Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
09/02/2025, 04:10
Static task
static1
Behavioral task
behavioral1
Sample
ad7944585459312eceb71221e89b7018.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ad7944585459312eceb71221e89b7018.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral5
Sample
Norby.ps1
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Norby.ps1
Resource
win10v2004-20250207-en
General
-
Target
ad7944585459312eceb71221e89b7018.exe
-
Size
1.3MB
-
MD5
ad7944585459312eceb71221e89b7018
-
SHA1
74a633aeb8b7214cd035a9a767d6b8e7796e6886
-
SHA256
a3ab1ca451d4b020eea6ba2d62e987412bd3b09a4993ea803c8105e932274177
-
SHA512
f30d3446a95e7d7b927b27efd70f3be9f28177e0cabaa634d2cf440937578b8752152bad62b9876234fee964f2a9ed1cc76ca75153cf754a8156f49d53beed9e
-
SSDEEP
24576:/orvz2P1S4CcWArIu/YmM3LmTwoSXo9OvOJ2Vioy:ke5taMM3Lxoh9OAKioy
Malware Config
Extracted
remcos
Send
kavemarb99juyet1.duckdns.org:4688
kavemarb99juyet1.duckdns.org:4689
kavemarb99juyet2.duckdns.org:4688
kavemarb99juyet3.duckdns.org:4688
kavemarb99juyet4.duckdns.org:4688
kavemarb99juyet5.duckdns.org:4688
kavemarb99juyet6.duckdns.org:4688
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
osokwu.exe
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
alepoty.dat
-
keylog_flag
false
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
kijmnbytgs-Y92N9U
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 42 2932 Process not Found -
Loads dropped DLL 1 IoCs
pid Process 2192 ad7944585459312eceb71221e89b7018.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2573923862-3221519550-2669654151-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Mbelarkitekt = "%Boreformndenes% -windowstyle 1 $Frivrdiens=(gi 'HKCU:\\Software\\Stillingskrigenes\\').GetValue('Pettable');%Boreformndenes% ($Frivrdiens)" reg.exe -
Blocklisted process makes network request 5 IoCs
flow pid Process 38 2464 msiexec.exe 40 2464 msiexec.exe 48 2464 msiexec.exe 51 2464 msiexec.exe 53 2464 msiexec.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2464 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2372 powershell.exe 2464 msiexec.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\stormlbet.ini ad7944585459312eceb71221e89b7018.exe -
pid Process 2372 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad7944585459312eceb71221e89b7018.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4188 MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2372 powershell.exe 2372 powershell.exe 2372 powershell.exe 2372 powershell.exe 2372 powershell.exe 2372 powershell.exe 2372 powershell.exe 2372 powershell.exe 2372 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2372 powershell.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 2372 powershell.exe Token: SeIncreaseQuotaPrivilege 2372 powershell.exe Token: SeSecurityPrivilege 2372 powershell.exe Token: SeTakeOwnershipPrivilege 2372 powershell.exe Token: SeLoadDriverPrivilege 2372 powershell.exe Token: SeSystemProfilePrivilege 2372 powershell.exe Token: SeSystemtimePrivilege 2372 powershell.exe Token: SeProfSingleProcessPrivilege 2372 powershell.exe Token: SeIncBasePriorityPrivilege 2372 powershell.exe Token: SeCreatePagefilePrivilege 2372 powershell.exe Token: SeBackupPrivilege 2372 powershell.exe Token: SeRestorePrivilege 2372 powershell.exe Token: SeShutdownPrivilege 2372 powershell.exe Token: SeDebugPrivilege 2372 powershell.exe Token: SeSystemEnvironmentPrivilege 2372 powershell.exe Token: SeRemoteShutdownPrivilege 2372 powershell.exe Token: SeUndockPrivilege 2372 powershell.exe Token: SeManageVolumePrivilege 2372 powershell.exe Token: 33 2372 powershell.exe Token: 34 2372 powershell.exe Token: 35 2372 powershell.exe Token: 36 2372 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2464 msiexec.