Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
25-01-2021 14:31
Static task
static1
Behavioral task
behavioral1
Sample
Alıntı.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Alıntı.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
Alıntı.exe
-
Size
830KB
-
MD5
cb6f7aa8475416055d6a363c4c0617dd
-
SHA1
ceb31f102bd5d5bf63da93db0c44936b411de2e0
-
SHA256
2b1530546744e05fc3e002b3db398e90449e6eab2aa259a691f5fb5d7bf49664
-
SHA512
eb525403949ad3715c20183a4f5140f21a63b88895bc6ed9333f7684f43f409e6c14e956a6256df35526fa885a1a2ba719d2a006475e281d1f1c75a2c9727af1
Score
10/10
Malware Config
Extracted
Family
remcos
C2
whatgodcannotdodoestnotexist.duckdns.org:2559
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Alıntı.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rdyok = "C:\\Users\\Public\\Libraries\\koydR.url" Alıntı.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
ieinstal.exepid process 3808 ieinstal.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Alıntı.exedescription pid process target process PID 616 wrote to memory of 3808 616 Alıntı.exe ieinstal.exe PID 616 wrote to memory of 3808 616 Alıntı.exe ieinstal.exe PID 616 wrote to memory of 3808 616 Alıntı.exe ieinstal.exe PID 616 wrote to memory of 3808 616 Alıntı.exe ieinstal.exe PID 616 wrote to memory of 3808 616 Alıntı.exe ieinstal.exe PID 616 wrote to memory of 3808 616 Alıntı.exe ieinstal.exe PID 616 wrote to memory of 3808 616 Alıntı.exe ieinstal.exe PID 616 wrote to memory of 3808 616 Alıntı.exe ieinstal.exe PID 616 wrote to memory of 3808 616 Alıntı.exe ieinstal.exe PID 616 wrote to memory of 3808 616 Alıntı.exe ieinstal.exe PID 616 wrote to memory of 3808 616 Alıntı.exe ieinstal.exe PID 616 wrote to memory of 3808 616 Alıntı.exe ieinstal.exe PID 616 wrote to memory of 3808 616 Alıntı.exe ieinstal.exe PID 616 wrote to memory of 3808 616 Alıntı.exe ieinstal.exe PID 616 wrote to memory of 3808 616 Alıntı.exe ieinstal.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Alıntı.exe"C:\Users\Admin\AppData\Local\Temp\Alıntı.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Program Files (x86)\internet explorer\ieinstal.exe"C:\Program Files (x86)\internet explorer\ieinstal.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:3808