Windows Analysis Report
6732832.js

Overview

General Information

Sample name: 6732832.js
Analysis ID: 1639312
MD5: f497655b5c7c0834be1fe0ea0eb7493c
SHA1: b8e7608a478d0b50547e758f4a6567823fa3f311
SHA256: 53bcd29a7e6afd5ff7e507a36fc47c7696106c54259bd8c10c76ac6716fda0ae
Tags: jsRATRemcosRATuser-abuse_ch
Infos:

Detection

Remcos, DBatLoader
Score: 100
Range: 0 - 100
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Benign windows process drops PE files
Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Early bird code injection technique detected
Found malware configuration
JScript performs obfuscated calls to suspicious functions
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected DBatLoader
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Drops PE files with a suspicious file extension
Installs a global keyboard hook
Queues an APC in another process (thread injection)
Sigma detected: DLL Search Order Hijackig Via Additional Space in Path
Sigma detected: Suspicious Creation with Colorcpl
Sigma detected: WScript or CScript Dropper
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to launch a process as a different user
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
JavaScript source code contains large arrays or strings with random content potentially encoding malicious code
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

Name Description Attribution Blogpost URLs Link
Remcos, RemcosRAT Remcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
Name Description Attribution Blogpost URLs Link
DBatLoader This Delphi loader misuses Cloud storage services, such as Google Drive to download the Delphi stager component. The Delphi stager has the actual payload embedded as a resource and starts it. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.dbatloader

AV Detection

barindex
Source: 6732832.js Avira: detected
Source: C:\Users\user\Links\Ekbmajrx.PIF Avira: detection malicious, Label: TR/AD.Remcos.lpmfw
Source: C:\Users\user\AppData\Local\Temp\x.exe Avira: detection malicious, Label: TR/AD.Remcos.lpmfw
Source: 8.2.colorcpl.exe.2e00000.0.unpack Malware Configuration Extractor: Remcos {"Host:Port:Password": ["196.251.83.79:786:0"], "Assigned name": "HH", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-HRCZR2", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos", "Keylog file max size": ""}
Source: C:\Users\user\AppData\Local\Temp\x.exe ReversingLabs: Detection: 75%
Source: C:\Users\user\AppData\Local\Temp\x.exe Virustotal: Detection: 39% Perma Link
Source: C:\Users\user\Links\Ekbmajrx.PIF ReversingLabs: Detection: 75%
Source: C:\Users\user\Links\Ekbmajrx.PIF Virustotal: Detection: 39% Perma Link
Source: 6732832.js Virustotal: Detection: 47% Perma Link
Source: 6732832.js ReversingLabs: Detection: 41%
Source: Yara match File source: 16.2.colorcpl.exe.3000000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.colorcpl.exe.2e00000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 16.2.colorcpl.exe.3000000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.colorcpl.exe.2e00000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.colorcpl.exe.2bd0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.colorcpl.exe.2bd0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.x.exe.28f0000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000008.00000002.2523747715.0000000032B00000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.2523747715.0000000032AE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.2523747715.0000000032AE8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000010.00000002.1343119653.0000000003000000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.2523856221.00000000344BF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.1269621108.000000007E4F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.1255776445.0000000002925000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.1422872475.0000000002BD0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.2501429735.0000000002E00000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000010.00000002.1376834668.0000000030700000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.1422766132.00000000007C8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: x.exe PID: 6980, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: colorcpl.exe PID: 5516, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: colorcpl.exe PID: 7308, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: colorcpl.exe PID: 7504, type: MEMORYSTR
Source: Yara match File source: C:\ProgramData\remcos\logs.dat, type: DROPPED
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E33B64 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext, 8_2_02E33B64
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_03033B64 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext, 16_2_03033B64
Source: x.exe Binary or memory string: -----BEGIN PUBLIC KEY-----

Exploits

barindex
Source: Yara match File source: 16.2.colorcpl.exe.3000000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.colorcpl.exe.2e00000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 16.2.colorcpl.exe.3000000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.colorcpl.exe.2e00000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.colorcpl.exe.2bd0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.colorcpl.exe.2bd0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.x.exe.28f0000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000010.00000002.1343119653.0000000003000000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.1269621108.000000007E4F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.1255776445.0000000002925000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.1422872475.0000000002BD0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.2501429735.0000000002E00000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: x.exe PID: 6980, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: colorcpl.exe PID: 5516, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: colorcpl.exe PID: 7308, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: colorcpl.exe PID: 7504, type: MEMORYSTR

Privilege Escalation

barindex
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E06ABC _wcslen,CoGetObject, 8_2_02E06ABC
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_03006ABC _wcslen,CoGetObject, 16_2_03006ABC
Source: Binary string: easinvoker.pdb source: x.exe, 00000003.00000003.1234992961.000000007ED63000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000003.00000002.1267818979.00000000205DE000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000003.00000003.1234132581.000000007EA0F000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000003.00000002.1267818979.0000000020647000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000003.00000003.1234992961.000000007ED50000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: easinvoker.pdbGCTL source: x.exe, 00000003.00000003.1234992961.000000007ED63000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000003.00000003.1237071641.0000000000979000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000003.00000002.1267818979.00000000205DE000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000003.00000003.1237071641.000000000094A000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000003.00000003.1234132581.000000007EA0F000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000003.00000002.1267818979.0000000020647000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000003.00000003.1234992961.000000007ED50000.00000004.00001000.00020000.00000000.sdmp
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_028F52F8 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA, 3_2_028F52F8
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E090DC __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, 8_2_02E090DC
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E0B6B5 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, 8_2_02E0B6B5
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E1C7E5 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, 8_2_02E1C7E5
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E0B8BA FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, 8_2_02E0B8BA
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E4E989 FindFirstFileExA, 8_2_02E4E989
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E07EDD __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, 8_2_02E07EDD
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E06F13 FindFirstFileW,FindNextFileW, 8_2_02E06F13
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E19CEE FindFirstFileW,FindNextFileW,FindNextFileW, 8_2_02E19CEE
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E08CDE __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, 8_2_02E08CDE
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_030090DC __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, 16_2_030090DC
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_0301C7E5 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, 16_2_0301C7E5
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_0300B6B5 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, 16_2_0300B6B5
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_0304E989 FindFirstFileExA, 16_2_0304E989
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_0300B8BA FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, 16_2_0300B8BA
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_03006F13 FindFirstFileW,FindNextFileW, 16_2_03006F13
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_03007EDD __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, 16_2_03007EDD
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_03008CDE __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, 16_2_03008CDE
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_03019CEE FindFirstFileW,FindNextFileW,FindNextFileW, 16_2_03019CEE
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E07357 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW, 8_2_02E07357

