Analysis
-
max time kernel
12s -
max time network
102s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
09-11-2020 20:49
Static task
static1
Behavioral task
behavioral1
Sample
11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe
Resource
win10v20201028
General
-
Target
11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe
-
Size
257KB
-
MD5
6546310491f91536d50a4afec31d29ad
-
SHA1
fe52fb147856063236b35cfc44109c433c4f80c3
-
SHA256
11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83
-
SHA512
79c52bf52ffa8d35822e9c9496391d3325c44a723e1036dc5bc9ac40769fdecb0abb000db0ff7bf95bf1b51166449540ede564c4902530a07ae1c0319877cfed
Malware Config
Extracted
remcos
vuelta2020.ddns.net:7373
Signatures
-
CoreEntity .NET Packer 1 IoCs
A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.
Processes:
resource yara_rule behavioral2/memory/4800-7-0x0000000005660000-0x0000000005662000-memory.dmp coreentity -
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exewin.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\win\\win.exe\"" 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\win\\win.exe\"" win.exe -
Processes:
resource yara_rule behavioral2/memory/4800-8-0x0000000008E20000-0x0000000008E47000-memory.dmp rezer0 -
Adds policy Run key to start application 2 TTPs 4 IoCs
Processes:
11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exewin.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\win\\win.exe\"" 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run win.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\win\\win.exe\"" win.exe -
Executes dropped EXE 2 IoCs
Processes:
win.exewin.exepid process 1124 win.exe 2036 win.exe -
Deletes itself 1 IoCs
Processes:
WScript.exepid process 4444 WScript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exewin.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\win\\win.exe\"" 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\ win.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\win\\win.exe\"" win.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exewin.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ win.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exewin.exewin.exedescription pid process target process PID 4800 set thread context of 3924 4800 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe PID 1124 set thread context of 2036 1124 win.exe win.exe PID 2036 set thread context of 2192 2036 win.exe iexplore.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4392 schtasks.exe 1612 schtasks.exe -
Modifies registry class 1 IoCs
Processes:
11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exepid process 4800 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe 4800 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exedescription pid process Token: SeDebugPrivilege 4800 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe -
Suspicious use of WriteProcessMemory 46 IoCs
Processes:
11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exeWScript.execmd.exewin.exewin.exedescription pid process target process PID 4800 wrote to memory of 4392 4800 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe schtasks.exe PID 4800 wrote to memory of 4392 4800 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe schtasks.exe PID 4800 wrote to memory of 4392 4800 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe schtasks.exe PID 4800 wrote to memory of 3948 4800 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe PID 4800 wrote to memory of 3948 4800 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe PID 4800 wrote to memory of 3948 4800 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe PID 4800 wrote to memory of 3924 4800 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe PID 4800 wrote to memory of 3924 4800 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe PID 4800 wrote to memory of 3924 4800 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe PID 4800 wrote to memory of 3924 4800 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe PID 4800 wrote to memory of 3924 4800 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe PID 4800 wrote to memory of 3924 4800 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe PID 4800 wrote to memory of 3924 4800 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe PID 4800 wrote to memory of 3924 4800 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe PID 4800 wrote to memory of 3924 4800 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe PID 4800 wrote to memory of 3924 4800 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe PID 3924 wrote to memory of 4444 3924 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe WScript.exe PID 3924 wrote to memory of 4444 3924 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe WScript.exe PID 3924 wrote to memory of 4444 3924 11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe WScript.exe PID 4444 wrote to memory of 1008 4444 WScript.exe cmd.exe PID 4444 wrote to memory of 1008 4444 WScript.exe cmd.exe PID 4444 wrote to memory of 1008 4444 WScript.exe cmd.exe PID 1008 wrote to memory of 1124 1008 cmd.exe win.exe PID 1008 wrote to memory of 1124 1008 cmd.exe win.exe PID 1008 wrote to memory of 1124 1008 cmd.exe win.exe PID 1124 wrote to memory of 1612 1124 win.exe schtasks.exe PID 1124 wrote to memory of 1612 1124 win.exe schtasks.exe PID 1124 