Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
12-01-2021 06:56
Static task
static1
Behavioral task
behavioral1
Sample
7a99807a434f33b10783b43bc2906fbe.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
7a99807a434f33b10783b43bc2906fbe.exe
Resource
win10v20201028
General
-
Target
7a99807a434f33b10783b43bc2906fbe.exe
-
Size
1.3MB
-
MD5
7a99807a434f33b10783b43bc2906fbe
-
SHA1
070af96b019f7e8f0d0dfa1ccd51a41f2f127c7e
-
SHA256
09a2e4f8534369466eba713828653e44916f2307420fc47306b1b9cfff181e2c
-
SHA512
d83ef5e5ca85f600cb3cedadd686f6c677aa26682f1f2c48816195ae94303ac632574b92f4a8742f6703f798b6d4432cecd05a042cf4c0867da998fb5b8ed591
Malware Config
Extracted
remcos
swryijgrvcsgkopnmcdertvgdswbvmophtfdczxs.ydns.eu:2017
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
vlc.exevlc.exepid process 1756 vlc.exe 1972 vlc.exe -
Loads dropped DLL 5 IoCs
Processes:
cmd.exeWerFault.exepid process 344 cmd.exe 344 cmd.exe 768 WerFault.exe 768 WerFault.exe 768 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
vlc.exe7a99807a434f33b10783b43bc2906fbe.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Windows\CurrentVersion\Run\ vlc.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Windows\CurrentVersion\Run\win = "\"C:\\Users\\Admin\\AppData\\Roaming\\vlc.exe\"" vlc.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 7a99807a434f33b10783b43bc2906fbe.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Windows\CurrentVersion\Run\win = "\"C:\\Users\\Admin\\AppData\\Roaming\\vlc.exe\"" 7a99807a434f33b10783b43bc2906fbe.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
Processes:
7a99807a434f33b10783b43bc2906fbe.exevlc.exepid process 1036 7a99807a434f33b10783b43bc2906fbe.exe 1036 7a99807a434f33b10783b43bc2906fbe.exe 1036 7a99807a434f33b10783b43bc2906fbe.exe 1036 7a99807a434f33b10783b43bc2906fbe.exe 1036 7a99807a434f33b10783b43bc2906fbe.exe 1036 7a99807a434f33b10783b43bc2906fbe.exe 1036 7a99807a434f33b10783b43bc2906fbe.exe 1756 vlc.exe 1756 vlc.exe 1756 vlc.exe 1756 vlc.exe 1756 vlc.exe 1756 vlc.exe 1756 vlc.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
7a99807a434f33b10783b43bc2906fbe.exevlc.exedescription pid process target process PID 1036 set thread context of 1532 1036 7a99807a434f33b10783b43bc2906fbe.exe 7a99807a434f33b10783b43bc2906fbe.exe PID 1756 set thread context of 1972 1756 vlc.exe vlc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 768 1756 WerFault.exe vlc.exe -
Delays execution with timeout.exe 6 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid process 1604 timeout.exe 1992 timeout.exe 1948 timeout.exe 1156 timeout.exe 1948 timeout.exe 684 timeout.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
7a99807a434f33b10783b43bc2906fbe.exevlc.exeWerFault.exepid process 1036 7a99807a434f33b10783b43bc2906fbe.exe 1036 7a99807a434f33b10783b43bc2906fbe.exe 1036 7a99807a434f33b10783b43bc2906fbe.exe 1756 vlc.exe 1756 vlc.exe 1756 vlc.exe 768 WerFault.exe 768 WerFault.exe 768 WerFault.exe 768 WerFault.exe 768 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