Networking

barindex
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49705 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49716 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49735 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49722 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49702 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49708 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49709 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49732 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49746 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49736 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49698 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49721 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49703 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49726 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49696 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49713 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49737 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49724 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49729 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49748 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49711 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49723 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49693 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49734 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49733 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49742 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49699 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49718 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49712 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49707 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49728 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49710 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49697 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49730 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49714 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49704 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49706 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49740 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49731 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49719 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49747 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49744 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49739 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49738 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49745 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49720 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49725 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49743 -> 196.251.83.79:786
Source: Network traffic Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49741 -> 196.251.83.79:786
Source: Malware configuration extractor IPs: 196.251.83.79
Source: global traffic TCP traffic: 192.168.2.6:49693 -> 196.251.83.79:786
Source: Joe Sandbox View ASN Name: SONIC-WirelessZA SONIC-WirelessZA
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: unknown TCP traffic detected without corresponding DNS query: 196.251.83.79
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E04574 WaitForSingleObject,SetEvent,recv, 8_2_02E04574
Source: colorcpl.exe String found in binary or memory: http://geoplugin.net/json.gp
Source: x.exe, 00000003.00000002.1269621108.000000007E4F0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000003.00000002.1255776445.0000000002925000.00000040.00001000.00020000.00000000.sdmp, colorcpl.exe, 00000008.00000002.2501429735.0000000002E00000.00000040.00000400.00020000.00000000.sdmp, colorcpl.exe, 00000010.00000002.1343119653.0000000003000000.00000040.00000400.00020000.00000000.sdmp, colorcpl.exe, 00000013.00000002.1422872475.0000000002BD0000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: http://geoplugin.net/json.gp/C
Source: x.exe, 00000003.00000003.1234992961.000000007ED63000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000003.00000003.1234992961.000000007EDE4000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000003.00000002.1267818979.0000000020693000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000003.00000003.1234397390.000000007EDF4000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.pmail.com

Key, Mouse, Clipboard, Microphone and Screen Capturing

barindex
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E09D1E SetWindowsHookExA 0000000D,02E09D0A,00000000 8_2_02E09D1E
Source: C:\Windows\SysWOW64\colorcpl.exe Windows user hook set: 0 keyboard low level C:\Windows\SysWOW64\colorcpl.exe Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E0B158 OpenClipboard,GetClipboardData,CloseClipboard, 8_2_02E0B158
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E1696E OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard, 8_2_02E1696E
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_0301696E OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard, 16_2_0301696E
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E0B158 OpenClipboard,GetClipboardData,CloseClipboard, 8_2_02E0B158
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E09E4A GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx, 8_2_02E09E4A
Source: Yara match File source: 16.2.colorcpl.exe.3000000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.colorcpl.exe.2e00000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 16.2.colorcpl.exe.3000000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.colorcpl.exe.2e00000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.colorcpl.exe.2bd0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.colorcpl.exe.2bd0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.x.exe.28f0000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000010.00000002.1343119653.0000000003000000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.1269621108.000000007E4F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.1255776445.0000000002925000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.1422872475.0000000002BD0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.2501429735.0000000002E00000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: x.exe PID: 6980, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: colorcpl.exe PID: 5516, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: colorcpl.exe PID: 7308, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: colorcpl.exe PID: 7504, type: MEMORYSTR

E-Banking Fraud

barindex
Source: Yara match File source: 16.2.colorcpl.exe.3000000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.colorcpl.exe.2e00000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 16.2.colorcpl.exe.3000000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.colorcpl.exe.2e00000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.colorcpl.exe.2bd0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.colorcpl.exe.2bd0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.x.exe.28f0000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000008.00000002.2523747715.0000000032B00000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.2523747715.0000000032AE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.2523747715.0000000032AE8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000010.00000002.1343119653.0000000003000000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.2523856221.00000000344BF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.1269621108.000000007E4F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.1255776445.0000000002925000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.1422872475.0000000002BD0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.2501429735.0000000002E00000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000010.00000002.1376834668.0000000030700000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.1422766132.00000000007C8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: x.exe PID: 6980, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: colorcpl.exe PID: 5516, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: colorcpl.exe PID: 7308, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: colorcpl.exe PID: 7504, type: MEMORYSTR
Source: Yara match File source: C:\ProgramData\remcos\logs.dat, type: DROPPED

Spam, unwanted Advertisements and Ransom Demands

barindex
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E1CF2D SystemParametersInfoW, 8_2_02E1CF2D
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_0301CF2D SystemParametersInfoW, 16_2_0301CF2D

