Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
18-01-2021 16:27
Static task
static1
Behavioral task
behavioral1
Sample
4d7715c57054b475521b9528f50d5585.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
4d7715c57054b475521b9528f50d5585.exe
Resource
win10v20201028
General
-
Target
4d7715c57054b475521b9528f50d5585.exe
-
Size
1.3MB
-
MD5
4d7715c57054b475521b9528f50d5585
-
SHA1
38a843f92b5d06d522bb06b3b2c158eb45ec5f26
-
SHA256
f08283e69eef4b48bec25a82962517ead7c998619d431b6b9eb9b227ad520e84
-
SHA512
011264fdb4ad9009095ff231961d250953b4736fa5b0dd3eb2b2c50d93670d4645bf53ed26bad67aabf548388b9eea330df5fe6616d91b8a42ce9c503ad3bc84
Malware Config
Extracted
remcos
wedsazxcvfghyuiokjhbnvfcdsaweyplmhbvrtud.ydns.eu:1996
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
win.exewin.exepid process 1036 win.exe 3520 win.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
win.exe4d7715c57054b475521b9528f50d5585.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\win = "\"C:\\Users\\Admin\\AppData\\Roaming\\win.exe\"" win.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 4d7715c57054b475521b9528f50d5585.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\win = "\"C:\\Users\\Admin\\AppData\\Roaming\\win.exe\"" 4d7715c57054b475521b9528f50d5585.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\ win.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 25 IoCs
Processes:
4d7715c57054b475521b9528f50d5585.exewin.exepid process 1108 4d7715c57054b475521b9528f50d5585.exe 1108 4d7715c57054b475521b9528f50d5585.exe 1108 4d7715c57054b475521b9528f50d5585.exe 1108 4d7715c57054b475521b9528f50d5585.exe 1108 4d7715c57054b475521b9528f50d5585.exe 1108 4d7715c57054b475521b9528f50d5585.exe 1108 4d7715c57054b475521b9528f50d5585.exe 1108 4d7715c57054b475521b9528f50d5585.exe 1108 4d7715c57054b475521b9528f50d5585.exe 1108 4d7715c57054b475521b9528f50d5585.exe 1108 4d7715c57054b475521b9528f50d5585.exe 1108 4d7715c57054b475521b9528f50d5585.exe 1108 4d7715c57054b475521b9528f50d5585.exe 1036 win.exe 1036 win.exe 1036 win.exe 1036 win.exe 1036 win.exe 1036 win.exe 1036 win.exe 1036 win.exe 1036 win.exe 1036 win.exe 1036 win.exe 1036 win.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
4d7715c57054b475521b9528f50d5585.exewin.exedescription pid process target process PID 1108 set thread context of 2152 1108 4d7715c57054b475521b9528f50d5585.exe 4d7715c57054b475521b9528f50d5585.exe PID 1036 set thread context of 3520 1036 win.exe win.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 420 1108 WerFault.exe 4d7715c57054b475521b9528f50d5585.exe 1576 1036 WerFault.exe win.exe -
Delays execution with timeout.exe 6 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid process 2096 timeout.exe 3024 timeout.exe 4016 timeout.exe 512 timeout.exe 3616 timeout.exe 8 timeout.exe -
Modifies registry class 1 IoCs
Processes:
4d7715c57054b475521b9528f50d5585.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings 4d7715c57054b475521b9528f50d5585.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
Processes:
