Threat name:
Remcos, Amadey, Stealc
Alert
Classification:
rans.spre.bank.troj.adwa.spyw.expl.evad
.NET source code contains potential unpacker
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Attempt to bypass Chrome Application-Bound Encryption
Contains functionality to register a low level keyboard hook
Contains functionality to start a terminal service
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Creates an undocumented autostart registry key
Creates multiple autostart registry keys
Delayed program exit found
Detected unpacking (changes PE section rights)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Drops PE files to the startup folder
Drops VBS files to the startup folder
Enables a proxy for the internet explorer
Hides threads from debuggers
Infects executable files (exe, dll, sys, html)
Injects a PE file into a foreign processes
Installs a global keyboard hook
Installs new ROOT certificates
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies windows update settings
Monitors registry run keys for changes
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sets a proxy for the internet explorer
Sigma detected: Drops script at startup location
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspect Svchost Activity
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses cmd line tools excessively to alter registry or file data
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected Costura Assembly Loader
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1573707
Sample:
fWAr4zGUkY.exe
Startdate:
12/12/2024
Architecture:
WINDOWS
Score:
100
181
Malicious sample detected
(through community Yara
rule)
2->181
183
Antivirus detection
for dropped file
2->183
185
Antivirus / Scanner
detection for submitted
sample
2->185
187
25 other signatures
2->187
11
axplong.exe
4
41
2->11
started
16
fWAr4zGUkY.exe
5
2->16
started
18
l4.exe
2->18
started
20
4 other processes
2->20
process3
dnsIp4
163
185.215.113.16
WHOLESALECONNECTIONSNL
Portugal
11->163
165
45.155.249.199
MEER-ASmeerfarbigGmbHCoKGDE
Germany
11->165
127
C:\Users\user\AppData\...\909fc624e9.exe, PE32
11->127
dropped
141
17 other malicious files
11->141
dropped
237
Creates multiple autostart
registry keys
11->237
239
Hides threads from debuggers
11->239
241
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
11->241
243
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
11->243
22
RMX.exe
11->22
started
26
9beca1b974.exe
11->26
started
29
l4.exe
11->29
started
41
6 other processes
11->41
129
C:\Users\user\AppData\Local\...\axplong.exe, PE32
16->129
dropped
131
C:\Users\user\...\axplong.exe:Zone.Identifier, ASCII
16->131
dropped
245
Detected unpacking (changes
PE section rights)
16->245
247
Tries to evade debugger
and weak emulator (self
modifying code)
16->247
249
Tries to detect virtualization
through RDTSC time measurements
16->249
31
axplong.exe
16->31
started
133
C:\Users\user\AppData\...\vcruntime140_1.dll, PE32+
18->133
dropped
135
C:\Users\user\AppData\...\vcruntime140.dll, PE32+
18->135
dropped
137
C:\Users\user\AppData\...\unicodedata.pyd, PE32+
18->137
dropped
143
10 other malicious files
18->143
dropped
33
conhost.exe
18->33
started
35
l4.exe
18->35
started
167
91.212.137.41
TRANSCAPITALNETRU
Russian Federation
20->167
169
193.232.101.161
TKBBANK-ASRU
Russian Federation
20->169
171
16 other IPs or domains
20->171
139
C:\ProgramData\Remcos\logs.dat, data
20->139
dropped
251
Detected Remcos RAT
20->251
253
Writes to foreign memory
regions
20->253
255
Maps a DLL or memory
area into another process
20->255
257
2 other signatures
20->257
37
cmd.exe
20->37
started
39
svchost.exe
20->39
started
file5
signatures6
process7
dnsIp8
101
C:\ProgramData\Remcos\remcos.exe, PE32
22->101
dropped
103
