Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250211-en -
resource tags
arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system -
submitted
17/02/2025, 13:34
Static task
static1
Behavioral task
behavioral1
Sample
Windows_Security_Patch_KB5021130.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Windows_Security_Patch_KB5021130.exe
Resource
win10v2004-20250211-en
General
-
Target
Windows_Security_Patch_KB5021130.exe
-
Size
618KB
-
MD5
4b7cb7621606abd6ffb6d38bafafb8e9
-
SHA1
831c1c044cdf6515ce3444444242015e8b52271f
-
SHA256
1744bcc45c4af593d5f3a72c972bc86d1158fb3408fe03db2d80d28b2c51d7c8
-
SHA512
98437691db7c50e50ece2de7caffddfe6a5bcb17af69754377bfbb195865a1362df6e911dfd6b7c9ebb17f98fae27c743a8518dc9348bcc10962f53e87e89d3a
-
SSDEEP
12288:BrtxWWIHuw2W41RfGx6UL7Uhd9BKcaQID8G3e3JgFaX:BanHubW4DfGUtKcadQ3JO0
Malware Config
Extracted
remcos
googlegroupaccount2
107.174.65.146:1194
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
googlegroupaccount.exe
-
copy_folder
googlegroupaccount
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
googlegroupaccount
-
mouse_option
false
-
mutex
Rmc-3UY7X7
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Detected Nirsoft tools 2 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral2/memory/1748-53-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral2/memory/3792-52-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/1748-53-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/3792-52-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Downloads MZ/PE file 1 IoCs
flow pid Process 49 1852 Process not Found -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2656314083-4170277356-267438488-1000\Control Panel\International\Geo\Nation Windows_Security_Patch_KB5021130.exe -
Executes dropped EXE 6 IoCs
pid Process 2860 googlegroupaccount.exe 2912 googlegroupaccount.exe 3792 googlegroupaccount.exe 1748 googlegroupaccount.exe 3408 googlegroupaccount.exe 4560 googlegroupaccount.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2656314083-4170277356-267438488-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts googlegroupaccount.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-3UY7X7 = "\"C:\\Users\\Admin\\AppData\\Roaming\\googlegroupaccount\\googlegroupaccount.exe\"" googlegroupaccount.exe Set value (str) \REGISTRY\USER\S-1-5-21-2656314083-4170277356-267438488-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rmc-3UY7X7 = "\"C:\\Users\\Admin\\AppData\\Roaming\\googlegroupaccount\\googlegroupaccount.exe\"" Windows_Security_Patch_KB5021130.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-3UY7X7 = "\"C:\\Users\\Admin\\AppData\\Roaming\\googlegroupaccount\\googlegroupaccount.exe\"" Windows_Security_Patch_KB5021130.exe Set value (str) \REGISTRY\USER\S-1-5-21-2656314083-4170277356-267438488-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rmc-3UY7X7 = "\"C:\\Users\\Admin\\AppData\\Roaming\\googlegroupaccount\\googlegroupaccount.exe\"" googlegroupaccount.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 3568 set thread context of 2832 3568 Windows_Security_Patch_KB5021130.exe 87 PID 2860 set thread context of 2912 2860 googlegroupaccount.exe 91 PID 2912 set thread context of 3792 2912 googlegroupaccount.exe 92 PID 2912 set thread context of 1748 2912 googlegroupaccount.exe 93 PID 2912 set thread context of 4560 2912 googlegroupaccount.exe 95 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process 448 4560 WerFault.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language googlegroupaccount.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language googlegroupaccount.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language googlegroupaccount.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windows_Security_Patch_KB5021130.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windows_Security_Patch_KB5021130.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language googlegroupaccount.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5076 MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3792 googlegroupaccount.exe 3792 googlegroupaccount.exe 3792 googlegroupaccount.exe 3792 googlegroupaccount.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 2912 googlegroupaccount.exe 2912 googlegroupaccount.exe 2912 googlegroupaccount.exe 2912 googlegroupaccount.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2912 googlegroupaccount.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4560 googlegroupaccount.