System Summary

barindex
Source: 16.2.colorcpl.exe.3000000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 16.2.colorcpl.exe.3000000.0.raw.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Author: unknown
Source: 16.2.colorcpl.exe.3000000.0.raw.unpack, type: UNPACKEDPE Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
Source: 8.2.colorcpl.exe.2e00000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 8.2.colorcpl.exe.2e00000.0.raw.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Author: unknown
Source: 8.2.colorcpl.exe.2e00000.0.raw.unpack, type: UNPACKEDPE Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
Source: 16.2.colorcpl.exe.3000000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 16.2.colorcpl.exe.3000000.0.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Author: unknown
Source: 16.2.colorcpl.exe.3000000.0.unpack, type: UNPACKEDPE Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
Source: 8.2.colorcpl.exe.2e00000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 8.2.colorcpl.exe.2e00000.0.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Author: unknown
Source: 8.2.colorcpl.exe.2e00000.0.unpack, type: UNPACKEDPE Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
Source: 19.2.colorcpl.exe.2bd0000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 19.2.colorcpl.exe.2bd0000.0.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Author: unknown
Source: 19.2.colorcpl.exe.2bd0000.0.unpack, type: UNPACKEDPE Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
Source: 19.2.colorcpl.exe.2bd0000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 19.2.colorcpl.exe.2bd0000.0.raw.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Author: unknown
Source: 19.2.colorcpl.exe.2bd0000.0.raw.unpack, type: UNPACKEDPE Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
Source: 3.2.x.exe.28f0000.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 3.2.x.exe.28f0000.1.unpack, type: UNPACKEDPE Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
Source: 00000010.00000002.1343119653.0000000003000000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 00000010.00000002.1343119653.0000000003000000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: REMCOS_RAT_variants Author: unknown
Source: 00000010.00000002.1343119653.0000000003000000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
Source: 00000003.00000002.1269621108.000000007E4F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 00000003.00000002.1255776445.0000000002925000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 00000013.00000002.1422872475.0000000002BD0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 00000013.00000002.1422872475.0000000002BD0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: REMCOS_RAT_variants Author: unknown
Source: 00000013.00000002.1422872475.0000000002BD0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
Source: 00000008.00000002.2501429735.0000000002E00000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 00000008.00000002.2501429735.0000000002E00000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: REMCOS_RAT_variants Author: unknown
Source: 00000008.00000002.2501429735.0000000002E00000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
Source: Process Memory Space: x.exe PID: 6980, type: MEMORYSTR Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: Process Memory Space: colorcpl.exe PID: 5516, type: MEMORYSTR Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: Process Memory Space: colorcpl.exe PID: 7308, type: MEMORYSTR Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: Process Memory Space: colorcpl.exe PID: 7504, type: MEMORYSTR Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: C:\Windows\System32\wscript.exe COM Object queried: ADODB.Stream HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{00000566-0000-0010-8000-00AA006D2EA4} Jump to behavior
Source: C:\Windows\System32\wscript.exe COM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8} Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Process Stats: CPU usage > 49%
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_02903380 NtWriteVirtualMemory, 3_2_02903380
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_02903034 NtAllocateVirtualMemory, 3_2_02903034
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_02909654 RtlDosPathNameToNtPathName_U,NtCreateFile,NtWriteFile,NtClose, 3_2_02909654
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_02909738 RtlDosPathNameToNtPathName_U,NtOpenFile,NtQueryInformationFile,NtReadFile,NtClose, 3_2_02909738
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_029095CC RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile, 3_2_029095CC
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_02903C04 NtQueueApcThread, 3_2_02903C04
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_0290421A GetThreadContext,SetThreadContext,NtResumeThread, 3_2_0290421A
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_0290421C GetThreadContext,SetThreadContext,NtResumeThread, 3_2_0290421C
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_02903032 NtAllocateVirtualMemory, 3_2_02903032
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_02909578 RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile, 3_2_02909578
Source: C:\Users\user\Links\Ekbmajrx.PIF Code function: 15_2_02973380 NtWriteVirtualMemory, 15_2_02973380
Source: C:\Users\user\Links\Ekbmajrx.PIF Code function: 15_2_02973034 NtAllocateVirtualMemory, 15_2_02973034
Source: C:\Users\user\Links\Ekbmajrx.PIF Code function: 15_2_02979738 RtlDosPathNameToNtPathName_U,NtOpenFile,NtQueryInformationFile,NtReadFile,NtClose, 15_2_02979738
Source: C:\Users\user\Links\Ekbmajrx.PIF Code function: 15_2_02973C04 NtQueueApcThread, 15_2_02973C04
Source: C:\Users\user\Links\Ekbmajrx.PIF Code function: 15_2_0297421C GetThreadContext,SetThreadContext,NtResumeThread, 15_2_0297421C
Source: C:\Users\user\Links\Ekbmajrx.PIF Code function: 15_2_0297421A GetThreadContext,SetThreadContext,NtResumeThread, 15_2_0297421A
Source: C:\Users\user\Links\Ekbmajrx.PIF Code function: 15_2_02979809 NtQueryInformationFile,NtReadFile,NtClose, 15_2_02979809
Source: C:\Users\user\Links\Ekbmajrx.PIF Code function: 15_2_02973032 NtAllocateVirtualMemory, 15_2_02973032
Source: C:\Users\user\Links\Ekbmajrx.PIF Code function: 15_2_02979654 RtlDosPathNameToNtPathName_U,NtWriteFile,NtClose, 15_2_02979654
Source: C:\Users\user\Links\Ekbmajrx.PIF Code function: 15_2_0297341B NtWriteVirtualMemory, 15_2_0297341B
Source: C:\Users\user\Links\Ekbmajrx.PIF Code function: 15_2_029795CC RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile, 15_2_029795CC
Source: C:\Users\user\Links\Ekbmajrx.PIF Code function: 15_2_02979578 RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile, 15_2_02979578
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_0290A634 InetIsOffline,Sleep,CreateProcessAsUserW,ResumeThread,CloseHandle,CloseHandle,ExitProcess, 3_2_0290A634
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E16861 ExitWindowsEx,LoadLibraryA,GetProcAddress, 8_2_02E16861
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_03016861 ExitWindowsEx,LoadLibraryA,GetProcAddress, 16_2_03016861
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_028F20B4 3_2_028F20B4
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_029789E2 3_2_029789E2
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_0294C9EE 3_2_0294C9EE
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_0295C94A 3_2_0295C94A
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_0294CF65 3_2_0294CF65
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_02944D79 3_2_02944D79
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_029632F2 3_2_029632F2
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_02939210 3_2_02939210
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_02973049 3_2_02973049
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_029591E3 3_2_029591E3
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_0297969B 3_2_0297969B
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_0294D60D 3_2_0294D60D
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_02967730 3_2_02967730
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_02963750 3_2_02963750
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_0294D747 3_2_0294D747
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_02963521 3_2_02963521
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_02957B11 3_2_02957B11
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_0295D8F0 3_2_0295D8F0
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_0294380B 3_2_0294380B
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_029639AD 3_2_029639AD
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E1E29B 8_2_02E1E29B
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E373DA 8_2_02E373DA
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E38380 8_2_02E38380
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E2809D 8_2_02E2809D
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E3E1E0 8_2_02E3E1E0
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E421C0 8_2_02E421C0
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E281D7 8_2_02E281D7
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E5412B 8_2_02E5412B
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E3774C 8_2_02E3774C
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E53472 8_2_02E53472
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E2747E 8_2_02E2747E
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E3E43D 8_2_02E3E43D
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E325A1 8_2_02E325A1
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E4DAD9 8_2_02E4DAD9
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E1F809 8_2_02E1F809
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E379F6 8_2_02E379F6
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E279F5 8_2_02E279F5
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E3DFB1 8_2_02E3DFB1
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E37F78 8_2_02E37F78
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E35F52 8_2_02E35F52
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E13CA0 8_2_02E13CA0
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E37CBD 8_2_02E37CBD
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E33C73 8_2_02E33C73
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E3DD82 8_2_02E3DD82
Source: C:\Users\user\Links\Ekbmajrx.PIF Code function: 15_2_029620B4 15_2_029620B4
