Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
20-04-2021 12:20
Static task
static1
Behavioral task
behavioral1
Sample
10a4a298243992f740dcdc8431daea3b.exe
Resource
win7v20210410
General
-
Target
10a4a298243992f740dcdc8431daea3b.exe
-
Size
739KB
-
MD5
10a4a298243992f740dcdc8431daea3b
-
SHA1
93fb528724a458ecd86edb8e6dd4413dec098caa
-
SHA256
84035c7dd4f195653fd4dec1538e98f9181c74b8eebf9d6415d5cee1616c400c
-
SHA512
2c055048c69be6ee9038566616600936fff3d5c72e97f0c53e3f5c928d63810f70ee966baa9f77c34e4da767336d0581f5e48a1261fd819da5a511a62c949bf0
Malware Config
Extracted
remcos
arttronova124.duckdns.org:3030
Signatures
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
10a4a298243992f740dcdc8431daea3b.exe10a4a298243992f740dcdc8431daea3b.exedescription pid process target process PID 1200 set thread context of 780 1200 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 780 set thread context of 300 780 10a4a298243992f740dcdc8431daea3b.exe iexplore.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000051618adbbbd0f84eb34ff59fe7045e8f0000000002000000000010660000000100002000000093082d754124a749fa6d2ac8e6cac2bd167047d74627415a6c4388649bf03362000000000e80000000020000200000009b6770913d16d4f896c36ebc73bf507c6c7fcf512df75406ab8e25f4ec4b1432200000009570f19abd551a331ca1ad44ec530437c33544af7099e36dc21dcbaf63d7e67040000000813feedbbde359fb39e897ef296247d9e4438f240f5147ab42373bfeeb506d9eb3a6b28bd6003f9d27e1f92460132e02e2737db4aa54b47ee2ba2b20e1f573af iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50f96c3ddf35d701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DOMStorage\microsoft.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DOMStorage\microsoft.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DOMStorage\docs.microsoft.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6428ABD1-A1D2-11EB-A1DA-5A6828A642A0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000051618adbbbd0f84eb34ff59fe7045e8f000000000200000000001066000000010000200000009f81556f96308db9426bcd1616795342acb4585fd7527b3f1711d77bf19addd3000000000e8000000002000020000000b97eeb791f65325e53b6bd95080c7521052aab35b7b227816fbe710feb7da9589000000064203eb16dc7de94aeb9a85e0bd2138f7566550e1a46131d738697034eac8acf32138e5dd128f0d62999e1d7f8fbce83f72540012dde630be37149991f2eedb527966c137cafc3ed75b224316bbc6645c6d8df2355ca5dfb331c27fdbda5d048e98f26eaa5000cb55b52dba1acfc05ce6602dad4aabdc92904b1b2ba2763cc679bb1e4d1e0b1c7ba2ca57216772afe14400000008388542523300ccd688ef6872408ea9dbd45780da08625c08865fe1e735e967a973a2a2a16c2f1e4b443a9a7711f3bf11fffd3b1b4c3802ee41af4442bd382e7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DOMStorage\docs.microsoft.com\ = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "325686031" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DOMStorage\microsoft.com\Total = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 520 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 520 iexplore.exe 520 iexplore.exe 1300 IEXPLORE.EXE 1300 IEXPLORE.EXE 1300 IEXPLORE.EXE 1300 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
10a4a298243992f740dcdc8431daea3b.exe10a4a298243992f740dcdc8431daea3b.execmd.exeiexplore.exeiexplore.exedescription pid process target process PID 1200 wrote to memory of 780 1200 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 1200 wrote to memory of 780 1200 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 1200 wrote to memory of 780 1200 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 1200 wrote to memory of 780 1200 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 1200 wrote to memory of 780 1200 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 1200 wrote to memory of 780 1200 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 1200 wrote to memory of 780 1200 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 1200 wrote to memory of 780 1200 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 1200 wrote to memory of 780 1200 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 1200 wrote to memory of 780 1200 10a4a298243992f740dcdc8431daea3b.exe 10a4a298243992f740dcdc8431daea3b.exe PID 780 wrote to memory of 1492 780 10a4a298243992f740dcdc8431daea3b.exe cmd.exe PID 780 wrote to memory of 1492 780 10a4a298243992f740dcdc8431daea3b.exe cmd.exe PID 780 wrote to memory of 1492 780 10a4a298243992f740dcdc8431daea3b.exe cmd.exe PID 780 wrote to memory of 1492 780 10a4a298243992f740dcdc8431daea3b.exe cmd.exe PID 1492 wrote to memory of 892 1492 cmd.exe reg.exe PID 1492 wrote to memory of 892 1492 cmd.exe reg.exe PID 1492 wrote to memory of 892 1492 cmd.exe reg.exe PID 1492 wrote to memory of 892 1492 cmd.exe reg.exe PID 780 wrote to memory of 300 780 10a4a298243992f740dcdc8431daea3b.exe iexplore.exe PID 780 wrote to memory of 300 780 