Analysis
-
max time kernel
149s -
max time network
80s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
24-04-2021 08:03
Static task
static1
Behavioral task
behavioral1
Sample
53d1fe3209497d194e38201deb835924.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
53d1fe3209497d194e38201deb835924.exe
Resource
win10v20210408
General
-
Target
53d1fe3209497d194e38201deb835924.exe
-
Size
2.1MB
-
MD5
53d1fe3209497d194e38201deb835924
-
SHA1
43f4315a82d7cd359aec38eac9fa37602d8baac6
-
SHA256
af0249150bee4fec74c124f89019cd260c9aacd7b7a7715192b5097f1948eb82
-
SHA512
a706c677811bc7b5b0368c840c00499b45c3f30e3b52350373e4475bfe90c8bfceee57100d28dece8ec3006382a0be5a8ae780e1c1d71acf43208301200128a2
Malware Config
Extracted
remcos
fieldsdegreenf.duckdns.org:6553
aaeeerbbbeee.duckdns.org:6553
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
remcos.exeremcos.exepid process 4048 remcos.exe 3356 remcos.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
remcos.exe53d1fe3209497d194e38201deb835924.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ remcos.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\Remcos\\remcos.exe\"" remcos.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 53d1fe3209497d194e38201deb835924.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\Remcos\\remcos.exe\"" 53d1fe3209497d194e38201deb835924.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
53d1fe3209497d194e38201deb835924.exeremcos.exedescription pid process target process PID 604 set thread context of 3332 604 53d1fe3209497d194e38201deb835924.exe 53d1fe3209497d194e38201deb835924.exe PID 4048 set thread context of 3356 4048 remcos.exe remcos.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
53d1fe3209497d194e38201deb835924.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings 53d1fe3209497d194e38201deb835924.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
remcos.exepid process 3356 remcos.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
53d1fe3209497d194e38201deb835924.exe53d1fe3209497d194e38201deb835924.exeWScript.execmd.exeremcos.exeremcos.exedescription pid process target process PID 604 wrote to memory of 3332 604 53d1fe3209497d194e38201deb835924.exe 53d1fe3209497d194e38201deb835924.exe PID 604 wrote to memory of 3332 604 53d1fe3209497d194e38201deb835924.exe 53d1fe3209497d194e38201deb835924.exe PID 604 wrote to memory of 3332 604 53d1fe3209497d194e38201deb835924.exe 53d1fe3209497d194e38201deb835924.exe PID 604 wrote to memory of 3332 604 53d1fe3209497d194e38201deb835924.exe 53d1fe3209497d194e38201deb835924.exe PID 604 wrote to memory of 3332 604 53d1fe3209497d194e38201deb835924.exe 53d1fe3209497d194e38201deb835924.exe PID 604 wrote to memory of 3332 604 53d1fe3209497d194e38201deb835924.exe 53d1fe3209497d194e38201deb835924.exe PID 604 wrote to memory of 3332 604 53d1fe3209497d194e38201deb835924.exe 53d1fe3209497d194e38201deb835924.exe PID 604 wrote to memory of 3332 604 53d1fe3209497d194e38201deb835924.exe 53d1fe3209497d194e38201deb835924.exe PID 604 wrote to memory of 3332 604 53d1fe3209497d194e38201deb835924.exe 53d1fe3209497d194e38201deb835924.exe PID 604 wrote to memory of 3332 604 53d1fe3209497d194e38201deb835924.exe 53d1fe3209497d194e38201deb835924.exe PID 604 wrote to memory of 3332 604 53d1fe3209497d194e38201deb835924.exe 53d1fe3209497d194e38201deb835924.exe PID 604 wrote to memory of 3332 604 