7a99807a434f33b10783b43bc2906fbe.exevlc.exeWerFault.exedescription pid process Token: SeDebugPrivilege 1036 7a99807a434f33b10783b43bc2906fbe.exe Token: SeDebugPrivilege 1756 vlc.exe Token: SeDebugPrivilege 768 WerFault.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
vlc.exepid process 1972 vlc.exe -
Suspicious use of WriteProcessMemory 86 IoCs
Processes:
7a99807a434f33b10783b43bc2906fbe.execmd.execmd.execmd.exe7a99807a434f33b10783b43bc2906fbe.exeWScript.execmd.exevlc.execmd.execmd.exedescription pid process target process PID 1036 wrote to memory of 1500 1036 7a99807a434f33b10783b43bc2906fbe.exe cmd.exe PID 1036 wrote to memory of 1500 1036 7a99807a434f33b10783b43bc2906fbe.exe cmd.exe PID 1036 wrote to memory of 1500 1036 7a99807a434f33b10783b43bc2906fbe.exe cmd.exe PID 1036 wrote to memory of 1500 1036 7a99807a434f33b10783b43bc2906fbe.exe cmd.exe PID 1500 wrote to memory of 1156 1500 cmd.exe timeout.exe PID 1500 wrote to memory of 1156 1500 cmd.exe timeout.exe PID 1500 wrote to memory of 1156 1500 cmd.exe timeout.exe PID 1500 wrote to memory of 1156 1500 cmd.exe timeout.exe PID 1036 wrote to memory of 1976 1036 7a99807a434f33b10783b43bc2906fbe.exe cmd.exe PID 1036 wrote to memory of 1976 1036 7a99807a434f33b10783b43bc2906fbe.exe cmd.exe PID 1036 wrote to memory of 1976 1036 7a99807a434f33b10783b43bc2906fbe.exe cmd.exe PID 1036 wrote to memory of 1976 1036 7a99807a434f33b10783b43bc2906fbe.exe cmd.exe PID 1976 wrote to memory of 1948 1976 cmd.exe timeout.exe PID 1976 wrote to memory of 1948 1976 cmd.exe timeout.exe PID 1976 wrote to memory of 1948 1976 cmd.exe timeout.exe PID 1976 wrote to memory of 1948 1976 cmd.exe timeout.exe PID 1036 wrote to memory of 1744 1036 7a99807a434f33b10783b43bc2906fbe.exe cmd.exe PID 1036 wrote to memory of 1744 1036 7a99807a434f33b10783b43bc2906fbe.exe cmd.exe PID 1036 wrote to memory of 1744 1036 7a99807a434f33b10783b43bc2906fbe.exe cmd.exe PID 1036 wrote to memory of 1744 1036 7a99807a434f33b10783b43bc2906fbe.exe cmd.exe PID 1744 wrote to memory of 684 1744 cmd.exe timeout.exe PID 1744 wrote to memory of 684 1744 cmd.exe timeout.exe PID 1744 wrote to memory of 684 1744 cmd.exe timeout.exe PID 1744 wrote to memory of 684 1744 cmd.exe timeout.exe PID 1036 wrote to memory of 1532 1036 7a99807a434f33b10783b43bc2906fbe.exe 7a99807a434f33b10783b43bc2906fbe.exe PID 1036 wrote to memory of 1532 1036 7a99807a434f33b10783b43bc2906fbe.exe 7a99807a434f33b10783b43bc2906fbe.exe PID 1036 wrote to memory of 1532 1036 7a99807a434f33b10783b43bc2906fbe.exe 7a99807a434f33b10783b43bc2906fbe.exe PID 1036 wrote to memory of 1532 1036 7a99807a434f33b10783b43bc2906fbe.exe 7a99807a434f33b10783b43bc2906fbe.exe PID 1036 wrote to memory of 1532 1036 7a99807a434f33b10783b43bc2906fbe.exe 7a99807a434f33b10783b43bc2906fbe.exe PID 1036 wrote to memory of 1532 1036 7a99807a434f33b10783b43bc2906fbe.exe 7a99807a434f33b10783b43bc2906fbe.exe PID 1036 wrote to memory of 1532 1036 7a99807a434f33b10783b43bc2906fbe.exe 7a99807a434f33b10783b43bc2906fbe.exe PID 1036 wrote to memory of 1532 1036 7a99807a434f33b10783b43bc2906fbe.exe 7a99807a434f33b10783b43bc2906fbe.exe PID 1036 wrote to memory of 1532 1036 7a99807a434f33b10783b43bc2906fbe.exe 