C:\Users\user\AppData\Local\...\install.vbs, data
22->103
dropped
203
Multi AV Scanner detection
for dropped file
22->203
205
Detected Remcos RAT
22->205
207
Creates an undocumented
autostart registry key
22->207
221
6 other signatures
22->221
43
wscript.exe
22->43
started
46
cmd.exe
22->46
started
155
185.215.113.206
WHOLESALECONNECTIONSNL
Portugal
26->155
209
Detected unpacking (changes
PE section rights)
26->209
211
Attempt to bypass Chrome
Application-Bound Encryption
26->211
223
7 other signatures
26->223
48
chrome.exe
26->48
started
105
C:\Users\user\AppData\...\vcruntime140_1.dll, PE32+
29->105
dropped
107
C:\Users\user\AppData\...\vcruntime140.dll, PE32+
29->107
dropped
109
C:\Users\user\AppData\...\unicodedata.pyd, PE32+
29->109
dropped
115
10 other malicious files
29->115
dropped
213
Machine Learning detection
for dropped file
29->213
51
l4.exe
29->51
started
54
conhost.exe
29->54
started
225
3 other signatures
31->225
215
Uses cmd line tools
excessively to alter
registry or file data
37->215
62
2 other processes
37->62
157
91.212.137.123
TRANSCAPITALNETRU
Russian Federation
41->157
159
91.212.137.155
TRANSCAPITALNETRU
Russian Federation
41->159
161
72 other IPs or domains
41->161
111
C:\Users\user\AppData\Roaming\lbroker.exe, PE32
41->111
dropped
113
C:\Program Files\...\original.exe (copy), PE32+
41->113
dropped
117
2 other malicious files
41->117
dropped
217
Queries sensitive network
adapter information
(via WMI, Win32_NetworkAdapter,
often done to detect
virtual machines)
41->217
219
Contains functionality
to start a terminal
service
41->219
227
10 other signatures
41->227
56
Qtdedcpuf.exe
41->56
started
58
certutil.exe
5
51
41->58
started
60
Ixpla.exe
41->60
started
file9
signatures10
process11
dnsIp12
229
Windows Scripting host
queries suspicious COM
object (likely to drop
second stage)
43->229
64
cmd.exe
43->64
started
231
Uses cmd line tools
excessively to alter
registry or file data
46->231
66
reg.exe
46->66
started
69
conhost.exe
46->69
started
145
172.217.17.78
GOOGLEUS
United States
48->145
147
172.217.19.228
GOOGLEUS
United States
48->147
149
64.233.163.84
GOOGLEUS
United States
48->149
71
original.exe
48->71
started
95
C:\Users\user\AppData\Roaming\...\l4.exe, PE32+
51->95
dropped
97
C:\ProgramData\Microsoft\Windows\...\l4.exe, PE32+
51->97
dropped
233
Drops PE files to the
startup folder
51->233
99
C:\Users\user\AppData\Local\...behaviorgraphxtuum.exe, PE32
56->99
dropped
75
Gxtuum.exe
56->75
started
235
Installs new ROOT certificates
58->235
77
conhost.exe
58->77
started
79
Gxtuum.exe
60->79
started
file13
signatures14
process15
dnsIp16
81
remcos.exe
64->81
started
84
conhost.exe
64->84
started
189
Disables UAC (registry)
66->189
151
192.168.2.8
unknown
unknown
71->151
153
239.255.255.250
unknown
Reserved
71->153
119
e56a48c1-5bc7-4346-a162-5c2be342da1f.tmp, MS
71->119
dropped
121
72379379-16b9-4c66-a357-3499c8b4e18e.tmp, MS
71->121
dropped
123
e300307a-447c-49eb-b030-828ea7a5bdb3.tmp, MS
71->123
dropped
125
3 other malicious files
71->125
dropped
191
Monitors registry run
keys for changes
71->191
193
Tries to harvest and
steal browser information
(history, passwords,
etc)
71->193
195
Installs a global keyboard
hook
71->195
197
Injects a PE file into
a foreign processes
75->197
file17
signatures18
process19
signatures20
173
Antivirus detection
for dropped file
81->173
175
Multi AV Scanner detection
for dropped file
81->175
177
Detected Remcos RAT
81->177
179
3 other signatures
81->179
86
cmd.exe
81->86
started
89
iexplore.exe
81->89
started
process21
signatures22
199
Uses cmd line tools
excessively to alter
registry or file data
86->199
91
conhost.exe
86->91
started
93
reg.exe
86->93
started
201
Detected Remcos RAT
89->201
process23
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.