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2372 2192 ad7944585459312eceb71221e89b7018.exe 89 PID 2192 wrote to memory of 2372 2192 ad7944585459312eceb71221e89b7018.exe 89 PID 2192 wrote to memory of 2372 2192 ad7944585459312eceb71221e89b7018.exe 89 PID 2372 wrote to memory of 2464 2372 powershell.exe 92 PID 2372 wrote to memory of 2464 2372 powershell.exe 92 PID 2372 wrote to memory of 2464 2372 powershell.exe 92 PID 2372 wrote to memory of 2464 2372 powershell.exe 92 PID 2464 wrote to memory of 3604 2464 msiexec.exe 97 PID 2464 wrote to memory of 3604 2464 msiexec.exe 97 PID 2464 wrote to memory of 3604 2464 msiexec.exe 97 PID 3604 wrote to memory of 2180 3604 cmd.exe 99 PID 3604 wrote to memory of 2180 3604 cmd.exe 99 PID 3604 wrote to memory of 2180 3604 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad7944585459312eceb71221e89b7018.exe"C:\Users\Admin\AppData\Local\Temp\ad7944585459312eceb71221e89b7018.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle minimized "$Hospitalsbehandlede=gc -Raw 'C:\Users\Admin\AppData\Roaming\inexorableness\vildfre\Norby.Drs';$Brugtpriss=$Hospitalsbehandlede.SubString(53539,3);.$Brugtpriss($Hospitalsbehandlede)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Mbelarkitekt" /t REG_EXPAND_SZ /d "%Boreformndenes% -windowstyle 1 $Frivrdiens=(gi 'HKCU:\Software\Stillingskrigenes\').GetValue('Pettable');%Boreformndenes% ($Frivrdiens)"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Mbelarkitekt" /t REG_EXPAND_SZ /d "%Boreformndenes% -windowstyle 1 $Frivrdiens=(gi 'HKCU:\Software\Stillingskrigenes\').GetValue('Pettable');%Boreformndenes% ($Frivrdiens)"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2180
-
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIxIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU4MTUiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODE1MzQzMTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MDAxNzI3OTY1Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4188
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
776B
MD50e3ea0fbfb7a5ae041d93f513504997a
SHA19ab0fc83db231bb34f7189b7b6e0fb1da3a97625
SHA25654f23764661545c30e05937ee5ea01546a868d9871d77d8803b1af1f155a3af9
SHA5129e832597b05e4d2c1f6bae633aa18d059eaf6b4a3791844c432beb7cad8942f775d6b58dcf78666872c31578252f9fe4f99dec53aa779c93d00da8413bbcd6c9
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
6KB
MD5ec62e1a8d16d8f1b0eb792aa26e5de5c
SHA1faa219618aec99cffb81c312728dc56c1fdc5798
SHA256193d396fc7be5fed9d585de3c43e23d640c1dce725499f0274b3898c248545aa
SHA512cb3f3458cf734ab7b964ed25cac87ff2938292eed9caae1305b2e5975bde885f4d8b06d05d4099ef614982cd55d97e9ddc0f13bbe2cdd9fb642d008788ed3017
-
Filesize
52KB
MD5237cdf672782754d57c42a5b82371b98
SHA16fe41a22c98e07b85ceb25b0870c539fe969197d
SHA25626c1ca3a25a867de4b6c580a67c25f0b772a8d0d1ee9bb87facf3daa741cac57
SHA512c97e1a229e3280c591b0bc76ea6850e8c5ee90420eea1d09a9a5f1effd264d06c8ce4aae166d43de00f1fc68422f277809cd899e33fee505d9be116efa8a0ce9
-
Filesize
316KB
MD555c16c99788bae84d0ae35a5bc6ac26b
SHA16b120598f82cded9cf0e3d73b19d845a38906d05
SHA25605f6ec090d9845e8a491dff2bba71700447e2a39c64c2e6d2e102cb10cc51e4c
SHA51298346632cf55138d293a42c74e20372642b34edf51a77abe7b10ae8741495b970af4054c60b16b44f44385a090043ea40366c35e8a303fde154af282a8529ecc