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 3568 wrote to memory of 2832 3568 Windows_Security_Patch_KB5021130.exe 87 PID 3568 wrote to memory of 2832 3568 Windows_Security_Patch_KB5021130.exe 87 PID 3568 wrote to memory of 2832 3568 Windows_Security_Patch_KB5021130.exe 87 PID 3568 wrote to memory of 2832 3568 Windows_Security_Patch_KB5021130.exe 87 PID 3568 wrote to memory of 2832 3568 Windows_Security_Patch_KB5021130.exe 87 PID 3568 wrote to memory of 2832 3568 Windows_Security_Patch_KB5021130.exe 87 PID 3568 wrote to memory of 2832 3568 Windows_Security_Patch_KB5021130.exe 87 PID 3568 wrote to memory of 2832 3568 Windows_Security_Patch_KB5021130.exe 87 PID 3568 wrote to memory of 2832 3568 Windows_Security_Patch_KB5021130.exe 87 PID 3568 wrote to memory of 2832 3568 Windows_Security_Patch_KB5021130.exe 87 PID 2832 wrote to memory of 2860 2832 Windows_Security_Patch_KB5021130.exe 89 PID 2832 wrote to memory of 2860 2832 Windows_Security_Patch_KB5021130.exe 89 PID 2832 wrote to memory of 2860 2832 Windows_Security_Patch_KB5021130.exe 89 PID 2860 wrote to memory of 2912 2860 googlegroupaccount.exe 91 PID 2860 wrote to memory of 2912 2860 googlegroupaccount.exe 91 PID 2860 wrote to memory of 2912 2860 googlegroupaccount.exe 91 PID 2860 wrote to memory of 2912 2860 googlegroupaccount.exe 91 PID 2860 wrote to memory of 2912 2860 googlegroupaccount.exe 91 PID 2860 wrote to memory of 2912 2860 googlegroupaccount.exe 91 PID 2860 wrote to memory of 2912 2860 googlegroupaccount.exe 91 PID 2860 wrote to memory of 2912 2860 googlegroupaccount.exe 91 PID 2860 wrote to memory of 2912 2860 googlegroupaccount.exe 91 PID 2860 wrote to memory of 2912 2860 googlegroupaccount.exe 91 PID 2912 wrote to memory of 3792 2912 googlegroupaccount.exe 92 PID 2912 wrote to memory of 3792 2912 googlegroupaccount.exe 92 PID 2912 wrote to memory of 3792 2912 googlegroupaccount.exe 92 PID 2912 wrote to memory of 3792 2912 googlegroupaccount.exe 92 PID 2912 wrote to memory of 1748 2912 googlegroupaccount.exe 93 PID 2912 wrote to memory of 1748 2912 googlegroupaccount.exe 93 PID 2912 wrote to memory of 1748 2912 googlegroupaccount.exe 93 PID 2912 wrote to memory of 1748 2912 googlegroupaccount.exe 93 PID 2912 wrote to memory of 3408 2912 googlegroupaccount.exe 94 PID 2912 wrote to memory of 3408 2912 googlegroupaccount.exe 94 PID 2912 wrote to memory of 3408 2912 googlegroupaccount.exe 94 PID 2912 wrote to memory of 4560 2912 googlegroupaccount.exe 95 PID 2912 wrote to memory of 4560 2912 googlegroupaccount.exe 95 PID 2912 wrote to memory of 4560 2912 googlegroupaccount.exe 95 PID 2912 wrote to memory of 4560 2912 googlegroupaccount.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\Windows_Security_Patch_KB5021130.exe"C:\Users\Admin\AppData\Local\Temp\Windows_Security_Patch_KB5021130.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\Windows_Security_Patch_KB5021130.exe"C:\Users\Admin\AppData\Local\Temp\Windows_Security_Patch_KB5021130.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Roaming\googlegroupaccount\googlegroupaccount.exe"C:\Users\Admin\AppData\Roaming\googlegroupaccount\googlegroupaccount.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Roaming\googlegroupaccount\googlegroupaccount.exe"C:\Users\Admin\AppData\Roaming\googlegroupaccount\googlegroupaccount.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Roaming\googlegroupaccount\googlegroupaccount.exeC:\Users\Admin\AppData\Roaming\googlegroupaccount\googlegroupaccount.exe /stext "C:\Users\Admin\AppData\Local\Temp\yqpkfavgc"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3792
-
-
C:\Users\Admin\AppData\Roaming\googlegroupaccount\googlegroupaccount.exeC:\Users\Admin\AppData\Roaming\googlegroupaccount\googlegroupaccount.exe /stext "C:\Users\Admin\AppData\Local\Temp\akcdfsghqukhw"5⤵
- Executes dropped EXE
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:1748
-
-
C:\Users\Admin\AppData\Roaming\googlegroupaccount\googlegroupaccount.exeC:\Users\Admin\AppData\Roaming\googlegroupaccount\googlegroupaccount.exe /stext "C:\Users\Admin\AppData\Local\Temp\kminglrbeccuywre"5⤵
- Executes dropped EXE
PID:3408
-
-
C:\Users\Admin\AppData\Roaming\googlegroupaccount\googlegroupaccount.exeC:\Users\Admin\AppData\Roaming\googlegroupaccount\googlegroupaccount.exe /stext "C:\Users\Admin\AppData\Local\Temp\kminglrbeccuywre"5⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4560 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4560 -s 126⤵
- Program crash
PID:448
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4560 -ip 45601⤵PID:1416
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI1IiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODM0MTAiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NTUzNjg2NzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1NDcwMTg0MTQ4Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:5076
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD518aaad48016d645ad439f178b27d0fb5
SHA1b7b0f41b7e09b23ea220d2775242b779df74eec1
SHA256e7a2cb979d8bccf31603e66a4b54542df0659773cc8718d532a1074d7f5ad558
SHA512f2d6bd5dd24f3e69db77637eff8c74df749d13f259ea9e5036686c2371c97b1e046c5a01a41be8d076c9eda24bb8c6e72b63c1cbf02cd3d8f319bbff2e636464
-
Filesize
618KB
MD54b7cb7621606abd6ffb6d38bafafb8e9
SHA1831c1c044cdf6515ce3444444242015e8b52271f
SHA2561744bcc45c4af593d5f3a72c972bc86d1158fb3408fe03db2d80d28b2c51d7c8
SHA51298437691db7c50e50ece2de7caffddfe6a5bcb17af69754377bfbb195865a1362df6e911dfd6b7c9ebb17f98fae27c743a8518dc9348bcc10962f53e87e89d3a