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_03038380 16_2_03038380
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_030373DA 16_2_030373DA
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_0301E29B 16_2_0301E29B
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_0305412B 16_2_0305412B
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_030421C0 16_2_030421C0
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_030281D7 16_2_030281D7
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_0303E1E0 16_2_0303E1E0
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_0302809D 16_2_0302809D
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_0303774C 16_2_0303774C
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_030325A1 16_2_030325A1
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_0303E43D 16_2_0303E43D
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_03053472 16_2_03053472
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_0302747E 16_2_0302747E
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_0304DAD9 16_2_0304DAD9
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_030379F6 16_2_030379F6
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_030279F5 16_2_030279F5
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_0301F809 16_2_0301F809
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_03035F52 16_2_03035F52
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_03037F78 16_2_03037F78
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_0303DFB1 16_2_0303DFB1
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_0303DD82 16_2_0303DD82
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_03033C73 16_2_03033C73
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_03013CA0 16_2_03013CA0
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_03037CBD 16_2_03037CBD
Source: C:\Users\user\Links\Ekbmajrx.PIF Code function: String function: 02973E20 appears 48 times
Source: C:\Users\user\Links\Ekbmajrx.PIF Code function: String function: 02964414 appears 154 times
Source: C:\Users\user\Links\Ekbmajrx.PIF Code function: String function: 0296457C appears 570 times
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: String function: 02903E9C appears 45 times
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: String function: 02927687 appears 38 times
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: String function: 028F457C appears 835 times
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: String function: 028F421C appears 64 times
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: String function: 02903E20 appears 54 times
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: String function: 028F4414 appears 246 times
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: String function: 0295A750 appears 46 times
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: String function: 02E01F96 appears 49 times
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: String function: 030351E0 appears 55 times
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: String function: 03001F96 appears 49 times
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: String function: 02E351E0 appears 55 times
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: String function: 02E34ACF appears 43 times
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: String function: 02E01EBF appears 31 times
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: String function: 03002117 appears 39 times
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: String function: 03034ACF appears 43 times
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: String function: 03001EBF appears 31 times
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: String function: 02E02117 appears 45 times
Source: 6732832.js Initial sample: Strings found which are bigger than 50
Source: 16.2.colorcpl.exe.3000000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 16.2.colorcpl.exe.3000000.0.raw.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
Source: 16.2.colorcpl.exe.3000000.0.raw.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
Source: 8.2.colorcpl.exe.2e00000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 8.2.colorcpl.exe.2e00000.0.raw.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
Source: 8.2.colorcpl.exe.2e00000.0.raw.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
Source: 16.2.colorcpl.exe.3000000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 16.2.colorcpl.exe.3000000.0.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
Source: 16.2.colorcpl.exe.3000000.0.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
Source: 8.2.colorcpl.exe.2e00000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 8.2.colorcpl.exe.2e00000.0.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
Source: 8.2.colorcpl.exe.2e00000.0.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
Source: 19.2.colorcpl.exe.2bd0000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 19.2.colorcpl.exe.2bd0000.0.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
Source: 19.2.colorcpl.exe.2bd0000.0.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
Source: 19.2.colorcpl.exe.2bd0000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 19.2.colorcpl.exe.2bd0000.0.raw.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
Source: 19.2.colorcpl.exe.2bd0000.0.raw.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
Source: 3.2.x.exe.28f0000.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 3.2.x.exe.28f0000.1.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
Source: 00000010.00000002.1343119653.0000000003000000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 00000010.00000002.1343119653.0000000003000000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
Source: 00000010.00000002.1343119653.0000000003000000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
Source: 00000003.00000002.1269621108.000000007E4F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 00000003.00000002.1255776445.0000000002925000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 00000013.00000002.1422872475.0000000002BD0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 00000013.00000002.1422872475.0000000002BD0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
Source: 00000013.00000002.1422872475.0000000002BD0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
Source: 00000008.00000002.2501429735.0000000002E00000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 00000008.00000002.2501429735.0000000002E00000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
Source: 00000008.00000002.2501429735.0000000002E00000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
Source: Process Memory Space: x.exe PID: 6980, type: MEMORYSTR Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: Process Memory Space: colorcpl.exe PID: 5516, type: MEMORYSTR Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: Process Memory Space: colorcpl.exe PID: 7308, type: MEMORYSTR Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: Process Memory Space: colorcpl.exe PID: 7504, type: MEMORYSTR Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: classification engine Classification label: mal100.rans.troj.spyw.expl.evad.winJS@19/7@0/1
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E17AD9 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError, 8_2_02E17AD9
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_03017AD9 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError, 16_2_03017AD9
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_028F793C GetDiskFreeSpaceA, 3_2_028F793C
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E0C03C GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle, 8_2_02E0C03C
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E1B9AB FindResourceA,LoadResource,LockResource,SizeofResource, 8_2_02E1B9AB
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E1AE6B OpenSCManagerW,OpenServiceW,CloseServiceHandle,ChangeServiceConfigW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle, 8_2_02E1AE6B
Source: C:\Users\user\AppData\Local\Temp\x.exe File created: C:\Users\All Users\6770.cmd Jump to behavior
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4108:120:WilError_03
Source: C:\Windows\SysWOW64\colorcpl.exe Mutant created: \Sessions\1\BaseNamedObjects\Rmc-HRCZR2
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3240:120:WilError_03
Source: C:\Windows\System32\wscript.exe File created: C:\Users\user\AppData\Local\Temp\x.exe Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Windows\System32\wscript.exe File read: C:\Users\user\Desktop\desktop.ini Jump to behavior
Source: C:\Windows\System32\wscript.exe Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: 6732832.js Virustotal: Detection: 47%
Source: 6732832.js ReversingLabs: Detection: 41%
Source: unknown Process created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\6732832.js"
Source: C:\Windows\System32\wscript.exe Process created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user\AppData\Local\Temp\x.exe"
Source: C:\Users\user\AppData\Local\Temp\x.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\6770.cmd""
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\x.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\16992.cmd""
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\x.exe Process created: C:\Windows\SysWOW64\colorcpl.exe C:\Windows\System32\colorcpl.exe
Source: unknown Process created: C:\Users\user\Links\Ekbmajrx.PIF "C:\Users\user\Links\Ekbmajrx.PIF"
Source: C:\Users\user\Links\Ekbmajrx.PIF Process created: C:\Windows\SysWOW64\colorcpl.exe C:\Windows\System32\colorcpl.exe
Source: unknown Process created: C:\Users\user\Links\Ekbmajrx.PIF "C:\Users\user\Links\Ekbmajrx.PIF"
Source: C:\Users\user\Links\Ekbmajrx.PIF Process created: C:\Windows\SysWOW64\colorcpl.exe C:\Windows\System32\colorcpl.exe