4d7715c57054b475521b9528f50d5585.exeWerFault.exewin.exeWerFault.exepid process 1108 4d7715c57054b475521b9528f50d5585.exe 1108 4d7715c57054b475521b9528f50d5585.exe 1108 4d7715c57054b475521b9528f50d5585.exe 420 WerFault.exe 420 WerFault.exe 420 WerFault.exe 420 WerFault.exe 420 WerFault.exe 420 WerFault.exe 420 WerFault.exe 420 WerFault.exe 420 WerFault.exe 420 WerFault.exe 420 WerFault.exe 420 WerFault.exe 420 WerFault.exe 420 WerFault.exe 420 WerFault.exe 1036 win.exe 1036 win.exe 1036 win.exe 1576 WerFault.exe 1576 WerFault.exe 1576 WerFault.exe 1576 WerFault.exe 1576 WerFault.exe 1576 WerFault.exe 1576 WerFault.exe 1576 WerFault.exe 1576 WerFault.exe 1576 WerFault.exe 1576 WerFault.exe 1576 WerFault.exe 1576 WerFault.exe 1576 WerFault.exe 1576 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
win.exepid process 3520 win.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
4d7715c57054b475521b9528f50d5585.exeWerFault.exewin.exeWerFault.exedescription pid process Token: SeDebugPrivilege 1108 4d7715c57054b475521b9528f50d5585.exe Token: SeRestorePrivilege 420 WerFault.exe Token: SeBackupPrivilege 420 WerFault.exe Token: SeDebugPrivilege 420 WerFault.exe Token: SeDebugPrivilege 1036 win.exe Token: SeDebugPrivilege 1576 WerFault.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
win.exepid process 3520 win.exe -
Suspicious use of WriteProcessMemory 65 IoCs
Processes:
4d7715c57054b475521b9528f50d5585.execmd.execmd.execmd.exe4d7715c57054b475521b9528f50d5585.exeWScript.execmd.exewin.execmd.execmd.execmd.exedescription pid process target process PID 1108 wrote to memory of 2760 1108 4d7715c57054b475521b9528f50d5585.exe cmd.exe PID 1108 wrote to memory of 2760 1108 4d7715c57054b475521b9528f50d5585.exe cmd.exe PID 1108 wrote to memory of 2760 1108 4d7715c57054b475521b9528f50d5585.exe cmd.exe PID 2760 wrote to memory of 8 2760 cmd.exe timeout.exe PID 2760 wrote to memory of 8 2760 cmd.exe timeout.exe PID 2760 wrote to memory of 8 2760 cmd.exe timeout.exe PID 1108 wrote to memory of 3944 1108 4d7715c57054b475521b9528f50d5585.exe cmd.exe PID 1108 wrote to memory of 3944 1108 4d7715c57054b475521b9528f50d5585.exe cmd.exe PID 1108 wrote to memory of 3944 1108 4d7715c57054b475521b9528f50d5585.exe cmd.exe PID 3944 wrote to memory of 2096 3944 cmd.exe timeout.exe PID 3944 wrote to memory of 2096 3944 cmd.exe timeout.exe PID 3944 wrote to memory of 2096 3944 cmd.exe timeout.exe PID 1108 wrote to memory of 3668 1108 4d7715c57054b475521b9528f50d5585.exe cmd.exe PID 1108 wrote to memory of 3668 1108 4d7715c57054b475521b9528f50d5585.exe cmd.exe PID 1108 wrote to memory of 3668 1108 4d7715c57054b475521b9528f50d5585.exe cmd.exe PID 3668 wrote to memory of 3024 3668 cmd.exe timeout.exe PID 3668 wrote to memory of 3024 3668 cmd.exe timeout.exe PID 3668 wrote to memory of 3024 3668 cmd.exe timeout.exe PID 1108 wrote to memory of 2152 1108 4d7715c57054b475521b9528f50d5585.exe 4d7715c57054b475521b9528f50d5585.exe PID 1108 wrote to memory of 2152 1108 4d7715c57054b475521b9528f50d5585.exe 4d7715c57054b475521b9528f50d5585.exe PID 1108 wrote to memory of 2152 1108 4d7715c57054b475521b9528f50d5585.exe 4d7715c57054b475521b9528f50d5585.exe PID 1108 wrote to memory of 2152 1108 4d7715c57054b475521b9528f50d5585.exe 4d7715c57054b475521b9528f50d5585.exe PID 1108 wrote to memory of 2152 1108 4d7715c57054b475521b9528f50d5585.exe 4d7715c57054b475521b9528f50d5585.exe PID 1108 wrote to memory of 2152 1108 4d7715c57054b475521b9528f50d5585.exe 4d7715c57054b475521b9528f50d5585.exe PID 1108 wrote to memory of 2152 1108 4d7715c57054b475521b9528f50d5585.exe 4d7715c57054b475521b9528f50d5585.exe PID 1108 wrote to memory of 2152 1108 4d7715c57054b475521b9528f50d5585.exe 