Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
24-12-2020 13:58
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.GenericKD.45131634.12155.15985.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.GenericKD.45131634.12155.15985.exe
Resource
win10v20201028
General
-
Target
SecuriteInfo.com.Trojan.GenericKD.45131634.12155.15985.exe
-
Size
573KB
-
MD5
7b80992176d91fe6ccb5301fb16e3e40
-
SHA1
77bee4b3b07c367f45ea8ecd87eb65b317900fd9
-
SHA256
641a1d0d54fc5d0facf1c2c20d1cb54f60705d67b5990b3be3cfcb7e8c1269a4
-
SHA512
154b6a62df5c058c49ad58ddf0fefedb7675c9e8c06f5a637fd50d9869409772c954271de6f4791b774eb921030afc4d40e50f1523194c86b1c6e795aca258fd
Malware Config
Extracted
remcos
whatgodcannotdodoestnotexist.duckdns.org:2889
Signatures
-
Executes dropped EXE 5 IoCs
Processes:
mgiy.exeAddInProcess32.exeFB_8492.tmp.exeFB_853F.tmp.exeremcos.exepid process 1332 mgiy.exe 3832 AddInProcess32.exe 3980 FB_8492.tmp.exe 760 FB_853F.tmp.exe 3804 remcos.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\bqpd = "C:\\Users\\Admin\\mgiy.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
mgiy.exedescription pid process target process PID 1332 set thread context of 3832 1332 mgiy.exe AddInProcess32.exe -
Modifies registry class 1 IoCs
Processes:
FB_853F.tmp.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings FB_853F.tmp.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
Processes:
SecuriteInfo.com.Trojan.GenericKD.45131634.12155.15985.exemgiy.exepid process 656 SecuriteInfo.com.Trojan.GenericKD.45131634.12155.15985.exe 656 SecuriteInfo.com.Trojan.GenericKD.45131634.12155.15985.exe 656 SecuriteInfo.com.Trojan.GenericKD.45131634.12155.15985.exe 656 SecuriteInfo.com.Trojan.GenericKD.45131634.12155.15985.exe 656 SecuriteInfo.com.Trojan.GenericKD.45131634.12155.15985.exe 656 SecuriteInfo.com.Trojan.GenericKD.45131634.12155.15985.exe 656 SecuriteInfo.com.Trojan.GenericKD.45131634.12155.15985.exe 656 SecuriteInfo.com.Trojan.GenericKD.45131634.12155.15985.exe 656 SecuriteInfo.com.Trojan.GenericKD.45131634.12155.15985.exe 656 SecuriteInfo.com.Trojan.GenericKD.45131634.12155.15985.exe 656 SecuriteInfo.com.Trojan.GenericKD.45131634.12155.15985.exe 656 SecuriteInfo.com.Trojan.GenericKD.45131634.12155.15985.exe 656 SecuriteInfo.com.Trojan.GenericKD.45131634.12155.15985.exe 656 SecuriteInfo.com.Trojan.GenericKD.45131634.12155.15985.exe 656 SecuriteInfo.com.Trojan.GenericKD.45131634.12155.15985.exe 1332 mgiy.exe 1332 mgiy.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
SecuriteInfo.com.Trojan.GenericKD.45131634.12155.15985.exemgiy.exedescription pid process Token: SeDebugPrivilege 656 SecuriteInfo.com.Trojan.GenericKD.45131634.12155.15985.exe Token: SeDebugPrivilege 1332 mgiy.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
remcos.exepid process 3804 remcos.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