Source: C:\Windows\System32\wscript.exe Process created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user\AppData\Local\Temp\x.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\6770.cmd"" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\16992.cmd"" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Process created: C:\Windows\SysWOW64\colorcpl.exe C:\Windows\System32\colorcpl.exe Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Process created: C:\Windows\SysWOW64\colorcpl.exe C:\Windows\System32\colorcpl.exe Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Process created: C:\Windows\SysWOW64\colorcpl.exe C:\Windows\System32\colorcpl.exe Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: version.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: sxs.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: jscript.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: msisip.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: wshext.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: scrobj.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: scrrun.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: msxml3.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: msdart.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: edputil.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: windows.staterepositoryps.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: appresolver.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: bcp47langs.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: slc.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: sppc.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: onecorecommonproxystub.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: onecoreuapcommonproxystub.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: url.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: ieframe.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: netapi32.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: wkscli.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: smartscreenps.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: ieproxy.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: mssip32.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: ??????????.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: ??.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: ??l.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: ????.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: ???e???????????.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: ???e???????????.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: ??l.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: ??l.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: sppc.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: tquery.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: cryptdll.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: spp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: vssapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: vsstrace.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: endpointdlp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: endpointdlp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: endpointdlp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: endpointdlp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: advapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: advapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: advapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: advapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: advapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: advapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: advapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: sppwmi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: slc.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: sppcext.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: winscard.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: devobj.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: cmdext.dll Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Section loaded: colorui.dll Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Section loaded: mscms.dll Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Section loaded: coloradapterclient.dll Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: url.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: ieframe.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: netapi32.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: wkscli.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: propsys.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: smartscreenps.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: ieproxy.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: mssip32.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: winnsi.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: ??l.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: ????.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: ???e???????????.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: ???e???????????.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: ??l.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: ??l.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: sppc.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: tquery.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: cryptdll.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: spp.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: vssapi.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: vsstrace.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: endpointdlp.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: endpointdlp.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: endpointdlp.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: endpointdlp.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: advapi.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: advapi.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: advapi.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: advapi.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: advapi.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: advapi.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: advapi.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: sppwmi.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: slc.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: sppcext.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: winscard.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: devobj.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: cryptbase.dll Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Section loaded: colorui.dll Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Section loaded: mscms.dll Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Section loaded: coloradapterclient.dll Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: url.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: ieframe.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: netapi32.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: wkscli.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: propsys.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: smartscreenps.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: ieproxy.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: winnsi.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: mssip32.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: ??l.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: ????.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: ???e???????????.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: ???e???????????.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: ??l.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: ??l.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: sppc.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: tquery.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: cryptdll.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: spp.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: vssapi.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: vsstrace.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: endpointdlp.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: endpointdlp.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: endpointdlp.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: endpointdlp.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: advapi.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: advapi.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: advapi.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: advapi.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: advapi.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: advapi.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: advapi.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: sppwmi.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: slc.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: sppcext.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: winscard.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: devobj.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Section loaded: cryptbase.dll Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Section loaded: colorui.dll Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Section loaded: mscms.dll Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Section loaded: coloradapterclient.dll Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: 6732832.js Static file information: File size 2619064 > 1048576
Source: Binary string: easinvoker.pdb source: x.exe, 00000003.00000003.1234992961.000000007ED63000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000003.00000002.1267818979.00000000205DE000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000003.00000003.1234132581.000000007EA0F000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000003.00000002.1267818979.0000000020647000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000003.00000003.1234992961.000000007ED50000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: easinvoker.pdbGCTL source: x.exe, 00000003.00000003.1234992961.000000007ED63000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000003.00000003.1237071641.0000000000979000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000003.00000002.1267818979.00000000205DE000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000003.00000003.1237071641.000000000094A000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000003.00000003.1234132581.000000007EA0F000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000003.00000002.1267818979.0000000020647000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000003.00000003.1234992961.000000007ED50000.00000004.00001000.00020000.00000000.sdmp