53d1fe3209497d194e38201deb835924.exe 53d1fe3209497d194e38201deb835924.exe PID 3332 wrote to memory of 3468 3332 53d1fe3209497d194e38201deb835924.exe WScript.exe PID 3332 wrote to memory of 3468 3332 53d1fe3209497d194e38201deb835924.exe WScript.exe PID 3332 wrote to memory of 3468 3332 53d1fe3209497d194e38201deb835924.exe WScript.exe PID 3468 wrote to memory of 1896 3468 WScript.exe cmd.exe PID 3468 wrote to memory of 1896 3468 WScript.exe cmd.exe PID 3468 wrote to memory of 1896 3468 WScript.exe cmd.exe PID 1896 wrote to memory of 4048 1896 cmd.exe remcos.exe PID 1896 wrote to memory of 4048 1896 cmd.exe remcos.exe PID 1896 wrote to memory of 4048 1896 cmd.exe remcos.exe PID 4048 wrote to memory of 3356 4048 remcos.exe remcos.exe PID 4048 wrote to memory of 3356 4048 remcos.exe remcos.exe PID 4048 wrote to memory of 3356 4048 remcos.exe remcos.exe PID 4048 wrote to memory of 3356 4048 remcos.exe remcos.exe PID 4048 wrote to memory of 3356 4048 remcos.exe remcos.exe PID 4048 wrote to memory of 3356 4048 remcos.exe remcos.exe PID 4048 wrote to memory of 3356 4048 remcos.exe remcos.exe PID 4048 wrote to memory of 3356 4048 remcos.exe remcos.exe PID 4048 wrote to memory of 3356 4048 remcos.exe remcos.exe PID 4048 wrote to memory of 3356 4048 remcos.exe remcos.exe PID 4048 wrote to memory of 3356 4048 remcos.exe remcos.exe PID 4048 wrote to memory of 3356 4048 remcos.exe remcos.exe PID 3356 wrote to memory of 1256 3356 remcos.exe svchost.exe PID 3356 wrote to memory of 1256 3356 remcos.exe svchost.exe PID 3356 wrote to memory of 1256 3356 remcos.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\53d1fe3209497d194e38201deb835924.exe"C:\Users\Admin\AppData\Local\Temp\53d1fe3209497d194e38201deb835924.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Users\Admin\AppData\Local\Temp\53d1fe3209497d194e38201deb835924.exe"{path}"2⤵
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"3⤵
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Roaming\Remcos\remcos.exeC:\Users\Admin\AppData\Roaming\Remcos\remcos.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe"{path}"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe7⤵PID:1256
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
b92d64fe5b1d1f59df4b738262aea8df
SHA1c8fb1981759c2d9bb2ec91b705985fba5fc7af63
SHA256fa20e9aab03dc8e9f1910aaf0cf42662379fa16ae3a22642084fb97fa3d4f83a
SHA5122566248b93c0cfb0414f033b8dd18bbd4f88180093eac2861107289bcb4ee160f9593706ff1f7d1f2e4ecea430d67a5a2897551a4f9ebd82b707243e300520e2
-
MD5
53d1fe3209497d194e38201deb835924
SHA143f4315a82d7cd359aec38eac9fa37602d8baac6
SHA256af0249150bee4fec74c124f89019cd260c9aacd7b7a7715192b5097f1948eb82
SHA512a706c677811bc7b5b0368c840c00499b45c3f30e3b52350373e4475bfe90c8bfceee57100d28dece8ec3006382a0be5a8ae780e1c1d71acf43208301200128a2
-
MD5
53d1fe3209497d194e38201deb835924
SHA143f4315a82d7cd359aec38eac9fa37602d8baac6
SHA256af0249150bee4fec74c124f89019cd260c9aacd7b7a7715192b5097f1948eb82
SHA512a706c677811bc7b5b0368c840c00499b45c3f30e3b52350373e4475bfe90c8bfceee57100d28dece8ec3006382a0be5a8ae780e1c1d71acf43208301200128a2
-
MD5
53d1fe3209497d194e38201deb835924
SHA143f4315a82d7cd359aec38eac9fa37602d8baac6
SHA256af0249150bee4fec74c124f89019cd260c9aacd7b7a7715192b5097f1948eb82
SHA512a706c677811bc7b5b0368c840c00499b45c3f30e3b52350373e4475bfe90c8bfceee57100d28dece8ec3006382a0be5a8ae780e1c1d71acf43208301200128a2