Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2025, 15:40
Static task
static1
Behavioral task
behavioral1
Sample
plugmancrypted.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
plugmancrypted.exe
Resource
win10v2004-20241007-en
General
-
Target
plugmancrypted.exe
-
Size
1.1MB
-
MD5
8e9211eea2ba6f1b345b696b10f9518a
-
SHA1
0d2cb42cee5bc56d6a6fab077e950fefd0af9c43
-
SHA256
11a4eadb74837d9fdc0f052302016abed805674c458529523101ced2ccaf4346
-
SHA512
c263aa2bbdd5394eab6d62a8f54ada0f3565ab154cbe754012f92580f5a5f24d347b938810986eaf160d4dc27726ab3b0104aba3ee7b87c0fea6f547c79c349f
-
SSDEEP
24576:gMaSSKy2/SPNZOgqiaanW8I3lwVvPIVVR+8hV:gRQuOgqiauSwVOVR+0
Malware Config
Extracted
remcos
RemoteHost
www.kposlifestyle.design:2404
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
edefdefffff
-
mouse_option
false
-
mutex
Rmc-OH1QS4
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Detected Nirsoft tools 9 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral2/memory/4064-35-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/4064-38-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/1700-37-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral2/memory/3948-36-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral2/memory/1700-43-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral2/memory/4064-42-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/3948-31-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral2/memory/1700-32-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral2/memory/3948-45-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft -
NirSoft MailPassView 3 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/1700-37-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView behavioral2/memory/1700-43-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView behavioral2/memory/1700-32-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 3 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/3948-36-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView behavioral2/memory/3948-31-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView behavioral2/memory/3948-45-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts plugmancrypted.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1736 set thread context of 1720 1736 plugmancrypted.exe 84 PID 1720 set thread context of 3948 1720 plugmancrypted.exe 85 PID 1720 set thread context of 1700 1720 plugmancrypted.exe 86 PID 1720 set thread context of 4064 1720 plugmancrypted.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plugmancrypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plugmancrypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plugmancrypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plugmancrypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plugmancrypted.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3948 plugmancrypted.exe 3948 plugmancrypted.exe 4064 plugmancrypted.exe 4064 plugmancrypted.exe 3948 plugmancrypted.exe 3948 plugmancrypted.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 1720 plugmancrypted.exe 1720 plugmancrypted.exe 1720 plugmancrypted.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4064 plugmancrypted.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1720 plugmancrypted.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1736 wrote to memory of 1720 1736 plugmancrypted.exe 84 PID 1736 wrote to memory of 1720 1736 plugmancrypted.exe 84 PID 1736 wrote to memory of 1720 1736 plugmancrypted.exe 84 PID 1736 wrote to memory of 1720 1736 plugmancrypted.exe 84 PID 1736 wrote to memory of 1720 1736 plugmancrypted.exe 84 PID 1736 wrote to memory of 1720 1736 plugmancrypted.exe 84 PID 1736 wrote to memory of 1720 1736 plugmancrypted.exe 84 PID 1736 wrote to memory of 1720 1736 plugmancrypted.exe 84 PID 1736 wrote to memory of 1720 1736 plugmancrypted.exe 84 PID 1736 wrote to memory of 1720 1736 plugmancrypted.exe 84 PID 1720 wrote to memory of 3948 1720 plugmancrypted.exe 85 PID 1720 wrote to memory of 3948 1720 plugmancrypted.exe 85 PID 1720 wrote to memory of 3948 1720 plugmancrypted.exe 85 PID 1720 wrote to memory of 3948 1720 plugmancrypted.exe 85 PID 1720 wrote to memory of 1700 1720 plugmancrypted.exe 86 PID 1720 wrote to memory of 1700 1720 plugmancrypted.exe 86 PID 1720 wrote to memory of 1700 1720 plugmancrypted.exe 86 PID 1720 wrote to memory of 1700 1720 plugmancrypted.exe 86 PID 1720 wrote to memory of 4064 1720 plugmancrypted.exe 87 PID 1720 wrote to memory of 4064 1720 plugmancrypted.exe 87 PID 1720 wrote to memory of 4064 1720 plugmancrypted.exe 87 PID 1720 wrote to memory of 4064 1720 plugmancrypted.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\plugmancrypted.exe"C:\Users\Admin\AppData\Local\Temp\plugmancrypted.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\plugmancrypted.exe"C:\Users\Admin\AppData\Local\Temp\plugmancrypted.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\plugmancrypted.exeC:\Users\Admin\AppData\Local\Temp\plugmancrypted.exe /stext "C:\Users\Admin\AppData\Local\Temp\zcancstwbbdhxsgojnhgoatcfiixs"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3948
-
-
C:\Users\Admin\AppData\Local\Temp\plugmancrypted.exeC:\Users\Admin\AppData\Local\Temp\plugmancrypted.exe /stext "C:\Users\Admin\AppData\Local\Temp\cwffuldxpjvmhyusayuizfotnoagusns"3⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:1700
-
-
C:\Users\Admin\AppData\Local\Temp\plugmancrypted.exeC:\Users\Admin\AppData\Local\Temp\plugmancrypted.exe /stext "C:\Users\Admin\AppData\Local\Temp\mykyv"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4064
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124B
MD54532df9776d42161a4762348546181a9
SHA1ef981df9b99b142a584c2d5b0f8f9496913693a2
SHA25674af5f8a5e4f5380ecf9968946a0169691f7e29f89416c1b916da7f71d0e81b1
SHA512f726b642f48b95b980ed5810c10a83c2e4b5e585d1d67ccadbca10719ea5e213e8abde9347de74800790bc1aece3442e67f9f31181c6c16f33b201ccba5440b1
-
Filesize
4KB
MD57aca43b2800ceb18b3ed2326532545de
SHA1d4cf207ef85bd749d59c1cb27a09c167ee21523a
SHA2563d9f8622d97587fd84d3d0560a50ab38e5f894fe4b5bcaa34279643fdaaeb480
SHA5120e002e6b8d965c227d9b1aa7c0251619c787ec7717e59667e756e5815e3666a955ea397eb148a1ed6bb7d8045727e4efa656a103f14bc70a03b03f0c91283c2f