Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
17/02/2021, 21:12
Static task
static1
Behavioral task
behavioral1
Sample
Quotation6547558,pdf.exe
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Quotation6547558,pdf.exe
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
Quotation6547558,pdf.exe
-
Size
706KB
-
MD5
8dbeaa2200e3dd4d09247606d25bec31
-
SHA1
72265ac4686a37571cdd1f7a6961853de166dc00
-
SHA256
e45bc4ce4e4f84bedc7ec144517df1d16ea97b1803fa1b3cf21c581390b50bf8
-
SHA512
c73fbe6c7300ccb33e6b293ab6218d605e52e20651a3bf22f2c51b2326fe63bd7b4b0978dbd190d714c3d889eb2d9256c62722d2180eba1e082db531d30f3ef2
Score
10/10
Malware Config
Extracted
Family
remcos
C2
favour2021.ddns.net:1990
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1124 remcos.exe 3452 remcos.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\Remcos\\remcos.exe\"" remcos.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\ Quotation6547558,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\Remcos\\remcos.exe\"" Quotation6547558,pdf.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\ remcos.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1048 set thread context of 2848 1048 Quotation6547558,pdf.exe 82 PID 1124 set thread context of 3452 1124 remcos.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3404 schtasks.exe 3184 schtasks.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings Quotation6547558,pdf.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1048 Quotation6547558,pdf.exe 1048 Quotation6547558,pdf.exe 1048 Quotation6547558,pdf.exe 1124 remcos.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1048 Quotation6547558,pdf.exe Token: SeDebugPrivilege 1124 remcos.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3452 remcos.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1048 wrote to memory of 3404 1048 Quotation6547558,pdf.exe 79 PID 1048 wrote to memory of 3404 1048 Quotation6547558,pdf.exe 79 PID 1048 wrote to memory of 3404 1048 Quotation6547558,pdf.exe 79 PID 1048 wrote to memory of 1372 1048 Quotation6547558,pdf.exe 81 PID 1048 wrote to memory of 1372 1048 Quotation6547558,pdf.exe 81 PID 1048 wrote to memory of 1372 1048 Quotation6547558,pdf.exe 81 PID 1048 wrote to memory of 2848 1048 Quotation6547558,pdf.exe 82 PID 1048 wrote to memory of 2848 1048 Quotation6547558,pdf.exe 82 PID 1048 wrote to memory of 2848 1048 Quotation6547558,pdf.exe 82 PID 1048 wrote to memory of 2848 1048 Quotation6547558,pdf.exe 82 PID 1048 wrote to memory of 2848 1048 Quotation6547558,pdf.exe 82 PID 1048 wrote to memory of 2848 1048 Quotation6547558,pdf.exe 82 PID 1048 wrote to memory of 2848 1048 Quotation6547558,pdf.exe 82 PID 1048 wrote to memory of 2848 1048 Quotation6547558,pdf.exe 82 PID 1048 wrote to memory of 2848 1048 Quotation6547558,pdf.exe 82 PID 1048 wrote to memory of 2848 1048 Quotation6547558,pdf.exe 82 PID 2848 wrote to memory of 2296 2848 Quotation6547558,pdf.exe 83 PID 2848 wrote to memory of 2296 2848 Quotation6547558,pdf.exe 83 PID 2848 wrote to memory of 2296 2848 Quotation6547558,pdf.exe 83 PID 2296 wrote to memory of 2096 2296 WScript.exe 84 PID 2296 wrote to memory of 2096 2296 WScript.exe 84 PID 2296 wrote to memory of 2096 2296 WScript.exe 84 PID 2096 wrote to memory of 1124 2096 cmd.exe 86 PID 2096 wrote to memory of 1124 2096 cmd.exe 86 PID 2096 wrote to memory of 1124 2096 cmd.exe 86 PID 1124 wrote to memory of 3184 1124 remcos.exe 87 PID 1124 wrote to memory of 3184 1124 remcos.exe 87 PID 1124 wrote to memory of 3184 1124 remcos.exe 87 PID 1124 wrote to memory of 3452 1124 remcos.exe 89 PID 1124 wrote to memory of 3452 1124 remcos.exe 89 PID 1124 wrote to memory of 3452 1124 remcos.exe 89 PID 1124 wrote to memory of 3452 1124 remcos.exe 89 PID 1124 wrote to memory of 3452 1124 remcos.exe 89 PID 1124 wrote to memory of 3452 1124 remcos.exe 89 PID 1124 wrote to memory of 3452 1124 remcos.exe 89 PID 1124 wrote to memory of 3452 1124 remcos.exe 89 PID 1124 wrote to memory of 3452 1124 remcos.exe 89 PID 1124 wrote to memory of 3452 1124 remcos.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\Quotation6547558,pdf.exe"C:\Users\Admin\AppData\Local\Temp\Quotation6547558,pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rtzecNlXv" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8EF2.tmp"2⤵
- Creates scheduled task(s)
PID:3404
-
-
C:\Users\Admin\AppData\Local\Temp\Quotation6547558,pdf.exe"C:\Users\Admin\AppData\Local\Temp\Quotation6547558,pdf.exe"2⤵PID:1372
-
-
C:\Users\Admin\AppData\Local\Temp\Quotation6547558,pdf.exe"C:\Users\Admin\AppData\Local\Temp\Quotation6547558,pdf.exe"2⤵
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"3⤵
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Roaming\Remcos\remcos.exeC:\Users\Admin\AppData\Roaming\Remcos\remcos.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rtzecNlXv" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8F9A.tmp"6⤵
- Creates scheduled task(s)
PID:3184
-
-
C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe"C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3452
-
-
-
-
-