4d7715c57054b475521b9528f50d5585.exe PID 1108 wrote to memory of 2152 1108 4d7715c57054b475521b9528f50d5585.exe 4d7715c57054b475521b9528f50d5585.exe PID 1108 wrote to memory of 2152 1108 4d7715c57054b475521b9528f50d5585.exe 4d7715c57054b475521b9528f50d5585.exe PID 2152 wrote to memory of 740 2152 4d7715c57054b475521b9528f50d5585.exe WScript.exe PID 2152 wrote to memory of 740 2152 4d7715c57054b475521b9528f50d5585.exe WScript.exe PID 2152 wrote to memory of 740 2152 4d7715c57054b475521b9528f50d5585.exe WScript.exe PID 740 wrote to memory of 2520 740 WScript.exe cmd.exe PID 740 wrote to memory of 2520 740 WScript.exe cmd.exe PID 740 wrote to memory of 2520 740 WScript.exe cmd.exe PID 2520 wrote to memory of 1036 2520 cmd.exe win.exe PID 2520 wrote to memory of 1036 2520 cmd.exe win.exe PID 2520 wrote to memory of 1036 2520 cmd.exe win.exe PID 1036 wrote to memory of 1468 1036 win.exe cmd.exe PID 1036 wrote to memory of 1468 1036 win.exe cmd.exe PID 1036 wrote to memory of 1468 1036 win.exe cmd.exe PID 1468 wrote to memory of 4016 1468 cmd.exe timeout.exe PID 1468 wrote to memory of 4016 1468 cmd.exe timeout.exe PID 1468 wrote to memory of 4016 1468 cmd.exe timeout.exe PID 1036 wrote to memory of 3100 1036 win.exe cmd.exe PID 1036 wrote to memory of 3100 1036 win.exe cmd.exe PID 1036 wrote to memory of 3100 1036 win.exe cmd.exe PID 3100 wrote to memory of 512 3100 cmd.exe timeout.exe PID 3100 wrote to memory of 512 3100 cmd.exe timeout.exe PID 3100 wrote to memory of 512 3100 cmd.exe timeout.exe PID 1036 wrote to memory of 200 1036 win.exe cmd.exe PID 1036 wrote to memory of 200 1036 win.exe cmd.exe PID 1036 wrote to memory of 200 1036 win.exe cmd.exe PID 200 wrote to memory of 3616 200 cmd.exe timeout.exe PID 200 wrote to memory of 3616 200 cmd.exe timeout.exe PID 200 wrote to memory of 3616 200 cmd.exe timeout.exe PID 1036 wrote to memory of 3520 1036 win.exe win.exe PID 1036 wrote to memory of 3520 1036 win.exe win.exe PID 1036 wrote to memory of 3520 1036 win.exe win.exe PID 1036 wrote to memory of 3520 1036 win.exe win.exe PID 1036 wrote to memory of 3520 1036 win.exe win.exe PID 1036 wrote to memory of 3520 1036 win.exe win.exe PID 1036 wrote to memory of 3520 1036 win.exe win.exe PID 1036 wrote to memory of 3520 1036 win.exe win.exe PID 1036 wrote to memory of 3520 1036 win.exe win.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d7715c57054b475521b9528f50d5585.exe"C:\Users\Admin\AppData\Local\Temp\4d7715c57054b475521b9528f50d5585.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\4d7715c57054b475521b9528f50d5585.exe"C:\Users\Admin\AppData\Local\Temp\4d7715c57054b475521b9528f50d5585.exe"2⤵
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\win.exe"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\win.exeC:\Users\Admin\AppData\Roaming\win.exe5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 16⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 17⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 16⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 17⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 16⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 17⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\win.exe"C:\Users\Admin\AppData\Roaming\win.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1036 -s 15646⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1108 -s 15562⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\install.vbsMD5