SecuriteInfo.com.Trojan.GenericKD.45131634.12155.15985.execmd.exemgiy.exeAddInProcess32.exeFB_853F.tmp.exeWScript.execmd.exedescription pid process target process PID 656 wrote to memory of 3252 656 SecuriteInfo.com.Trojan.GenericKD.45131634.12155.15985.exe cmd.exe PID 656 wrote to memory of 3252 656 SecuriteInfo.com.Trojan.GenericKD.45131634.12155.15985.exe cmd.exe PID 656 wrote to memory of 3252 656 SecuriteInfo.com.Trojan.GenericKD.45131634.12155.15985.exe cmd.exe PID 3252 wrote to memory of 2916 3252 cmd.exe reg.exe PID 3252 wrote to memory of 2916 3252 cmd.exe reg.exe PID 3252 wrote to memory of 2916 3252 cmd.exe reg.exe PID 656 wrote to memory of 1332 656 SecuriteInfo.com.Trojan.GenericKD.45131634.12155.15985.exe mgiy.exe PID 656 wrote to memory of 1332 656 SecuriteInfo.com.Trojan.GenericKD.45131634.12155.15985.exe mgiy.exe PID 656 wrote to memory of 1332 656 SecuriteInfo.com.Trojan.GenericKD.45131634.12155.15985.exe mgiy.exe PID 1332 wrote to memory of 3832 1332 mgiy.exe AddInProcess32.exe PID 1332 wrote to memory of 3832 1332 mgiy.exe AddInProcess32.exe PID 1332 wrote to memory of 3832 1332 mgiy.exe AddInProcess32.exe PID 1332 wrote to memory of 3832 1332 mgiy.exe AddInProcess32.exe PID 1332 wrote to memory of 3832 1332 mgiy.exe AddInProcess32.exe PID 1332 wrote to memory of 3832 1332 mgiy.exe AddInProcess32.exe PID 1332 wrote to memory of 3832 1332 mgiy.exe AddInProcess32.exe PID 1332 wrote to memory of 3832 1332 mgiy.exe AddInProcess32.exe PID 1332 wrote to memory of 3832 1332 mgiy.exe AddInProcess32.exe PID 3832 wrote to memory of 3980 3832 AddInProcess32.exe FB_8492.tmp.exe PID 3832 wrote to memory of 3980 3832 AddInProcess32.exe FB_8492.tmp.exe PID 3832 wrote to memory of 3980 3832 AddInProcess32.exe FB_8492.tmp.exe PID 3832 wrote to memory of 760 3832 AddInProcess32.exe FB_853F.tmp.exe PID 3832 wrote to memory of 760 3832 AddInProcess32.exe FB_853F.tmp.exe PID 3832 wrote to memory of 760 3832 AddInProcess32.exe FB_853F.tmp.exe PID 760 wrote to memory of 2928 760 FB_853F.tmp.exe WScript.exe PID 760 wrote to memory of 2928 760 FB_853F.tmp.exe WScript.exe PID 760 wrote to memory of 2928 760 FB_853F.tmp.exe WScript.exe PID 2928 wrote to memory of 1848 2928 WScript.exe cmd.exe PID 2928 wrote to memory of 1848 2928 WScript.exe cmd.exe PID 2928 wrote to memory of 1848 2928 WScript.exe cmd.exe PID 1848 wrote to memory of 3804 1848 cmd.exe remcos.exe PID 1848 wrote to memory of 3804 1848 cmd.exe remcos.exe PID 1848 wrote to memory of 3804 1848 cmd.exe remcos.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.45131634.12155.15985.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.45131634.12155.15985.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "bqpd" /t REG_SZ /d "C:\Users\Admin\mgiy.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "bqpd" /t REG_SZ /d "C:\Users\Admin\mgiy.exe"3⤵
- Adds Run key to start application
PID:2916 -
C:\Users\Admin\mgiy.exe"C:\Users\Admin\mgiy.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Users\Admin\AppData\Local\Temp\FB_8492.tmp.exe"C:\Users\Admin\AppData\Local\Temp\FB_8492.tmp.exe"4⤵
- Executes dropped EXE
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\FB_853F.tmp.exe"C:\Users\Admin\AppData\Local\Temp\FB_853F.tmp.exe"4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"5⤵
