Analysis
-
max time kernel
135s -
max time network
137s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
09-11-2020 20:49
Static task
static1
Behavioral task
behavioral1
Sample
11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe
Resource
win10v20201028
General
-
Target
11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe
-
Size
257KB
-
MD5
6546310491f91536d50a4afec31d29ad
-
SHA1
fe52fb147856063236b35cfc44109c433c4f80c3
-
SHA256
11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83
-
SHA512
79c52bf52ffa8d35822e9c9496391d3325c44a723e1036dc5bc9ac40769fdecb0abb000db0ff7bf95bf1b51166449540ede564c4902530a07ae1c0319877cfed
Malware Config
Extracted
remcos
vuelta2020.ddns.net:7373
Signatures
-
CoreEntity .NET Packer 1 IoCs
A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.
Processes:
resource yara_rule behavioral1/memory/1040-3-0x0000000000560000-0x0000000000562000-memory.dmp coreentity -
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exewin.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\win\\win.exe\"" 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\win\\win.exe\"" win.exe -
Processes:
resource yara_rule behavioral1/memory/1040-4-0x0000000001E60000-0x0000000001E87000-memory.dmp rezer0 -
Adds policy Run key to start application 2 TTPs 4 IoCs
Processes:
win.exe11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run win.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\win\\win.exe\"" win.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\win\\win.exe\"" 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe -
Executes dropped EXE 2 IoCs
Processes:
win.exewin.exepid process 1616 win.exe 864 win.exe -
Deletes itself 1 IoCs
Processes:
WScript.exepid process 1292 WScript.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 676 cmd.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exewin.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\win\\win.exe\"" 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Windows\CurrentVersion\Run\ win.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\win\\win.exe\"" win.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exewin.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ win.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exewin.exewin.exedescription pid process target process PID 1040 set thread context of 1624 1040 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe PID 1616 set thread context of 864 1616 win.exe win.exe PID 864 set thread context of 1808 864 win.exe iexplore.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1124 schtasks.exe 1756 schtasks.exe -
Suspicious use of WriteProcessMemory 51 IoCs
Processes:
11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exeWScript.execmd.exewin.exewin.exedescription pid process target process PID 1040 wrote to memory of 1124 1040 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe schtasks.exe PID 1040 wrote to memory of 1124 1040 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe schtasks.exe PID 1040 wrote to memory of 1124 1040 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe schtasks.exe PID 1040 wrote to memory of 1124 1040 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe schtasks.exe PID 1040 wrote to memory of 1624 1040 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe PID 1040 wrote to memory of 1624 1040 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe PID 1040 wrote to memory of 1624 1040 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe PID 1040 wrote to memory of 1624 1040 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe PID 1040 wrote to memory of 1624 1040 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe PID 1040 wrote to memory of 1624 1040 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe PID 1040 wrote to memory of 1624 1040 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe PID 1040 wrote to memory of 1624 1040 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe PID 1040 wrote to memory of 1624 1040 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe PID 1040 wrote to memory of 1624 1040 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe PID 1040 wrote to memory of 1624 1040 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe PID 1624 wrote to memory of 1292 1624 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe WScript.exe PID 1624 wrote to memory of 1292 1624 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe WScript.exe PID 1624 wrote to memory of 1292 1624 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe WScript.exe PID 1624 wrote to memory of 1292 1624 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe WScript.exe PID 1292 wrote to memory of 676 1292 WScript.exe cmd.exe PID 1292 wrote to memory of 676 1292 WScript.exe cmd.exe PID 1292 wrote to memory of 676 1292 WScript.exe cmd.exe PID 1292 wrote to memory of 676 1292 WScript.exe cmd.exe PID 676 wrote to memory of 1616 676 cmd.exe win.exe PID 676 wrote to memory of 1616 676 cmd.exe win.exe PID 676 wrote to memory of 1616 676 cmd.exe win.exe PID 676 wrote to memory of 1616 676 cmd.exe win.exe PID 1616 wrote to memory of 1756 1616 win.exe schtasks.exe PID 1616 wrote to memory of 1756 1616 win.exe schtasks.exe PID 1616 wrote to memory of 1756 1616 win.exe schtasks.exe PID 1616 wrote to memory of 1756 1616 win.exe schtasks.exe PID 1616 wrote to memory of 864 1616 win.exe win.exe PID 1616 wrote to memory of 864 1616 win.exe win.exe PID 1616 wrote to memory of 864 1616 win.exe win.exe