10a4a298243992f740dcdc8431daea3b.exe iexplore.exe PID 780 wrote to memory of 300 780 10a4a298243992f740dcdc8431daea3b.exe iexplore.exe PID 780 wrote to memory of 300 780 10a4a298243992f740dcdc8431daea3b.exe iexplore.exe PID 780 wrote to memory of 300 780 10a4a298243992f740dcdc8431daea3b.exe iexplore.exe PID 780 wrote to memory of 300 780 10a4a298243992f740dcdc8431daea3b.exe iexplore.exe PID 780 wrote to memory of 300 780 10a4a298243992f740dcdc8431daea3b.exe iexplore.exe PID 780 wrote to memory of 300 780 10a4a298243992f740dcdc8431daea3b.exe iexplore.exe PID 780 wrote to memory of 300 780 10a4a298243992f740dcdc8431daea3b.exe iexplore.exe PID 300 wrote to memory of 520 300 iexplore.exe iexplore.exe PID 300 wrote to memory of 520 300 iexplore.exe iexplore.exe PID 300 wrote to memory of 520 300 iexplore.exe iexplore.exe PID 300 wrote to memory of 520 300 iexplore.exe iexplore.exe PID 520 wrote to memory of 1300 520 iexplore.exe IEXPLORE.EXE PID 520 wrote to memory of 1300 520 iexplore.exe IEXPLORE.EXE PID 520 wrote to memory of 1300 520 iexplore.exe IEXPLORE.EXE PID 520 wrote to memory of 1300 520 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\10a4a298243992f740dcdc8431daea3b.exe"C:\Users\Admin\AppData\Local\Temp\10a4a298243992f740dcdc8431daea3b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\10a4a298243992f740dcdc8431daea3b.exe"{path}"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- Modifies registry key
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=iexplore.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.04⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:520 CREDAT:275457 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63MD5
9de206caaa1bd740bc03ac1feee87dbb
SHA1c6e806ca628d6bf79db5e74399259b8a1ac51d6d
SHA256dac9c59005aa386985ac8ae465c55f0b452637f401d5ce278e28ed07251f5f37
SHA512c5b9e5dee8394544c3df168eec5c2b205a5ee56ea747752e84029e52eb691088e442903bbd0fc507e5c243c642b3df74de706a96328ac31e4202437c9c2ef071
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63MD5
c34b586d965ec837347511ec91b57f1f
SHA1e2b50bfefa17dd3170cfaf1f37126a65d81656d5
SHA256c1d8c304a6ab14a78042cf5983b5d1e548906803f0cd30da94461790641b2ba9
SHA512033720be080eecb94706bd6968b9dd1cb38600ce88e205617314c03f3feaecee24d19b21de82214fe32b7a37924d73ee501cdf9ee962de243933ec3729ba2c4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
a5b7336e454bf863429a9e926316d1ca
SHA13baa502dedd10d6ec4e029cdd054bea91925f400
SHA2561e91a28915af513c65673e51bc484780ed9be08c0bd158ea03d962d496b45405
SHA512603026a314193e6162557f2faafa36bda7a7574caeb01fbf59716fe37775dd29eb091f091eab0ea29da56fcf4e05e025b3c28c8d010ab7fe1d51bd72099d5587
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\sgyae4t\imagestore.datMD5
a26d077f8e0ab390e079388867c62599
SHA161dcddb6080f761e15f8e564bcba681432fbfcc0
SHA256303775defb4bf06076137fdc47040fee66b0bf63efd900f325803f2f681688a3
SHA5122f2e71073b5fa76b1065d7b1e33df89d3d860b51b936e171fbcb3871296d64261f042ad43717891b846b2ef3a5ca90e5f7e828f75d82aed50cab9337f1dfc830
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\OP1PA6ZJ.txtMD5
9a7b0413a85bcdbddc292592ea7c587b
SHA137942c1050c3bf3b7c2e2d4894eedb87209992f9
SHA2565b857757095139668c5a2cb371de37224ccb948301af73782fa0166c70716b07
SHA512366303419b4003946163cc4564f4fe200784ded7d06f5b4ec2ef4c4dcb14bfd97bb21a1a71a04b6193fff9ab38415276fbd169a968b2b12093f3a6e0e2d15e5e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\YOEPLMF2.txtMD5
f8d99c01bf711dba9af2ba42b902975e
SHA167df25b1e574edf988c4d2f4de2195f73c7021fe
SHA2560c6d87a4326d4585325394b97aef0427203bd31f0f8f45b8a9294b2107cc6361
SHA512d6c45c37362edd50304190a162ee1e01c2211a0b2f60f981179cfeaf08a79f0fa753b6b4f597902d98c0686426dce4647fa4713e1f8225a0952e2a149a0d687e
-
memory/300-70-0x0000000000400000-0x00000000004C0000-memory.dmpFilesize
768KB
-
memory/300-71-0x00000000004BA1CE-mapping.dmp
-
memory/520-75-0x000007FEFC221000-0x000007FEFC223000-memory.dmpFilesize
8KB
-
memory/520-74-0x0000000000000000-mapping.dmp
-
memory/780-65-0x0000000000400000-0x0000000000418000-memory.dmpFilesize
96KB
-
memory/780-72-0x0000000000400000-0x0000000000418000-memory.dmpFilesize
96KB
-
memory/780-67-0x00000000768B1000-0x00000000768B3000-memory.dmpFilesize
8KB
-
memory/780-66-0x000000000040FD88-mapping.dmp
-
memory/892-69-0x0000000000000000-mapping.dmp
-
memory/1200-59-0x0000000001340000-0x0000000001341000-memory.dmpFilesize
4KB
-
memory/1200-64-0x0000000000780000-0x00000000007C8000-memory.dmpFilesize
288KB
-
memory/1200-63-0x0000000007240000-0x00000000072D4000-memory.dmpFilesize
592KB
-
memory/1200-62-0x00000000003F0000-0x00000000003F5000-memory.dmpFilesize
20KB
-
memory/1200-61-0x0000000007310000-0x0000000007311000-memory.dmpFilesize
4KB
-
memory/1300-76-0x0000000000000000-mapping.dmp
-
memory/1492-68-0x0000000000000000-mapping.dmp