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Roaming\Remcos\remcos.exeC:\Users\Admin\AppData\Roaming\Remcos\remcos.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3804
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
6a673bfc3b67ae9782cb31af2f234c68
SHA17544e89566d91e84e3cd437b9a073e5f6b56566e
SHA256978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e
SHA51272c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39
-
MD5
74bafb3e707c7b0c63938ac200f99c7f
SHA110c5506337845ed9bf25c73d2506f9c15ab8e608
SHA256129450ba06ad589cf6846a455a5b6b5f55e164ee4906e409eb692ab465269689
SHA5125b24dc5acd14f812658e832b587b60695fb16954fca006c2c3a7382ef0ec65c3bd1aaf699425c49ff3cceef16869e75dd6f00ec189b9f673f08f7e1b80cf7781
-
MD5
74bafb3e707c7b0c63938ac200f99c7f
SHA110c5506337845ed9bf25c73d2506f9c15ab8e608
SHA256129450ba06ad589cf6846a455a5b6b5f55e164ee4906e409eb692ab465269689
SHA5125b24dc5acd14f812658e832b587b60695fb16954fca006c2c3a7382ef0ec65c3bd1aaf699425c49ff3cceef16869e75dd6f00ec189b9f673f08f7e1b80cf7781
-
MD5
7d6e5c79b45e0fba39a39cd9a527170c
SHA1bbb55e8fee57adef35682d42bcd4912a9882f8ae
SHA2568c1e3481810bb7479e777a08969828c8d68ab73ea629026fc2e490c51f6e950e
SHA5123f7cd86bd21fcd44a6463da47bdf88bad6864da4125eebf0dd57be9864afecc065c83fffbb3e4bf21c2b52fe4b0c5cfc172563d15cbc8f94132a9d6ad004223b
-
MD5
7d6e5c79b45e0fba39a39cd9a527170c
SHA1bbb55e8fee57adef35682d42bcd4912a9882f8ae
SHA2568c1e3481810bb7479e777a08969828c8d68ab73ea629026fc2e490c51f6e950e
SHA5123f7cd86bd21fcd44a6463da47bdf88bad6864da4125eebf0dd57be9864afecc065c83fffbb3e4bf21c2b52fe4b0c5cfc172563d15cbc8f94132a9d6ad004223b
-
MD5
b92d64fe5b1d1f59df4b738262aea8df
SHA1c8fb1981759c2d9bb2ec91b705985fba5fc7af63
SHA256fa20e9aab03dc8e9f1910aaf0cf42662379fa16ae3a22642084fb97fa3d4f83a
SHA5122566248b93c0cfb0414f033b8dd18bbd4f88180093eac2861107289bcb4ee160f9593706ff1f7d1f2e4ecea430d67a5a2897551a4f9ebd82b707243e300520e2
-
MD5
7d6e5c79b45e0fba39a39cd9a527170c
SHA1bbb55e8fee57adef35682d42bcd4912a9882f8ae
SHA2568c1e3481810bb7479e777a08969828c8d68ab73ea629026fc2e490c51f6e950e
SHA5123f7cd86bd21fcd44a6463da47bdf88bad6864da4125eebf0dd57be9864afecc065c83fffbb3e4bf21c2b52fe4b0c5cfc172563d15cbc8f94132a9d6ad004223b
-
MD5
7d6e5c79b45e0fba39a39cd9a527170c
SHA1bbb55e8fee57adef35682d42bcd4912a9882f8ae
SHA2568c1e3481810bb7479e777a08969828c8d68ab73ea629026fc2e490c51f6e950e
SHA5123f7cd86bd21fcd44a6463da47bdf88bad6864da4125eebf0dd57be9864afecc065c83fffbb3e4bf21c2b52fe4b0c5cfc172563d15cbc8f94132a9d6ad004223b
-
MD5
7b80992176d91fe6ccb5301fb16e3e40
SHA177bee4b3b07c367f45ea8ecd87eb65b317900fd9
SHA256641a1d0d54fc5d0facf1c2c20d1cb54f60705d67b5990b3be3cfcb7e8c1269a4
SHA512154b6a62df5c058c49ad58ddf0fefedb7675c9e8c06f5a637fd50d9869409772c954271de6f4791b774eb921030afc4d40e50f1523194c86b1c6e795aca258fd
-
MD5
7b80992176d91fe6ccb5301fb16e3e40
SHA177bee4b3b07c367f45ea8ecd87eb65b317900fd9
SHA256641a1d0d54fc5d0facf1c2c20d1cb54f60705d67b5990b3be3cfcb7e8c1269a4
SHA512154b6a62df5c058c49ad58ddf0fefedb7675c9e8c06f5a637fd50d9869409772c954271de6f4791b774eb921030afc4d40e50f1523194c86b1c6e795aca258fd