Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
11-01-2021 17:52
Static task
static1
Behavioral task
behavioral1
Sample
346c907243ff30e626f16d66fabf0af1.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
346c907243ff30e626f16d66fabf0af1.exe
Resource
win10v20201028
General
-
Target
346c907243ff30e626f16d66fabf0af1.exe
-
Size
1.3MB
-
MD5
346c907243ff30e626f16d66fabf0af1
-
SHA1
27892c130128c844142040643de37e4c7092a715
-
SHA256
019efe7373d58e57856b8f4757aa1e3a4df202415ea326194ec2a93f04aa2ac8
-
SHA512
d6622abdb1414641a345ea1e24612d53391848550de270538e0725879ced94ceb9333eeb3804ab2a3938f588257557f1c32a9c068639cc8872d364f16fa0676b
Malware Config
Extracted
remcos
swryijgrvcsgkopnmcdertvgdswbvmophtfdczxs.ydns.eu:2017
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
vlc.exevlc.exepid process 3712 vlc.exe 2432 vlc.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
346c907243ff30e626f16d66fabf0af1.exevlc.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 346c907243ff30e626f16d66fabf0af1.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\win = "\"C:\\Users\\Admin\\AppData\\Roaming\\vlc.exe\"" 346c907243ff30e626f16d66fabf0af1.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\ vlc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\win = "\"C:\\Users\\Admin\\AppData\\Roaming\\vlc.exe\"" vlc.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 24 IoCs
Processes:
346c907243ff30e626f16d66fabf0af1.exevlc.exepid process 64 346c907243ff30e626f16d66fabf0af1.exe 64 346c907243ff30e626f16d66fabf0af1.exe 64 346c907243ff30e626f16d66fabf0af1.exe 64 346c907243ff30e626f16d66fabf0af1.exe 64 346c907243ff30e626f16d66fabf0af1.exe 64 346c907243ff30e626f16d66fabf0af1.exe 64 346c907243ff30e626f16d66fabf0af1.exe 64 346c907243ff30e626f16d66fabf0af1.exe 64 346c907243ff30e626f16d66fabf0af1.exe 64 346c907243ff30e626f16d66fabf0af1.exe 64 346c907243ff30e626f16d66fabf0af1.exe 64 346c907243ff30e626f16d66fabf0af1.exe 3712 vlc.exe 3712 vlc.exe 3712 vlc.exe 3712 vlc.exe 3712 vlc.exe 3712 vlc.exe 3712 vlc.exe 3712 vlc.exe 3712 vlc.exe 3712 vlc.exe 3712 vlc.exe 3712 vlc.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
346c907243ff30e626f16d66fabf0af1.exevlc.exedescription pid process target process PID 64 set thread context of 588 64 346c907243ff30e626f16d66fabf0af1.exe 346c907243ff30e626f16d66fabf0af1.exe PID 3712 set thread context of 2432 3712 vlc.exe vlc.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1592 64 WerFault.exe 346c907243ff30e626f16d66fabf0af1.exe 2876 3712 WerFault.exe vlc.exe -
Delays execution with timeout.exe 6 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid process 2880 timeout.exe 3496 timeout.exe 1336 timeout.exe 1328 timeout.exe 2092 timeout.exe 584 timeout.exe -
Modifies registry class 1 IoCs
Processes:
346c907243ff30e626f16d66fabf0af1.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings 346c907243ff30e626f16d66fabf0af1.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
Processes:
346c907243ff30e626f16d66fabf0af1.exeWerFault.exevlc.exeWerFault.exepid process 64 346c907243ff30e626f16d66fabf0af1.exe 64 346c907243ff30e626f16d66fabf0af1.exe 64 346c907243ff30e626f16d66fabf0af1.exe 1592 WerFault.exe 1592 WerFault.exe 1592 WerFault.exe 1592 WerFault.exe 1592 WerFault.exe 1592 WerFault.exe 1592 WerFault.exe 1592 WerFault.exe 1592 WerFault.exe 1592 WerFault.exe 1592 WerFault.exe 1592 WerFault.exe 1592 WerFault.exe 1592 WerFault.exe 3712 vlc.exe 3712 vlc.exe 3712 vlc.exe 2876 WerFault.exe 2876 WerFault.exe 2876 WerFault.exe 2876 WerFault.exe 2876 WerFault.exe 2876 WerFault.exe 2876 WerFault.exe 2876 WerFault.exe 2876 WerFault.exe 2876 WerFault.exe 2876 WerFault.exe 2876 WerFault.exe 2876 WerFault.exe 2876 WerFault.exe 2876 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
vlc.exepid process 2432 vlc.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
