Analysis
-
max time kernel
147s -
max time network
132s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
20-04-2021 12:02
Static task
static1
Behavioral task
behavioral1
Sample
10a4a298243992f740dcdc8431daea3b.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
10a4a298243992f740dcdc8431daea3b.exe
-
Size
739KB
-
MD5
10a4a298243992f740dcdc8431daea3b
-
SHA1
93fb528724a458ecd86edb8e6dd4413dec098caa
-
SHA256
84035c7dd4f195653fd4dec1538e98f9181c74b8eebf9d6415d5cee1616c400c
-
SHA512
2c055048c69be6ee9038566616600936fff3d5c72e97f0c53e3f5c928d63810f70ee966baa9f77c34e4da767336d0581f5e48a1261fd819da5a511a62c949bf0
Malware Config
Extracted
Family
remcos
C2
arttronova124.duckdns.org:3030
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
10a4a298243992f740dcdc8431daea3b.exedescription pid process target process PID 1668 set thread context of 556 1668 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe -
Drops file in Windows directory 2 IoCs
Processes:
10a4a298243992f740dcdc8431daea3b.exedescription ioc process File opened for modification C:\Windows\Windows Display\logs.dat 10a4a298243992f740dcdc8431daea3b.exe File created C:\Windows\Windows Display\logs.dat 10a4a298243992f740dcdc8431daea3b.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
10a4a298243992f740dcdc8431daea3b.exepid process 556 10a4a298243992f740dcdc8431daea3b.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
10a4a298243992f740dcdc8431daea3b.exepid process 556 10a4a298243992f740dcdc8431daea3b.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
10a4a298243992f740dcdc8431daea3b.exe10a4a298243992f740dcdc8431daea3b.execmd.exedescription pid process target process PID 1668 wrote to memory of 556 1668 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 1668 wrote to memory of 556 1668 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 1668 wrote to memory of 556 1668 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 1668 wrote to memory of 556 1668 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 1668 wrote to memory of 556 1668 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 1668 wrote to memory of 556 1668 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 1668 wrote to memory of 556 1668 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 1668 wrote to memory of 556 1668 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 1668 wrote to memory of 556 1668 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 1668 wrote to memory of 556 1668 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 556 wrote to memory of 1108 556 10a4a298243992f740dcdc8431daea3b.exe cmd.exe PID 556 wrote to memory of 1108 556 10a4a298243992f740dcdc8431daea3b.exe cmd.exe PID 556 wrote to memory of 1108 556 10a4a298243992f740dcdc8431daea3b.exe cmd.exe PID 556 wrote to memory of 1108 556 10a4a298243992f740dcdc8431daea3b.exe cmd.exe PID 1108 wrote to memory of 1660 1108 cmd.exe reg.exe PID 1108 wrote to memory of 1660 1108 cmd.exe reg.exe PID 1108 wrote to memory of 1660 1108 cmd.exe reg.exe PID 1108 wrote to memory of 1660 1108 cmd.exe reg.exe PID 556 wrote to memory of 1616 556 10a4a298243992f740dcdc8431daea3b.exe iexplore.exe PID 556 wrote to memory of 1616 556 10a4a298243992f740dcdc8431daea3b.exe iexplore.exe PID 556 wrote to memory of 1616 556 10a4a298243992f740dcdc8431daea3b.exe iexplore.exe PID 556 wrote to memory of 1616 556 10a4a298243992f740dcdc8431daea3b.exe iexplore.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\10a4a298243992f740dcdc8431daea3b.exe"C:\Users\Admin\AppData\Local\Temp\10a4a298243992f740dcdc8431daea3b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\10a4a298243992f740dcdc8431daea3b.exe"{path}"2⤵
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- Modifies registry key
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/556-66-0x0000000000400000-0x0000000000418000-memory.dmpFilesize
96KB
-
memory/556-67-0x000000000040FD88-mapping.dmp
-
memory/556-68-0x0000000075B31000-0x0000000075B33000-memory.dmpFilesize
8KB
-
memory/556-71-0x0000000000400000-0x0000000000418000-memory.dmpFilesize
96KB
-
memory/1108-69-0x0000000000000000-mapping.dmp
-
memory/1660-70-0x0000000000000000-mapping.dmp
-
memory/1668-60-0x0000000000F20000-0x0000000000F21000-memory.dmpFilesize
4KB
-
memory/1668-62-0x0000000007170000-0x0000000007171000-memory.dmpFilesize
4KB
-
memory/1668-63-0x0000000000380000-0x0000000000385000-memory.dmpFilesize
20KB
-
memory/1668-64-0x000000000A410000-0x000000000A4A4000-memory.dmpFilesize
592KB
-
memory/1668-65-0x0000000000AE0000-0x0000000000B28000-memory.dmpFilesize
288KB