PID 1616 wrote to memory of 864 1616 win.exe win.exe PID 1616 wrote to memory of 864 1616 win.exe win.exe PID 1616 wrote to memory of 864 1616 win.exe win.exe PID 1616 wrote to memory of 864 1616 win.exe win.exe PID 1616 wrote to memory of 864 1616 win.exe win.exe PID 1616 wrote to memory of 864 1616 win.exe win.exe PID 1616 wrote to memory of 864 1616 win.exe win.exe PID 1616 wrote to memory of 864 1616 win.exe win.exe PID 864 wrote to memory of 1808 864 win.exe iexplore.exe PID 864 wrote to memory of 1808 864 win.exe iexplore.exe PID 864 wrote to memory of 1808 864 win.exe iexplore.exe PID 864 wrote to memory of 1808 864 win.exe iexplore.exe PID 864 wrote to memory of 1808 864 win.exe iexplore.exe PID 864 wrote to memory of 1808 864 win.exe iexplore.exe PID 864 wrote to memory of 1808 864 win.exe iexplore.exe PID 864 wrote to memory of 1808 864 win.exe iexplore.exe PID 864 wrote to memory of 1808 864 win.exe iexplore.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe"C:\Users\Admin\AppData\Local\Temp\11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YEEoAfyRNnKsrH" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6C69.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe"{path}"2⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Adds Run key to start application
- Modifies WinLogon
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\win\win.exe"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\win\win.exeC:\Users\Admin\AppData\Roaming\win\win.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YEEoAfyRNnKsrH" /XML "C:\Users\Admin\AppData\Local\Temp\tmp81EC.tmp"6⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\win\win.exe"{path}"6⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Modifies WinLogon
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"7⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\install.vbsMD5
b1761d84b463c9e5446da97d24428723
SHA19e85ffc552655c87e6aaddf242649481d9453f6b
SHA256c09b10e952b509d49f0488b6209f26ff65c1f8b0a2a63697dca663b5d9146155
SHA51285971d8371df0188b4199dd3e0e069ffbfc210c29c249600b19890db1ee161619936a4c9e3693487378f9fac5af11b11dba53dc14015d4a4f90c705ed9375ffc
-
C:\Users\Admin\AppData\Local\Temp\tmp6C69.tmpMD5
3caf311b74261160e1f95a6179cbe82e
SHA1118806d6de5751a77a100455d2ac3024c5b5a8fa
SHA2562b7f692996750feb2f481a6e3a4e2fcfd9122abbda8b92345f0b73781fe8bb90
SHA5121886b862147d5464342c79092a687784a5041819ba46a66dfb67da86e77b3f471e575f811e3b1599e3bd59e56d2c476628ac86287d3da3e6360d676e0d09435f
-
C:\Users\Admin\AppData\Local\Temp\tmp81EC.tmpMD5
3caf311b74261160e1f95a6179cbe82e
SHA1118806d6de5751a77a100455d2ac3024c5b5a8fa
SHA2562b7f692996750feb2f481a6e3a4e2fcfd9122abbda8b92345f0b73781fe8bb90
SHA5121886b862147d5464342c79092a687784a5041819ba46a66dfb67da86e77b3f471e575f811e3b1599e3bd59e56d2c476628ac86287d3da3e6360d676e0d09435f
-
C:\Users\Admin\AppData\Roaming\win\win.exeMD5
6546310491f91536d50a4afec31d29ad
SHA1fe52fb147856063236b35cfc44109c433c4f80c3
SHA25611a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83
SHA51279c52bf52ffa8d35822e9c9496391d3325c44a723e1036dc5bc9ac40769fdecb0abb000db0ff7bf95bf1b51166449540ede564c4902530a07ae1c0319877cfed
-
C:\Users\Admin\AppData\Roaming\win\win.exeMD5
6546310491f91536d50a4afec31d29ad
SHA1fe52fb147856063236b35cfc44109c433c4f80c3
SHA25611a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83
SHA51279c52bf52ffa8d35822e9c9496391d3325c44a723e1036dc5bc9ac40769fdecb0abb000db0ff7bf95bf1b51166449540ede564c4902530a07ae1c0319877cfed
-
C:\Users\Admin\AppData\Roaming\win\win.exeMD5
6546310491f91536d50a4afec31d29ad
SHA1fe52fb147856063236b35cfc44109c433c4f80c3
SHA25611a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83
SHA51279c52bf52ffa8d35822e9c9496391d3325c44a723e1036dc5bc9ac40769fdecb0abb000db0ff7bf95bf1b51166449540ede564c4902530a07ae1c0319877cfed
-
\Users\Admin\AppData\Roaming\win\win.exeMD5
6546310491f91536d50a4afec31d29ad
SHA1fe52fb147856063236b35cfc44109c433c4f80c3
SHA25611a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83
SHA51279c52bf52ffa8d35822e9c9496391d3325c44a723e1036dc5bc9ac40769fdecb0abb000db0ff7bf95bf1b51166449540ede564c4902530a07ae1c0319877cfed
-
memory/676-12-0x0000000000000000-mapping.dmp
-
memory/864-28-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/864-26-0x0000000000413A84-mapping.dmp
-
memory/1040-3-0x0000000000560000-0x0000000000562000-memory.dmpFilesize
8KB
-
memory/1040-1-0x0000000000380000-0x0000000000381000-memory.dmpFilesize
4KB
-
memory/1040-0-0x0000000074900000-0x0000000074FEE000-memory.dmpFilesize
6.9MB
-
memory/1040-4-0x0000000001E60000-0x0000000001E87000-memory.dmpFilesize
156KB
-
memory/1124-5-0x0000000000000000-mapping.dmp
-
memory/1292-10-0x0000000000000000-mapping.dmp
-
memory/1292-17-0x0000000002770000-0x0000000002774000-memory.dmpFilesize
16KB
-
memory/1616-15-0x0000000000000000-mapping.dmp
-
memory/1616-19-0x0000000001280000-0x0000000001281000-memory.dmpFilesize
4KB
-
memory/1616-18-0x00000000735B0000-0x0000000073C9E000-memory.dmpFilesize
6.9MB
-
memory/1624-7-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1624-8-0x0000000000413A84-mapping.dmp
-
memory/1624-9-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1756-23-0x0000000000000000-mapping.dmp
-
memory/1808-29-0x0000000000400000-0x0000000000446000-memory.dmpFilesize
280KB
-
memory/1808-30-0x000000000044193A-mapping.dmp
-
memory/1808-31-0x0000000000400000-0x0000000000446000-memory.dmpFilesize
280KB
-
memory/1808-32-0x0000000000400000-0x0000000000446000-memory.dmpFilesize
280KB