346c907243ff30e626f16d66fabf0af1.exeWerFault.exevlc.exeWerFault.exedescription pid process Token: SeDebugPrivilege 64 346c907243ff30e626f16d66fabf0af1.exe Token: SeRestorePrivilege 1592 WerFault.exe Token: SeBackupPrivilege 1592 WerFault.exe Token: SeDebugPrivilege 1592 WerFault.exe Token: SeDebugPrivilege 3712 vlc.exe Token: SeDebugPrivilege 2876 WerFault.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
vlc.exepid process 2432 vlc.exe -
Suspicious use of WriteProcessMemory 65 IoCs
Processes:
346c907243ff30e626f16d66fabf0af1.execmd.execmd.execmd.exe346c907243ff30e626f16d66fabf0af1.exeWScript.execmd.exevlc.execmd.execmd.execmd.exedescription pid process target process PID 64 wrote to memory of 2688 64 346c907243ff30e626f16d66fabf0af1.exe cmd.exe PID 64 wrote to memory of 2688 64 346c907243ff30e626f16d66fabf0af1.exe cmd.exe PID 64 wrote to memory of 2688 64 346c907243ff30e626f16d66fabf0af1.exe cmd.exe PID 2688 wrote to memory of 2880 2688 cmd.exe timeout.exe PID 2688 wrote to memory of 2880 2688 cmd.exe timeout.exe PID 2688 wrote to memory of 2880 2688 cmd.exe timeout.exe PID 64 wrote to memory of 2204 64 346c907243ff30e626f16d66fabf0af1.exe cmd.exe PID 64 wrote to memory of 2204 64 346c907243ff30e626f16d66fabf0af1.exe cmd.exe PID 64 wrote to memory of 2204 64 346c907243ff30e626f16d66fabf0af1.exe cmd.exe PID 2204 wrote to memory of 3496 2204 cmd.exe timeout.exe PID 2204 wrote to memory of 3496 2204 cmd.exe timeout.exe PID 2204 wrote to memory of 3496 2204 cmd.exe timeout.exe PID 64 wrote to memory of 2780 64 346c907243ff30e626f16d66fabf0af1.exe cmd.exe PID 64 wrote to memory of 2780 64 346c907243ff30e626f16d66fabf0af1.exe cmd.exe PID 64 wrote to memory of 2780 64 346c907243ff30e626f16d66fabf0af1.exe cmd.exe PID 2780 wrote to memory of 1336 2780 cmd.exe timeout.exe PID 2780 wrote to memory of 1336 2780 cmd.exe timeout.exe PID 2780 wrote to memory of 1336 2780 cmd.exe timeout.exe PID 64 wrote to memory of 588 64 346c907243ff30e626f16d66fabf0af1.exe 346c907243ff30e626f16d66fabf0af1.exe PID 64 wrote to memory of 588 64 346c907243ff30e626f16d66fabf0af1.exe 346c907243ff30e626f16d66fabf0af1.exe PID 64 wrote to memory of 588 64 346c907243ff30e626f16d66fabf0af1.exe 346c907243ff30e626f16d66fabf0af1.exe PID 64 wrote to memory of 588 64 346c907243ff30e626f16d66fabf0af1.exe 346c907243ff30e626f16d66fabf0af1.exe PID 64 wrote to memory of 588 64 346c907243ff30e626f16d66fabf0af1.exe 346c907243ff30e626f16d66fabf0af1.exe PID 64 wrote to memory of 588 64 346c907243ff30e626f16d66fabf0af1.exe 346c907243ff30e626f16d66fabf0af1.exe PID 64 wrote to memory of 588 64 346c907243ff30e626f16d66fabf0af1.exe 346c907243ff30e626f16d66fabf0af1.exe PID 64 wrote to memory of 588 64 346c907243ff30e626f16d66fabf0af1.exe 346c907243ff30e626f16d66fabf0af1.exe PID 64 wrote to memory of 588 64 346c907243ff30e626f16d66fabf0af1.exe 346c907243ff30e626f16d66fabf0af1.exe PID 64 wrote to memory of 588 64 346c907243ff30e626f16d66fabf0af1.exe 346c907243ff30e626f16d66fabf0af1.exe PID 588 wrote to memory of 3884 588 346c907243ff30e626f16d66fabf0af1.exe WScript.exe PID 588 wrote to memory of 3884 588 346c907243ff30e626f16d66fabf0af1.exe WScript.exe PID 588 wrote to memory of 3884 588 346c907243ff30e626f16d66fabf0af1.exe WScript.exe PID 3884 wrote to memory of 2176 3884 WScript.exe cmd.exe PID 3884 wrote to memory of 2176 3884 WScript.exe cmd.exe PID 3884 wrote to memory of 2176 3884 WScript.exe cmd.exe PID 2176 wrote to memory of 3712 2176 cmd.exe vlc.exe PID 2176 wrote to memory of 3712 2176 cmd.exe vlc.exe PID 2176 wrote to memory of 3712 2176 cmd.exe vlc.exe PID 3712 wrote to memory of 772 3712 vlc.exe cmd.exe PID 3712 wrote to memory of 772 3712 vlc.exe cmd.exe PID 3712 wrote to memory of 772 3712 vlc.exe cmd.exe PID 772 wrote to memory of 1328 772 cmd.exe timeout.exe PID 772 wrote to memory of 1328 772 cmd.exe timeout.exe PID 772 wrote to memory of 1328 772 cmd.exe timeout.exe PID 3712 wrote to memory of 488 3712 vlc.exe cmd.exe PID 3712 wrote to memory of 488 3712 vlc.exe cmd.exe PID 3712 wrote to memory of 488 3712 