 2996 wrote to memory of 2176 2996 BB.exe 35 PID 2996 wrote to memory of 2176 2996 BB.exe 35 PID 2996 wrote to memory of 2176 2996 BB.exe 35 PID 2996 wrote to memory of 2176 2996 BB.exe 35 PID 2996 wrote to memory of 2176 2996 BB.exe 35 PID 2996 wrote to memory of 2176 2996 BB.exe 35 PID 2176 wrote to memory of 2664 2176 cmd.exe 37 PID 2176 wrote to memory of 2664 2176 cmd.exe 37 PID 2176 wrote to memory of 2664 2176 cmd.exe 37 PID 2176 wrote to memory of 2664 2176 cmd.exe 37 PID 2176 wrote to memory of 2380 2176 cmd.exe 38 PID 2176 wrote to memory of 2380 2176 cmd.exe 38 PID 2176 wrote to memory of 2380 2176 cmd.exe 38 PID 2176 wrote to memory of 2380 2176 cmd.exe 38 PID 1156 wrote to memory of 2236 1156 Ab.exe 39 PID 1156 wrote to memory of 2236 1156 Ab.exe 39 PID 1156 wrote to memory of 2236 1156 Ab.exe 39 PID 1156 wrote to memory of 2236 1156 Ab.exe 39 PID 1156 wrote to memory of 1952 1156 Ab.exe 41 PID 1156 wrote to memory of 1952 1156 Ab.exe 41 PID 1156 wrote to memory of 1952 1156 Ab.exe 41 PID 1156 wrote to memory of 1952 1156 Ab.exe 41 PID 2236 wrote to memory of 2200 2236 cmd.exe 43 PID 2236 wrote to memory of 2200 2236 cmd.exe 43 PID 2236 wrote to memory of 2200 2236 cmd.exe 43 PID 2236 wrote to memory of 2200 2236 cmd.exe 43 PID 1952 wrote to memory of 1596 1952 cmd.exe 44 PID 1952 wrote to memory of 1596 1952 cmd.exe 44 PID 1952 wrote to memory of 1596 1952 cmd.exe 44 PID 1952 wrote to memory of 1596 1952 cmd.exe 44 PID 1952 wrote to memory of 3008 1952 cmd.exe 45 PID 1952 wrote to memory of 3008 1952 cmd.exe 45 PID 1952 wrote to memory of 3008 1952 cmd.exe 45 PID 1952 wrote to memory of 3008 1952 cmd.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\PDA ORDER.exe"C:\Users\Admin\AppData\Local\Temp\PDA ORDER.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KHkWwNhPvyrETo" /XML "C:\Users\Admin\AppData\Local\Temp\tmpAE97.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2096
-
-
C:\Users\Admin\AppData\Local\Temp\PDA ORDER.exe"{path}"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\Ab.exe"C:\Users\Admin\AppData\Local\Temp\Ab.exe" 03⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2200
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp223.tmp.bat""4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\timeout.exetimeout 35⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1596
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3008
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\BB.exe"C:\Users\Admin\AppData\Local\Temp\BB.exe" 03⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\PING.EXEPING 127.0.0.1 -n 25⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2664
-
-
C:\Users\Admin\AppData\Roaming\remcos\mstsc.exe"C:\Users\Admin\AppData\Roaming\remcos\mstsc.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2380
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98B
MD521bed91c3634ab147523bae86d71dc53
SHA10f81c75e634f83e300d33949bf48fb7e010d5480
SHA256546eb97ad40e82000816ea08efeb65db8d17ab61e95bfb4b1df2bd8c33392968
SHA512f4cd493bc9cba90d62efe5cf487c11679e05791797ff730a3cb168fe8a5a947c9965c2b71f378a70b805d1ef3e60834773eabba4fc82fe75d4c0a526ea04a38a
-
Filesize
150B
MD5b576936419c80fca9b6662b7ad5f84cc
SHA1515c3fcc89470964d31a10e08c5c478da5418793
SHA256f21c7e7c34f90c19c438e2da83ba1bb0aab2e3ecd67380f18b6d70a3f74847c0
SHA512c9419f7afd86695a1771e57cf96a3f73c7f7e280cb4f9a725463a0702e306193b793100ad85c8a54dce7821f6730aeac0453540287e1ebb5c70d89f2867f01dc
-
Filesize
1KB
MD5258c39637a441843cdadb5064e76c6eb
SHA166598498b552dda7baa0301b7efd8bb89c641688
SHA2564996817548281b43c89477dd5c7fb0466128ab2252994ce95d8e05004ba876fd
SHA512eb22b5c2d3972457019e0defe1a456fdf7579cd7f4ac6d6f21b57dd01e488143a460dae9e8ef3323baed168990dce1e835278db57d508959f8a36bea1f80f819
-
Filesize
45KB
MD5855075698e4f11e8089f881c4b0237f8
SHA1972785092ec9ba946fa90ad50198bc6f7bf5b234
SHA256ab63fbbedf5b5ad5be373fb11ee84284efca4a58f6a34e0c3d6b885c16a81fbe
SHA51275ce9e53f0e187b0f841d3ee6ee7c17621f9242177b971631c956b061c86447bfac949274bf1fe9d5e42f32e206cca5d837cfa1288cba57e6a2a93bc429d98ef
-
Filesize
92KB
MD5c8b3a05b20c5bdc2909cd4ec7e8509f3
SHA14797b824d0729d77b7d949e69819c36fa0bc0c15
SHA2561d99246378ccf15778bd36cc3d85b09a6e53581c4cff5f441cc520dfb99896df
SHA512307026de17c046cdd0ab56d869ba193e649e4459334b4d095c1e6274a7541f7b1c25c53de7e72139aaffde3a75e9243c91dfa3bd1d55183015d0abdf2e3e06cd