7a99807a434f33b10783b43bc2906fbe.exe PID 1036 wrote to memory of 1532 1036 7a99807a434f33b10783b43bc2906fbe.exe 7a99807a434f33b10783b43bc2906fbe.exe PID 1036 wrote to memory of 1532 1036 7a99807a434f33b10783b43bc2906fbe.exe 7a99807a434f33b10783b43bc2906fbe.exe PID 1532 wrote to memory of 884 1532 7a99807a434f33b10783b43bc2906fbe.exe WScript.exe PID 1532 wrote to memory of 884 1532 7a99807a434f33b10783b43bc2906fbe.exe WScript.exe PID 1532 wrote to memory of 884 1532 7a99807a434f33b10783b43bc2906fbe.exe WScript.exe PID 1532 wrote to memory of 884 1532 7a99807a434f33b10783b43bc2906fbe.exe WScript.exe PID 884 wrote to memory of 344 884 WScript.exe cmd.exe PID 884 wrote to memory of 344 884 WScript.exe cmd.exe PID 884 wrote to memory of 344 884 WScript.exe cmd.exe PID 884 wrote to memory of 344 884 WScript.exe cmd.exe PID 344 wrote to memory of 1756 344 cmd.exe vlc.exe PID 344 wrote to memory of 1756 344 cmd.exe vlc.exe PID 344 wrote to memory of 1756 344 cmd.exe vlc.exe PID 344 wrote to memory of 1756 344 cmd.exe vlc.exe PID 1756 wrote to memory of 808 1756 vlc.exe cmd.exe PID 1756 wrote to memory of 808 1756 vlc.exe cmd.exe PID 1756 wrote to memory of 808 1756 vlc.exe cmd.exe PID 1756 wrote to memory of 808 1756 vlc.exe cmd.exe PID 808 wrote to memory of 1604 808 cmd.exe timeout.exe PID 808 wrote to memory of 1604 808 cmd.exe timeout.exe PID 808 wrote to memory of 1604 808 cmd.exe timeout.exe PID 808 wrote to memory of 1604 808 cmd.exe timeout.exe PID 1756 wrote to memory of 1572 1756 vlc.exe cmd.exe PID 1756 wrote to memory of 1572 1756 vlc.exe cmd.exe PID 1756 wrote to memory of 1572 1756 vlc.exe cmd.exe PID 1756 wrote to memory of 1572 1756 vlc.exe cmd.exe PID 1572 wrote to memory of 1992 1572 cmd.exe timeout.exe PID 1572 wrote to memory of 1992 1572 cmd.exe timeout.exe PID 1572 wrote to memory of 1992 1572 cmd.exe timeout.exe PID 1572 wrote to memory of 1992 1572 cmd.exe timeout.exe PID 1756 wrote to memory of 1248 1756 vlc.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a99807a434f33b10783b43bc2906fbe.exe"C:\Users\Admin\AppData\Local\Temp\7a99807a434f33b10783b43bc2906fbe.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 12⤵
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1156
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 12⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1948
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 12⤵
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:684
-
-
-
C:\Users\Admin\AppData\Local\Temp\7a99807a434f33b10783b43bc2906fbe.exe"C:\Users\Admin\AppData\Local\Temp\7a99807a434f33b10783b43bc2906fbe.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"3⤵
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\vlc.exe"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Users\Admin\AppData\Roaming\vlc.exeC:\Users\Admin\AppData\Roaming\vlc.exe5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 16⤵
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\SysWOW64\timeout.exetimeout 17⤵
- Delays execution with timeout.exe
PID:1604
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 16⤵