4a74e626596d6e66b4bbc59ee6848f2d
SHA1047849ac8735ecc0943428c7cd5e00b52eee06ed
SHA25698bd6dc219a7a3e04d3d67bbec9f0b4d4640831a3a6be0a0078b050041088b0e
SHA5121cd943482d0f1ce2ffaf6ee4a82895e4d57c52051bb14bbda0548cf072b4c5cbe719d2cdb549b5ae7c0241dd9c68dd9d1674acd26aed684b8145500079cc5403
-
C:\Users\Admin\AppData\Roaming\win.exeMD5
4d7715c57054b475521b9528f50d5585
SHA138a843f92b5d06d522bb06b3b2c158eb45ec5f26
SHA256f08283e69eef4b48bec25a82962517ead7c998619d431b6b9eb9b227ad520e84
SHA512011264fdb4ad9009095ff231961d250953b4736fa5b0dd3eb2b2c50d93670d4645bf53ed26bad67aabf548388b9eea330df5fe6616d91b8a42ce9c503ad3bc84
-
C:\Users\Admin\AppData\Roaming\win.exeMD5
4d7715c57054b475521b9528f50d5585
SHA138a843f92b5d06d522bb06b3b2c158eb45ec5f26
SHA256f08283e69eef4b48bec25a82962517ead7c998619d431b6b9eb9b227ad520e84
SHA512011264fdb4ad9009095ff231961d250953b4736fa5b0dd3eb2b2c50d93670d4645bf53ed26bad67aabf548388b9eea330df5fe6616d91b8a42ce9c503ad3bc84
-
C:\Users\Admin\AppData\Roaming\win.exeMD5
4d7715c57054b475521b9528f50d5585
SHA138a843f92b5d06d522bb06b3b2c158eb45ec5f26
SHA256f08283e69eef4b48bec25a82962517ead7c998619d431b6b9eb9b227ad520e84
SHA512011264fdb4ad9009095ff231961d250953b4736fa5b0dd3eb2b2c50d93670d4645bf53ed26bad67aabf548388b9eea330df5fe6616d91b8a42ce9c503ad3bc84
-
memory/8-11-0x0000000000000000-mapping.dmp
-
memory/200-43-0x0000000000000000-mapping.dmp
-
memory/420-21-0x0000000004460000-0x0000000004461000-memory.dmpFilesize
4KB
-
memory/420-22-0x0000000004460000-0x0000000004461000-memory.dmpFilesize
4KB
-
memory/512-42-0x0000000000000000-mapping.dmp
-
memory/740-19-0x0000000000000000-mapping.dmp
-
memory/1036-27-0x0000000000000000-mapping.dmp
-
memory/1036-30-0x0000000073290000-0x000000007397E000-memory.dmpFilesize
6.9MB
-
memory/1036-38-0x0000000005430000-0x0000000005431000-memory.dmpFilesize
4KB
-
memory/1108-12-0x0000000005AB0000-0x0000000005AB1000-memory.dmpFilesize
4KB
-
memory/1108-9-0x00000000059C0000-0x00000000059EF000-memory.dmpFilesize
188KB
-
memory/1108-3-0x0000000000BB0000-0x0000000000BB1000-memory.dmpFilesize
4KB
-
memory/1108-5-0x0000000005620000-0x0000000005621000-memory.dmpFilesize
4KB
-
memory/1108-6-0x0000000005BC0000-0x0000000005BC1000-memory.dmpFilesize
4KB
-
memory/1108-7-0x0000000005860000-0x0000000005861000-memory.dmpFilesize
4KB
-
memory/1108-8-0x0000000005840000-0x0000000005841000-memory.dmpFilesize
4KB
-
memory/1108-2-0x0000000073290000-0x000000007397E000-memory.dmpFilesize
6.9MB
-
memory/1468-39-0x0000000000000000-mapping.dmp
-
memory/1576-48-0x0000000004830000-0x0000000004831000-memory.dmpFilesize
4KB
-
memory/2096-14-0x0000000000000000-mapping.dmp
-
memory/2152-20-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/2152-18-0x0000000000413FA4-mapping.dmp
-
memory/2152-17-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/2520-26-0x0000000000000000-mapping.dmp
-
memory/2760-10-0x0000000000000000-mapping.dmp
-
memory/3024-16-0x0000000000000000-mapping.dmp
-
memory/3100-41-0x0000000000000000-mapping.dmp
-
memory/3520-46-0x0000000000413FA4-mapping.dmp
-
memory/3520-49-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/3616-44-0x0000000000000000-mapping.dmp
-
memory/3668-15-0x0000000000000000-mapping.dmp
-
memory/3944-13-0x0000000000000000-mapping.dmp
-
memory/4016-40-0x0000000000000000-mapping.dmp