Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    21-01-2021 06:20

General

  • Target

    Qyyfrnva_Signed_.exe

  • Size

    652KB

  • MD5

    8f4286a5ec8f3abfb5d4c892f66c7cca

  • SHA1

    3d83c34257b964adae2cba6029a7d4e5b6e2ceaf

  • SHA256

    6f212246be3ab7db2cede2e87d8d465261ca8f44a86c7ca90cb8238bafed887f

  • SHA512

    3df4484b9319aed2a9d936347d28495d37da42a7a105570aa0787ce86efdc0ea82310aa480fc2c4ce3373b8b88a008bd60d6f7ad40d90b4ca62f7e6654173bfd

Score
10/10

Malware Config

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Qyyfrnva_Signed_.exe
    "C:\Users\Admin\AppData\Local\Temp\Qyyfrnva_Signed_.exe"
    1⤵
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1908
    • C:\Program Files (x86)\internet explorer\ieinstal.exe
      "C:\Program Files (x86)\internet explorer\ieinstal.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:532

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/532-3-0x0000000000090000-0x0000000000091000-memory.dmp
    Filesize

    4KB

  • memory/532-4-0x0000000000000000-mapping.dmp
  • memory/532-5-0x0000000000110000-0x0000000000111000-memory.dmp
    Filesize

    4KB

  • memory/532-7-0x00000000001C0000-0x00000000001C1000-memory.dmp
    Filesize

    4KB

  • memory/532-8-0x0000000076271000-0x0000000076273000-memory.dmp
    Filesize

    8KB

  • memory/532-13-0x0000000010540000-0x0000000010564000-memory.dmp
    Filesize

    144KB

  • memory/532-14-0x00000000001D0000-0x00000000001F2000-memory.dmp
    Filesize

    136KB

  • memory/1908-2-0x0000000000230000-0x0000000000231000-memory.dmp
    Filesize

    4KB