Data Obfuscation

barindex
Source: C:\Windows\System32\wscript.exe Anti Malware Scan Interface: CreateTextFile("Z:\syscalls\1105.js.csv");IXMLDOMNode._00000000();ITextStream.WriteLine(" entry:11 o: f:createElement a0:%22t%22");IXMLDOMNode._00000029("t");IXMLDOMNode._00000000();IXMLDOMElement._00000000();ITextStream.WriteLine(" exit:11 o: f:createElement r:");IXMLDOMElement.dataType("bin.base64");IXMLDOMElement.text("TVpQAAIAAAAEAA8A//8AALgAAAAAAAAAQAAaAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEAALoQAA4ftAnNIbgBTM0hkJBUaGlzIHByb2dyYW0gbXVzdCBiZSBydW4gdW5kZXIgV2luMzINCiQ3AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA");IFileSystem3._00000000();ITextStream.WriteLine(" entry:37 o: f:GetSpecialFolder a0:2");IFileSystem3.GetSpecialFolder("2");IFileSystem3._00000000();IFolder.Path();ITextStream.WriteLine(" exit:37 o: f:GetSpecialFolder r:C%3A%5CUsers%5Cuser%5CAppData%5CLocal%5CTemp");_Stream.Type("1");_Stream._00000000();ITextStream.WriteLine(" entry:54 o: f:Open");_Stream.Open();_Stream._00000000();ITextStream.WriteLine(" exit:54 o: f:Open r:undefined");IXMLDOMElement.nodeTypedValue();_Stream._00000000();ITextStream.WriteLine(" entry:60 o: f:Write a0:");_Stream.Write("Unsupported parameter type 00002011");_Stream._00000000();ITextStream.WriteLine(" exit:60 o: f:Write r:undefined");IFolder.Path();_Stream._00000000();ITextStream.WriteLine(" entry:68 o: f:SaveToFile a0:%22C%3A%5CUsers%5Cuser%5CAppData%5CLocal%5CTemp%5Cx.exe%22 a1:2");_Stream.SaveToFile("C:\Users\user\AppData\Local\Temp\x.exe", "2");IHost.CreateObject("Scripting.FileSystemObject");IFileSystem3.CreateTextFile("Z:\syscalls\1105.js.csv");IXMLDOMNode._00000000();ITextStream.WriteLine(" entry:11 o: f:createElement a0:%22t%22");IXMLDOMNode._00000029("t");IXMLDOMNode._00000000();IXMLDOMElement._00000000();ITextStream.WriteLine(" exit:11 o: f:createElement r:");IXMLDOMElement.dataType("bin.base64");IXMLDOMElement.text("TVpQAAIAAAAEAA8A//8AALgAAAAAAAAAQAAaAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEAALoQAA4ftAnNIbgBTM0hkJBUaGlzIHByb2dyYW0gbXVzdCBiZSBydW4gdW5kZXIgV2luMzINCiQ3AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA");IFileSystem3._00000000();ITextStream.WriteLine(" entry:37 o: f:GetSpecialFolder a0:2");IFileSystem3.GetSpecialFolder("2");IFileSystem3._00000000();IFolder.Path();ITextStream.WriteLine(" exit:37 o: f:GetSpecialFolder r:C%3A%5CUsers%5Cuser%5CAppData%5CLocal%5CTemp");_Stream.Type("1");_Stream._00000000();ITextStream.WriteLine(" entry:54 o: f:Open");_Stream.Open();_Stream._00000000();ITextStream.WriteLine(" exit:54 o: f:Open r:undefined");IXMLDOMElement.nodeTypedValue();_Stream._00000000();ITextStream.WriteLine(" entry:60 o: f:Write a0:");_Stream.Write("Unsupported parameter type 00002011");_Stream._00000000();ITextStream.WriteLine(" exit:60 o: f:Write r:undefined");IFolder.Path();_Stream._00000000();ITextStream.WriteLine(" entry:68 o: f:SaveToFile a0:%22C%3A%5CUsers%5Cuser%5CAppData%5CLocal%5CTemp%5Cx.exe%22 a1:2");_Stream.SaveToFile("C:\Users\user\AppData\Local\Temp\x.exe", "2");_Stream._00000000();ITextS
Source: Yara match File source: 3.2.x.exe.23dfc48.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.x.exe.23dfc48.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.x.exe.28f0000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000003.00000002.1255041481.00000000023DF000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_02903E20 LoadLibraryW,GetProcAddress,WriteProcessMemory,FreeLibrary, 3_2_02903E20
Source: 6732832.js String : entropy: 5.84, length: 2618714, content: "TVpQAAIAAAAEAA8A//8AALgAAAAAAAAAQAAaAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEAALoQAA4ftAnNIbg Go to definition
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_029162A4 push 0291630Fh; ret 3_2_02916307
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_028FC3B6 push 028FC61Eh; ret 3_2_028FC616
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_029160AC push 02916125h; ret 3_2_0291611D
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_0290A018 push ecx; mov dword ptr [esp], edx 3_2_0290A01D
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_0290606C push 029060A4h; ret 3_2_0290609C
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_029161F8 push 02916288h; ret 3_2_02916280
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_02916144 push 029161ECh; ret 3_2_029161E4
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_028F617C push 028F61BEh; ret 3_2_028F61B6
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_028F617A push 028F61BEh; ret 3_2_028F61B6
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_0297C63F push ecx; ret 3_2_0297C652
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_0295A796 push ecx; ret 3_2_0295A7A9
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_028FC498 push 028FC61Eh; ret 3_2_028FC616
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_02902410 push ecx; mov dword ptr [esp], edx 3_2_02902412
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_02902EDA push 02902F87h; ret 3_2_02902F7F
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_02902EDC push 02902F87h; ret 3_2_02902F7F
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_0297CF70 push eax; ret 3_2_0297CF8E
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_028FCDE0 push 028FCE0Ch; ret 3_2_028FCE04
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_028F3210 push eax; ret 3_2_028F324C
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_028FF600 push 028FF64Dh; ret 3_2_028FF645
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_028FF4F4 push 028FF56Ah; ret 3_2_028FF562
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_028FF5FF push 028FF64Dh; ret 3_2_028FF645
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_02915854 push 02915A3Ah; ret 3_2_02915A32
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_028FBE18 push ecx; mov dword ptr [esp], edx 3_2_028FBE1D
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_02903F84 push 02903FBCh; ret 3_2_02903FB4
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_02909FB4 push ecx; mov dword ptr [esp], edx 3_2_02909FB9
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_028F5D9E push 028F5DFBh; ret 3_2_028F5DF3
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_028F5DA0 push 028F5DFBh; ret 3_2_028F5DF3
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_02903D40 push 02903D82h; ret 3_2_02903D7A
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E35226 push ecx; ret 8_2_02E35239
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E570CF push ecx; ret 8_2_02E570E2
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E57A00 push eax; ret 8_2_02E57A1E