wrote to memory of 1612 1124 win.exe schtasks.exe PID 1124 wrote to memory of 2036 1124 win.exe win.exe PID 1124 wrote to memory of 2036 1124 win.exe win.exe PID 1124 wrote to memory of 2036 1124 win.exe win.exe PID 1124 wrote to memory of 2036 1124 win.exe win.exe PID 1124 wrote to memory of 2036 1124 win.exe win.exe PID 1124 wrote to memory of 2036 1124 win.exe win.exe PID 1124 wrote to memory of 2036 1124 win.exe win.exe PID 1124 wrote to memory of 2036 1124 win.exe win.exe PID 1124 wrote to memory of 2036 1124 win.exe win.exe PID 1124 wrote to memory of 2036 1124 win.exe win.exe PID 2036 wrote to memory of 2192 2036 win.exe iexplore.exe PID 2036 wrote to memory of 2192 2036 win.exe iexplore.exe PID 2036 wrote to memory of 2192 2036 win.exe iexplore.exe PID 2036 wrote to memory of 2192 2036 win.exe iexplore.exe PID 2036 wrote to memory of 2192 2036 win.exe iexplore.exe PID 2036 wrote to memory of 2192 2036 win.exe iexplore.exe PID 2036 wrote to memory of 2192 2036 win.exe iexplore.exe PID 2036 wrote to memory of 2192 2036 win.exe iexplore.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe"C:\Users\Admin\AppData\Local\Temp\11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YEEoAfyRNnKsrH" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7507.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\11a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83.exe"{path}"2⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Adds Run key to start application
- Modifies WinLogon
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\win\win.exe"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\win\win.exeC:\Users\Admin\AppData\Roaming\win\win.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YEEoAfyRNnKsrH" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8216.tmp"6⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\win\win.exe"{path}"6⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Modifies WinLogon
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"7⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\install.vbsMD5
b1761d84b463c9e5446da97d24428723
SHA19e85ffc552655c87e6aaddf242649481d9453f6b
SHA256c09b10e952b509d49f0488b6209f26ff65c1f8b0a2a63697dca663b5d9146155
SHA51285971d8371df0188b4199dd3e0e069ffbfc210c29c249600b19890db1ee161619936a4c9e3693487378f9fac5af11b11dba53dc14015d4a4f90c705ed9375ffc
-
C:\Users\Admin\AppData\Local\Temp\tmp7507.tmpMD5
3fa7f43c3b0f9f35f3130e5adcc6da59
SHA115811a162939c98d27273500719bf1c268988f43
SHA2564466b0506781ae5a605f9637439f6b7cdf287d91f022ae4061b7abdd48cdfc7d
SHA512462d26970ebe90103ea95877385217639d363003490a453167b6d4645c48288c9975f29cd9e781b06689f1fcfa52fd49867d4a9d6b6c2dd375999e792bf7c002
-
C:\Users\Admin\AppData\Local\Temp\tmp8216.tmpMD5
3fa7f43c3b0f9f35f3130e5adcc6da59
SHA115811a162939c98d27273500719bf1c268988f43
SHA2564466b0506781ae5a605f9637439f6b7cdf287d91f022ae4061b7abdd48cdfc7d
SHA512462d26970ebe90103ea95877385217639d363003490a453167b6d4645c48288c9975f29cd9e781b06689f1fcfa52fd49867d4a9d6b6c2dd375999e792bf7c002
-
C:\Users\Admin\AppData\Roaming\win\win.exeMD5
6546310491f91536d50a4afec31d29ad
SHA1fe52fb147856063236b35cfc44109c433c4f80c3
SHA25611a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83
SHA51279c52bf52ffa8d35822e9c9496391d3325c44a723e1036dc5bc9ac40769fdecb0abb000db0ff7bf95bf1b51166449540ede564c4902530a07ae1c0319877cfed
-
C:\Users\Admin\AppData\Roaming\win\win.exeMD5
6546310491f91536d50a4afec31d29ad
SHA1fe52fb147856063236b35cfc44109c433c4f80c3
SHA25611a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83
SHA51279c52bf52ffa8d35822e9c9496391d3325c44a723e1036dc5bc9ac40769fdecb0abb000db0ff7bf95bf1b51166449540ede564c4902530a07ae1c0319877cfed
-
C:\Users\Admin\AppData\Roaming\win\win.exeMD5
6546310491f91536d50a4afec31d29ad
SHA1fe52fb147856063236b35cfc44109c433c4f80c3
SHA25611a7d2f2722df45e01851eb75765dbcb21f70ea9c8f89f58b9e8ccacda92cc83
SHA51279c52bf52ffa8d35822e9c9496391d3325c44a723e1036dc5bc9ac40769fdecb0abb000db0ff7bf95bf1b51166449540ede564c4902530a07ae1c0319877cfed
-
memory/1008-16-0x0000000000000000-mapping.dmp
-
memory/1124-20-0x00000000739D0000-0x00000000740BE000-memory.dmpFilesize
6.9MB
-
memory/1124-17-0x0000000000000000-mapping.dmp
-
memory/1612-29-0x0000000000000000-mapping.dmp
-
memory/2036-34-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2036-32-0x0000000000413A84-mapping.dmp
-
memory/2192-35-0x0000000000400000-0x0000000000446000-memory.dmpFilesize
280KB
-
memory/2192-36-0x000000000044193A-mapping.dmp
-
memory/3924-13-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/3924-12-0x0000000000413A84-mapping.dmp
-
memory/3924-11-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/4392-9-0x0000000000000000-mapping.dmp
-
memory/4444-14-0x0000000000000000-mapping.dmp
-
memory/4800-0-0x00000000739D0000-0x00000000740BE000-memory.dmpFilesize
6.9MB
-
memory/4800-8-0x0000000008E20000-0x0000000008E47000-memory.dmpFilesize
156KB
-
memory/4800-7-0x0000000005660000-0x0000000005662000-memory.dmpFilesize
8KB
-
memory/4800-6-0x0000000008D10000-0x0000000008D11000-memory.dmpFilesize
4KB
-
memory/4800-5-0x00000000052D0000-0x00000000052D1000-memory.dmpFilesize
4KB
-
memory/4800-4-0x0000000005210000-0x0000000005211000-memory.dmpFilesize
4KB
-
memory/4800-3-0x0000000005710000-0x0000000005711000-memory.dmpFilesize
4KB
-
memory/4800-1-0x00000000008D0000-0x00000000008D1000-memory.dmpFilesize
4KB