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\timeout.exetimeout 17⤵
- Delays execution with timeout.exe
PID:1992
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 16⤵PID:1248
-
C:\Windows\SysWOW64\timeout.exetimeout 17⤵
- Delays execution with timeout.exe
PID:1948
-
-
-
C:\Users\Admin\AppData\Roaming\vlc.exe"C:\Users\Admin\AppData\Roaming\vlc.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1756 -s 9566⤵
- Loads dropped DLL
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:768
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
0fd303b21c1a43c6a9078e6f5280ca85
SHA10db8f1ae34f4e2e72184e337951fde826c0bd26f
SHA2565d8c6cfdf8fc198c4fd279487e5c1620ece89e39781c6337f4cb5e111e606ddc
SHA512be4cdd48940bead0274c7cf08abd9bc75b5db468159cbf883198712d0bb15ad81a069638c628eba62237cfa0a197f845c0d9e1f4727c9608a8d642f7aba38671
-
MD5
7a99807a434f33b10783b43bc2906fbe
SHA1070af96b019f7e8f0d0dfa1ccd51a41f2f127c7e
SHA25609a2e4f8534369466eba713828653e44916f2307420fc47306b1b9cfff181e2c
SHA512d83ef5e5ca85f600cb3cedadd686f6c677aa26682f1f2c48816195ae94303ac632574b92f4a8742f6703f798b6d4432cecd05a042cf4c0867da998fb5b8ed591
-
MD5
7a99807a434f33b10783b43bc2906fbe
SHA1070af96b019f7e8f0d0dfa1ccd51a41f2f127c7e
SHA25609a2e4f8534369466eba713828653e44916f2307420fc47306b1b9cfff181e2c
SHA512d83ef5e5ca85f600cb3cedadd686f6c677aa26682f1f2c48816195ae94303ac632574b92f4a8742f6703f798b6d4432cecd05a042cf4c0867da998fb5b8ed591
-
MD5
7a99807a434f33b10783b43bc2906fbe
SHA1070af96b019f7e8f0d0dfa1ccd51a41f2f127c7e
SHA25609a2e4f8534369466eba713828653e44916f2307420fc47306b1b9cfff181e2c
SHA512d83ef5e5ca85f600cb3cedadd686f6c677aa26682f1f2c48816195ae94303ac632574b92f4a8742f6703f798b6d4432cecd05a042cf4c0867da998fb5b8ed591
-
MD5
7a99807a434f33b10783b43bc2906fbe
SHA1070af96b019f7e8f0d0dfa1ccd51a41f2f127c7e
SHA25609a2e4f8534369466eba713828653e44916f2307420fc47306b1b9cfff181e2c
SHA512d83ef5e5ca85f600cb3cedadd686f6c677aa26682f1f2c48816195ae94303ac632574b92f4a8742f6703f798b6d4432cecd05a042cf4c0867da998fb5b8ed591
-
MD5
7a99807a434f33b10783b43bc2906fbe
SHA1070af96b019f7e8f0d0dfa1ccd51a41f2f127c7e
SHA25609a2e4f8534369466eba713828653e44916f2307420fc47306b1b9cfff181e2c
SHA512d83ef5e5ca85f600cb3cedadd686f6c677aa26682f1f2c48816195ae94303ac632574b92f4a8742f6703f798b6d4432cecd05a042cf4c0867da998fb5b8ed591
-
MD5
7a99807a434f33b10783b43bc2906fbe
SHA1070af96b019f7e8f0d0dfa1ccd51a41f2f127c7e
SHA25609a2e4f8534369466eba713828653e44916f2307420fc47306b1b9cfff181e2c
SHA512d83ef5e5ca85f600cb3cedadd686f6c677aa26682f1f2c48816195ae94303ac632574b92f4a8742f6703f798b6d4432cecd05a042cf4c0867da998fb5b8ed591
-
MD5
7a99807a434f33b10783b43bc2906fbe
SHA1070af96b019f7e8f0d0dfa1ccd51a41f2f127c7e
SHA25609a2e4f8534369466eba713828653e44916f2307420fc47306b1b9cfff181e2c
SHA512d83ef5e5ca85f600cb3cedadd686f6c677aa26682f1f2c48816195ae94303ac632574b92f4a8742f6703f798b6d4432cecd05a042cf4c0867da998fb5b8ed591
-
MD5
7a99807a434f33b10783b43bc2906fbe
SHA1070af96b019f7e8f0d0dfa1ccd51a41f2f127c7e
SHA25609a2e4f8534369466eba713828653e44916f2307420fc47306b1b9cfff181e2c
SHA512d83ef5e5ca85f600cb3cedadd686f6c677aa26682f1f2c48816195ae94303ac632574b92f4a8742f6703f798b6d4432cecd05a042cf4c0867da998fb5b8ed591