vlc.exe cmd.exe PID 488 wrote to memory of 2092 488 cmd.exe timeout.exe PID 488 wrote to memory of 2092 488 cmd.exe timeout.exe PID 488 wrote to memory of 2092 488 cmd.exe timeout.exe PID 3712 wrote to memory of 3440 3712 vlc.exe cmd.exe PID 3712 wrote to memory of 3440 3712 vlc.exe cmd.exe PID 3712 wrote to memory of 3440 3712 vlc.exe cmd.exe PID 3440 wrote to memory of 584 3440 cmd.exe timeout.exe PID 3440 wrote to memory of 584 3440 cmd.exe timeout.exe PID 3440 wrote to memory of 584 3440 cmd.exe timeout.exe PID 3712 wrote to memory of 2432 3712 vlc.exe vlc.exe PID 3712 wrote to memory of 2432 3712 vlc.exe vlc.exe PID 3712 wrote to memory of 2432 3712 vlc.exe vlc.exe PID 3712 wrote to memory of 2432 3712 vlc.exe vlc.exe PID 3712 wrote to memory of 2432 3712 vlc.exe vlc.exe PID 3712 wrote to memory of 2432 3712 vlc.exe vlc.exe PID 3712 wrote to memory of 2432 3712 vlc.exe vlc.exe PID 3712 wrote to memory of 2432 3712 vlc.exe vlc.exe PID 3712 wrote to memory of 2432 3712 vlc.exe vlc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\346c907243ff30e626f16d66fabf0af1.exe"C:\Users\Admin\AppData\Local\Temp\346c907243ff30e626f16d66fabf0af1.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 12⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2880 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 12⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3496 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 12⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\346c907243ff30e626f16d66fabf0af1.exe"C:\Users\Admin\AppData\Local\Temp\346c907243ff30e626f16d66fabf0af1.exe"2⤵
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"3⤵
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\vlc.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Roaming\vlc.exeC:\Users\Admin\AppData\Roaming\vlc.exe5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 16⤵
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\SysWOW64\timeout.exetimeout 17⤵
- Delays execution with timeout.exe
PID:1328 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 16⤵
- Suspicious use of WriteProcessMemory
PID:488 -
C:\Windows\SysWOW64\timeout.exetimeout 17⤵
- Delays execution with timeout.exe
PID:2092 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 16⤵
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Windows\SysWOW64\timeout.exetimeout 17⤵
- Delays execution with timeout.exe
PID:584 -
C:\Users\Admin\AppData\Roaming\vlc.exe"C:\Users\Admin\AppData\Roaming\vlc.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3712 -s 10326⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2876 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 64 -s 15882⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1592
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
0fd303b21c1a43c6a9078e6f5280ca85
SHA10db8f1ae34f4e2e72184e337951fde826c0bd26f
SHA2565d8c6cfdf8fc198c4fd279487e5c1620ece89e39781c6337f4cb5e111e606ddc
SHA512be4cdd48940bead0274c7cf08abd9bc75b5db468159cbf883198712d0bb15ad81a069638c628eba62237cfa0a197f845c0d9e1f4727c9608a8d642f7aba38671
-
MD5
346c907243ff30e626f16d66fabf0af1
SHA127892c130128c844142040643de37e4c7092a715
SHA256019efe7373d58e57856b8f4757aa1e3a4df202415ea326194ec2a93f04aa2ac8
SHA512d6622abdb1414641a345ea1e24612d53391848550de270538e0725879ced94ceb9333eeb3804ab2a3938f588257557f1c32a9c068639cc8872d364f16fa0676b
-
MD5
346c907243ff30e626f16d66fabf0af1
SHA127892c130128c844142040643de37e4c7092a715
SHA256019efe7373d58e57856b8f4757aa1e3a4df202415ea326194ec2a93f04aa2ac8
SHA512d6622abdb1414641a345ea1e24612d53391848550de270538e0725879ced94ceb9333eeb3804ab2a3938f588257557f1c32a9c068639cc8872d364f16fa0676b
-
MD5
346c907243ff30e626f16d66fabf0af1
SHA127892c130128c844142040643de37e4c7092a715
SHA256019efe7373d58e57856b8f4757aa1e3a4df202415ea326194ec2a93f04aa2ac8
SHA512d6622abdb1414641a345ea1e24612d53391848550de270538e0725879ced94ceb9333eeb3804ab2a3938f588257557f1c32a9c068639cc8872d364f16fa0676b