Analysis

  • max time kernel
    151s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    25-01-2021 15:07

General

  • Target

    Alıntı.exe

  • Size

    830KB

  • MD5

    cb6f7aa8475416055d6a363c4c0617dd

  • SHA1

    ceb31f102bd5d5bf63da93db0c44936b411de2e0

  • SHA256

    2b1530546744e05fc3e002b3db398e90449e6eab2aa259a691f5fb5d7bf49664

  • SHA512

    eb525403949ad3715c20183a4f5140f21a63b88895bc6ed9333f7684f43f409e6c14e956a6256df35526fa885a1a2ba719d2a006475e281d1f1c75a2c9727af1

Score
10/10

Malware Config

Extracted

Family

remcos

C2

whatgodcannotdodoestnotexist.duckdns.org:2559

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Alıntı.exe
    "C:\Users\Admin\AppData\Local\Temp\Alıntı.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1880
    • C:\Program Files (x86)\internet explorer\ieinstal.exe
      "C:\Program Files (x86)\internet explorer\ieinstal.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1592

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1592-4-0x0000000000000000-mapping.dmp

  • memory/1592-3-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/1592-5-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB

  • memory/1592-7-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/1592-8-0x00000000767E1000-0x00000000767E3000-memory.dmp

    Filesize

    8KB

  • memory/1592-12-0x0000000010540000-0x0000000010565000-memory.dmp

    Filesize

    148KB

  • memory/1592-13-0x0000000000250000-0x0000000000271000-memory.dmp

    Filesize

    132KB

  • memory/1880-2-0x0000000000330000-0x0000000000331000-memory.dmp

    Filesize

    4KB