Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
25-01-2021 15:07
Static task
static1
Behavioral task
behavioral1
Sample
Alıntı.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Alıntı.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
Alıntı.exe
-
Size
830KB
-
MD5
cb6f7aa8475416055d6a363c4c0617dd
-
SHA1
ceb31f102bd5d5bf63da93db0c44936b411de2e0
-
SHA256
2b1530546744e05fc3e002b3db398e90449e6eab2aa259a691f5fb5d7bf49664
-
SHA512
eb525403949ad3715c20183a4f5140f21a63b88895bc6ed9333f7684f43f409e6c14e956a6256df35526fa885a1a2ba719d2a006475e281d1f1c75a2c9727af1
Score
10/10
Malware Config
Extracted
Family
remcos
C2
whatgodcannotdodoestnotexist.duckdns.org:2559
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Alıntı.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rdyok = "C:\\Users\\Public\\Libraries\\koydR.url" Alıntı.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 19 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
ieinstal.exepid process 4000 ieinstal.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Alıntı.exedescription pid process target process PID 3920 wrote to memory of 4000 3920 Alıntı.exe ieinstal.exe PID 3920 wrote to memory of 4000 3920 Alıntı.exe ieinstal.exe PID 3920 wrote to memory of 4000 3920 Alıntı.exe ieinstal.exe PID 3920 wrote to memory of 4000 3920 Alıntı.exe ieinstal.exe PID 3920 wrote to memory of 4000 3920 Alıntı.exe ieinstal.exe PID 3920 wrote to memory of 4000 3920 Alıntı.exe ieinstal.exe PID 3920 wrote to memory of 4000 3920 Alıntı.exe ieinstal.exe PID 3920 wrote to memory of 4000 3920 Alıntı.exe ieinstal.exe PID 3920 wrote to memory of 4000 3920 Alıntı.exe ieinstal.exe PID 3920 wrote to memory of 4000 3920 Alıntı.exe ieinstal.exe PID 3920 wrote to memory of 4000 3920 Alıntı.exe ieinstal.exe PID 3920 wrote to memory of 4000 3920 Alıntı.exe ieinstal.exe PID 3920 wrote to memory of 4000 3920 Alıntı.exe ieinstal.exe PID 3920 wrote to memory of 4000 3920 Alıntı.exe ieinstal.exe PID 3920 wrote to memory of 4000 3920 Alıntı.exe ieinstal.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Alıntı.exe"C:\Users\Admin\AppData\Local\Temp\Alıntı.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Program Files (x86)\internet explorer\ieinstal.exe"C:\Program Files (x86)\internet explorer\ieinstal.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:4000