Persistence and Installation Behavior

barindex
Source: C:\Users\user\AppData\Local\Temp\x.exe File created: C:\Users\user\Links\Ekbmajrx.PIF Jump to dropped file
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E062E2 ShellExecuteW,URLDownloadToFileW, 8_2_02E062E2
Source: C:\Users\user\AppData\Local\Temp\x.exe File created: C:\Users\user\Links\Ekbmajrx.PIF Jump to dropped file
Source: C:\Windows\System32\wscript.exe File created: C:\Users\user\AppData\Local\Temp\x.exe Jump to dropped file
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E1AC43 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle, 8_2_02E1AC43
Source: C:\Users\user\AppData\Local\Temp\x.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Ekbmajrx Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Ekbmajrx Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_029064E4 GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, 3_2_029064E4
Source: C:\Windows\System32\wscript.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\wscript.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\wscript.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle, 8_2_02E1A941
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle, 16_2_0301A941
Source: C:\Windows\System32\wscript.exe Window found: window name: WSH-Timer Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Window / User API: threadDelayed 5517 Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Window / User API: threadDelayed 4011 Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Window / User API: foregroundWindowGot 1738 Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe API coverage: 6.1 %
Source: C:\Windows\SysWOW64\colorcpl.exe TID: 4852 Thread sleep count: 156 > 30 Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe TID: 4852 Thread sleep time: -78000s >= -30000s Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe TID: 1576 Thread sleep count: 5517 > 30 Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe TID: 1576 Thread sleep time: -16551000s >= -30000s Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe TID: 1576 Thread sleep count: 4011 > 30 Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe TID: 1576 Thread sleep time: -12033000s >= -30000s Jump to behavior
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_028F52F8 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA, 3_2_028F52F8
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E090DC __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, 8_2_02E090DC
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E0B6B5 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, 8_2_02E0B6B5
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E1C7E5 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, 8_2_02E1C7E5
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E0B8BA FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, 8_2_02E0B8BA
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E4E989 FindFirstFileExA, 8_2_02E4E989
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E07EDD __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, 8_2_02E07EDD
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E06F13 FindFirstFileW,FindNextFileW, 8_2_02E06F13
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E19CEE FindFirstFileW,FindNextFileW,FindNextFileW, 8_2_02E19CEE
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E08CDE __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, 8_2_02E08CDE
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_030090DC __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, 16_2_030090DC
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_0301C7E5 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, 16_2_0301C7E5
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_0300B6B5 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, 16_2_0300B6B5
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_0304E989 FindFirstFileExA, 16_2_0304E989
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_0300B8BA FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, 16_2_0300B8BA
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_03006F13 FindFirstFileW,FindNextFileW, 16_2_03006F13
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_03007EDD __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, 16_2_03007EDD
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_03008CDE __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, 16_2_03008CDE
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_03019CEE FindFirstFileW,FindNextFileW,FindNextFileW, 16_2_03019CEE
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E07357 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW, 8_2_02E07357
Source: Ekbmajrx.PIF, 00000012.00000002.1423292537.00000000006A6000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllu
Source: colorcpl.exe, 00000008.00000002.2523747715.0000000032B00000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllq
Source: wscript.exe, 00000001.00000002.1239732010.0000024EFAF3F000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\8b}E
Source: x.exe, 00000003.00000002.1254201790.0000000000911000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll^
Source: Ekbmajrx.PIF, 0000000F.00000002.1342950778.00000000008D4000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\AppData\Local\Temp\x.exe API call chain: ExitProcess graph end node
Source: C:\Windows\SysWOW64\colorcpl.exe API call chain: ExitProcess graph end node
Source: C:\Users\user\Links\Ekbmajrx.PIF API call chain: ExitProcess graph end node

Anti Debugging

barindex
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_0290A5B0 GetModuleHandleW,GetProcAddress,CheckRemoteDebuggerPresent, 3_2_0290A5B0
Source: C:\Users\user\AppData\Local\Temp\x.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Process queried: DebugPort Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Process queried: DebugPort Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E3B88D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 8_2_02E3B88D
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_02903E20 LoadLibraryW,GetProcAddress,WriteProcessMemory,FreeLibrary, 3_2_02903E20
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_029A691D mov eax, dword ptr fs:[00000030h] 3_2_029A691D
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_02968E64 mov eax, dword ptr fs:[00000030h] 3_2_02968E64
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E438F4 mov eax, dword ptr fs:[00000030h] 8_2_02E438F4
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_030438F4 mov eax, dword ptr fs:[00000030h] 16_2_030438F4
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E11999 GetNativeSystemInfo,GetProcessHeap,HeapAlloc,SetLastError,SetLastError, 8_2_02E11999
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E35398 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 8_2_02E35398
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E3B88D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 8_2_02E3B88D
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E34F01 SetUnhandledExceptionFilter, 8_2_02E34F01
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E34D6E IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 8_2_02E34D6E
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_03035398 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 16_2_03035398
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_0303B88D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 16_2_0303B88D
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_03034F01 SetUnhandledExceptionFilter, 16_2_03034F01
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 16_2_03034D6E IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 16_2_03034D6E

