Threat name:
Remcos, DBatLoader, DarkCloud, PureLog S
Alert
Classification:
rans.phis.troj.spyw.expl.evad
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Allocates many large memory junks
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to inject code into remote processes
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Drops VBS files to the startup folder
Early bird code injection technique detected
Found malware configuration
Injects a PE file into a foreign processes
Installs a global keyboard hook
JavaScript file contains suspicious strings
Joe Sandbox ML detected suspicious sample
JScript performs obfuscated calls to suspicious functions
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sigma detected: DLL Search Order Hijackig Via Additional Space in Path
Sigma detected: Drops script at startup location
Sigma detected: Execution from Suspicious Folder
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Rare Remote Thread Creation By Uncommon Source Image
Sigma detected: WScript or CScript Dropper
Suricata IDS alerts for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Uses ping.exe to check the status of other devices and networks
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Yara detected Generic Dropper
Yara detected PureLog Stealer
Yara detected ResolverRAT
Yara detected Telegram RAT
Yara detected WebBrowserPassView password recovery tool
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1771894
Sample:
IMG-202508-WA0008.js
Startdate:
05/09/2025
Architecture:
WINDOWS
Score:
100
90
vestcast.co
2->90
92
showip.net
2->92
94
geoplugin.net
2->94
140
Suricata IDS alerts
for network traffic
2->140
142
Found malware configuration
2->142
144
Malicious sample detected
(through community Yara
rule)
2->144
146
25 other signatures
2->146
10
wscript.exe
1
2
2->10
started
14
wscript.exe
2->14
started
16
rundll32.exe
3
2->16
started
18
wscript.exe
2->18
started
signatures3
process4
file5
74
C:\Users\user\AppData\Local\Temp\x.exe, PE32
10->74
dropped
168
Benign windows process
drops PE files
10->168
170
JScript performs obfuscated
calls to suspicious
functions
10->170
172
Windows Scripting host
queries suspicious COM
object (likely to drop
second stage)
10->172
20
x.exe
6
10->20
started
24
Key.exe
14->24
started
26
Sjszrehd.exe
16->26
started
28
IsInvalid.exe
18->28
started
signatures6
process7
file8
72
C:\Users\Public\...\Sjszrehd.exe (copy), PE32
20->72
dropped
152
Antivirus detection
for dropped file
20->152
154
Multi AV Scanner detection
for dropped file
20->154
156
Early bird code injection
technique detected
20->156
166
3 other signatures
20->166
30
SndVol.exe
2
12
20->30
started
35
cmd.exe
3
20->35
started
37
cmd.exe
1
20->37
started
45
2 other processes
20->45
39
InstallUtil.exe
24->39
started
158
Allocates memory in
foreign processes
26->158
160
Allocates many large
memory junks
26->160
41
SndVol.exe
26->41
started
162
Writes to foreign memory
regions
28->162
164
Injects a PE file into
a foreign processes
28->164
43
InstallUtil.exe
28->43
started
signatures9
process10
dnsIp11
100
geoplugin.net
178.237.33.50, 49692, 80
ATOM86-ASATOM86NL
Netherlands
30->100
102
vestcast.co
147.124.215.99, 2490, 49687, 49688
AC-AS-1US
United States
30->102
76
C:\Users\user\AppData\Roaming\dwn.exe, PE32
30->76
dropped
78
C:\Users\user\AppData\Local\Temp\dwn.exe, PE32
30->78
dropped
80
C:\ProgramData\remcos\logs.dat, data
30->80
dropped
104
Detected Remcos RAT
30->104
106
Contains functionalty
to change the wallpaper
30->106
108
Contains functionality
to steal Chrome passwords
or cookies
30->108
120
6 other signatures
30->120
47
dwn.exe
30->47
started
51
dwn.exe
30->51
started
53
SndVol.exe
1
30->53
started
64
3 other processes
30->64
110
Uses ping.exe to sleep
35->110
112
Uses ping.exe to check
the status of other
devices and networks
35->112
55
conhost.exe
35->55
started
57
PING.EXE
1
37->57
started
60
conhost.exe
37->60
started
114
Tries to harvest and
steal Putty / WinSCP
information (sessions,
passwords, etc)
39->114
116
Tries to steal Mail
credentials (via file
/ registry access)
39->116
118
Tries to harvest and
steal browser information
(history, passwords,
etc)
39->118
62
conhost.exe
45->62
started
file12
signatures13
process14
dnsIp15
82
C:\Users\user\AppData\Roaming\Key.exe, PE32
47->82
dropped
84
C:\Users\user\AppData\Roaming\...\Key.vbs, ASCII
47->84
dropped
122
Antivirus detection
for dropped file
47->122
124
Multi AV Scanner detection
for dropped file
47->124
126
Drops VBS files to the
startup folder
47->126
128
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
47->128
66
InstallUtil.exe
47->66
started
86
C:\Users\user\AppData\Roaming\IsInvalid.exe, PE32
51->86
dropped
88
C:\Users\user\AppData\...\IsInvalid.vbs, ASCII
51->88
dropped
130
Writes to foreign memory
regions
51->130
132
Injects a PE file into
a foreign processes
51->132
70
InstallUtil.exe
51->70
started
134
Tries to steal Instant
Messenger accounts or
passwords
53->134
136
Tries to steal Mail
credentials (via file
/ registry access)
53->136
98
127.0.0.1
unknown
unknown
57->98
138
Tries to harvest and
steal browser information
(history, passwords,
etc)
64->138
file16
signatures17
process18
dnsIp19
96
showip.net
162.55.60.2, 49697, 49698, 49704
ACPCA
United States
66->96
148
Tries to harvest and
steal Putty / WinSCP
information (sessions,
passwords, etc)
66->148
150
Tries to steal Mail
credentials (via file
/ registry access)
66->150
signatures20
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.