Analysis

  • max time kernel
    151s
  • max time network
    148s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    05-05-2021 13:03

General

  • Target

    SecuriteInfo.com.Trojan.MSIL.Kryptik.4625f314.19991.25291.exe

  • Size

    897KB

  • MD5

    9f910ba7ff05efd30eb1c2316bb488e0

  • SHA1

    3b428f5cf8b0c43b8b63bbaf728669a83f66458e

  • SHA256

    0c2f78458061b2e848305409a90351eff2c4c31eed1a4667b6366bfdc43ef52a

  • SHA512

    5f6300857bce04ef5e883bb219d3f2257acdada1c29cec9dff0d438a8190f784b0c7bde44dbe80adb7f28fefe03c9ec57d0300066bed46b838a91d92a3f7c189

Score
10/10

Malware Config

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Executes dropped EXE 1 IoCs
  • Obfuscated with Agile.Net obfuscator 2 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.MSIL.Kryptik.4625f314.19991.25291.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.MSIL.Kryptik.4625f314.19991.25291.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3172
    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
      "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
      2⤵
      • Executes dropped EXE
      PID:2096

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\svchost.exe
    MD5

    6bdb3091562e7dd2c877472286b6cc46

    SHA1

    122ecbb7a23dc98c61f319cfb060f3cbd407db89

    SHA256

    87e4144b3f50e9a0635ea6a887a20ef0d7b1321a79793f9fa965b8defbdef698

    SHA512

    219d646d5d514c705f801cacc736ca1027613d6612c1d30a8d4156143f5344b125a297080926912e7abf94a09b80cae157ac44773e84dd95946a9feb44b10e94

  • memory/2096-128-0x0000000000400000-0x000000000047E000-memory.dmp
    Filesize

    504KB

  • memory/2096-133-0x0000000000400000-0x000000000047E000-memory.dmp
    Filesize

    504KB

  • memory/2096-129-0x000000000047823F-mapping.dmp
  • memory/3172-119-0x0000000005730000-0x0000000005731000-memory.dmp
    Filesize

    4KB

  • memory/3172-121-0x00000000052D0000-0x00000000057CE000-memory.dmp
    Filesize

    5.0MB

  • memory/3172-122-0x00000000069C0000-0x00000000069E1000-memory.dmp
    Filesize

    132KB

  • memory/3172-123-0x0000000006AC0000-0x0000000006AC1000-memory.dmp
    Filesize

    4KB

  • memory/3172-124-0x0000000006A50000-0x0000000006A51000-memory.dmp
    Filesize

    4KB

  • memory/3172-125-0x00000000052D0000-0x00000000057CE000-memory.dmp
    Filesize

    5.0MB

  • memory/3172-126-0x0000000006DA0000-0x0000000006DAB000-memory.dmp
    Filesize

    44KB

  • memory/3172-127-0x0000000009730000-0x0000000009731000-memory.dmp
    Filesize

    4KB

  • memory/3172-114-0x00000000008C0000-0x00000000008C1000-memory.dmp
    Filesize

    4KB

  • memory/3172-118-0x00000000052D0000-0x00000000052D1000-memory.dmp
    Filesize

    4KB

  • memory/3172-117-0x00000000051D0000-0x00000000051D1000-memory.dmp
    Filesize

    4KB

  • memory/3172-116-0x00000000057D0000-0x00000000057D1000-memory.dmp
    Filesize

    4KB