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\wscript.exe File created: x.exe.1.dr Jump to dropped file
Source: C:\Users\user\Links\Ekbmajrx.PIF Process created / APC Queued / Resumed: C:\Windows\SysWOW64\colorcpl.exe Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Process created / APC Queued / Resumed: C:\Windows\SysWOW64\colorcpl.exe Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Process created / APC Queued / Resumed: C:\Windows\SysWOW64\colorcpl.exe Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Memory allocated: C:\Windows\SysWOW64\colorcpl.exe base: 2E00000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Memory allocated: C:\Windows\SysWOW64\colorcpl.exe base: 3000000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Memory allocated: C:\Windows\SysWOW64\colorcpl.exe base: 2BD0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Thread APC queued: target process: C:\Windows\SysWOW64\colorcpl.exe Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E197D9 mouse_event, 8_2_02E197D9
Source: C:\Windows\System32\wscript.exe Process created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user\AppData\Local\Temp\x.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\x.exe Process created: C:\Windows\SysWOW64\colorcpl.exe C:\Windows\System32\colorcpl.exe Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Process created: C:\Windows\SysWOW64\colorcpl.exe C:\Windows\System32\colorcpl.exe Jump to behavior
Source: C:\Users\user\Links\Ekbmajrx.PIF Process created: C:\Windows\SysWOW64\colorcpl.exe C:\Windows\System32\colorcpl.exe Jump to behavior
Source: colorcpl.exe, 00000008.00000002.2523747715.0000000032B00000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Program Manager.79:786
Source: colorcpl.exe, 00000008.00000002.2523747715.0000000032B00000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Program Managerer|
Source: colorcpl.exe, 00000008.00000002.2523747715.0000000032B00000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Program Manager.79
Source: colorcpl.exe, 00000008.00000002.2523747715.0000000032B00000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Program Manager0Sg
Source: colorcpl.exe, 00000008.00000002.2523747715.0000000032B00000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Program Manager.79:786|GB
Source: colorcpl.exe, 00000008.00000002.2523747715.0000000032AE8000.00000004.00000020.00020000.00000000.sdmp, logs.dat.8.dr Binary or memory string: [Program Manager]
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_0295A5A4 cpuid 3_2_0295A5A4
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA, 3_2_028F54BC
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: GetLocaleInfoA, 3_2_028FA0B8
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: GetLocaleInfoA, 3_2_028FA104
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA, 3_2_028F55C8
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: GetLocaleInfoA, 8_2_02E0F26B
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, 8_2_02E5220A
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: EnumSystemLocalesW, 8_2_02E520E2
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: EnumSystemLocalesW, 8_2_02E52097
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: EnumSystemLocalesW, 8_2_02E5217D
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: GetLocaleInfoW, 8_2_02E5268A
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, 8_2_02E52757
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: EnumSystemLocalesW, 8_2_02E4844E
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: GetLocaleInfoW, 8_2_02E5245A
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, 8_2_02E52583
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: GetLocaleInfoW, 8_2_02E48937
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, 8_2_02E51E1F
Source: C:\Users\user\Links\Ekbmajrx.PIF Code function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA, 15_2_029654BC
Source: C:\Users\user\Links\Ekbmajrx.PIF Code function: GetLocaleInfoA, 15_2_0296A104
Source: C:\Users\user\Links\Ekbmajrx.PIF Code function: lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA, 15_2_029655C7
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, 16_2_0305220A
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: GetLocaleInfoA, 16_2_0300F26B
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: EnumSystemLocalesW, 16_2_0305217D
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: EnumSystemLocalesW, 16_2_03052097
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: EnumSystemLocalesW, 16_2_030520E2
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, 16_2_03052757
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: GetLocaleInfoW, 16_2_0305268A
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, 16_2_03052583
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: EnumSystemLocalesW, 16_2_0304844E
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: GetLocaleInfoW, 16_2_0305245A
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: GetLocaleInfoW, 16_2_03048937
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, 16_2_03051E1F
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_028F8B38 GetLocalTime, 3_2_028F8B38
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_02909F00 GetUserNameA, 3_2_02909F00
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 8_2_02E493AF _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free, 8_2_02E493AF
Source: C:\Users\user\AppData\Local\Temp\x.exe Code function: 3_2_028FB038 GetVersionExA, 3_2_028FB038
Source: C:\Windows\System32\wscript.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior

Stealing of Sensitive Information

barindex
Source: Yara match File source: 16.2.colorcpl.exe.3000000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.colorcpl.exe.2e00000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 16.2.colorcpl.exe.3000000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.colorcpl.exe.2e00000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.colorcpl.exe.2bd0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.colorcpl.exe.2bd0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.x.exe.28f0000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000008.00000002.2523747715.0000000032B00000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.2523747715.0000000032AE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.2523747715.0000000032AE8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000010.00000002.1343119653.0000000003000000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.2523856221.00000000344BF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.1269621108.000000007E4F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.1255776445.0000000002925000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.1422872475.0000000002BD0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.2501429735.0000000002E00000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000010.00000002.1376834668.0000000030700000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.1422766132.00000000007C8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: x.exe PID: 6980, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: colorcpl.exe PID: 5516, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: colorcpl.exe PID: 7308, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: colorcpl.exe PID: 7504, type: MEMORYSTR
Source: Yara match File source: C:\ProgramData\remcos\logs.dat, type: DROPPED
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: \AppData\Local\Google\Chrome\User Data\Default\Login Data 8_2_02E0B59B
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: \AppData\Local\Google\Chrome\User Data\Default\Login Data 16_2_0300B59B
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: \AppData\Roaming\Mozilla\Firefox\Profiles\ 8_2_02E0B6B5
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: \key3.db 8_2_02E0B6B5
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: \AppData\Roaming\Mozilla\Firefox\Profiles\ 16_2_0300B6B5
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: \key3.db 16_2_0300B6B5

Remote Access Functionality

barindex
Source: C:\Windows\SysWOW64\colorcpl.exe Mutex created: \Sessions\1\BaseNamedObjects\Rmc-HRCZR2 Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Mutex created: \Sessions\1\BaseNamedObjects\Rmc-HRCZR2 Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Mutex created: \Sessions\1\BaseNamedObjects\Rmc-HRCZR2 Jump to behavior
Source: Yara match File source: 16.2.colorcpl.exe.3000000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.colorcpl.exe.2e00000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 16.2.colorcpl.exe.3000000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.colorcpl.exe.2e00000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.colorcpl.exe.2bd0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.colorcpl.exe.2bd0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.x.exe.28f0000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000008.00000002.2523747715.0000000032B00000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.2523747715.0000000032AE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.2523747715.0000000032AE8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000010.00000002.1343119653.0000000003000000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.2523856221.00000000344BF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.1269621108.000000007E4F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.1255776445.0000000002925000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.1422872475.0000000002BD0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.2501429735.0000000002E00000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000010.00000002.1376834668.0000000030700000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.1422766132.00000000007C8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: x.exe PID: 6980, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: colorcpl.exe PID: 5516, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: colorcpl.exe PID: 7308, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: colorcpl.exe PID: 7504, type: MEMORYSTR
Source: Yara match File source: C:\ProgramData\remcos\logs.dat, type: DROPPED
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: cmd.exe 8_2_02E05091
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: cmd.exe 16_2_03005091
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs