Analysis
-
max time kernel
149s -
max time network
183s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
05/08/2021, 09:52
Static task
static1
Behavioral task
behavioral1
Sample
gunzipped.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
gunzipped.exe
Resource
win10v20210410
General
-
Target
gunzipped.exe
-
Size
1.0MB
-
MD5
ea1c39e72ae5c05ccb6caf2d94db2235
-
SHA1
3746a3696094d98a4f91103b045b894c38b04d37
-
SHA256
40ef0ea8d499ef74760da82a71c8cf548149e01826b62767c75431cc4cdad67f
-
SHA512
c47467c0af42160971b648564868b66d2870658eebfd68388f8b04208788f2ec753f9b3331a78041d68603eec2813c7ace7a624975b80146fda4eb63b8802eb3
Malware Config
Extracted
remcos
3.2.0 Pro
RemoteHost
ostriuyer.myddns.me:7116
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.txt
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-MSOKMD
-
screenshot_crypt
false
-
screenshot_flag
true
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
2
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
notepad;solitaire;
Extracted
oski
marbellacabs.com/hao/
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
-
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/824-84-0x0000000000455238-mapping.dmp MailPassView -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral1/memory/968-78-0x0000000000476274-mapping.dmp WebBrowserPassView -
Nirsoft 3 IoCs
resource yara_rule behavioral1/memory/968-78-0x0000000000476274-mapping.dmp Nirsoft behavioral1/memory/360-81-0x0000000000422206-mapping.dmp Nirsoft behavioral1/memory/824-84-0x0000000000455238-mapping.dmp Nirsoft -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 1836 srsc.exe 900 srsc.exe 1352 srsc.exe -
Loads dropped DLL 6 IoCs
pid Process 468 gunzipped.exe 1352 srsc.exe 1352 srsc.exe 1352 srsc.exe 1352 srsc.exe 1352 srsc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 1072 set thread context of 468 1072 gunzipped.exe 29 PID 468 set thread context of 968 468 gunzipped.exe 31 PID 468 set thread context of 360 468 gunzipped.exe 32 PID 468 set thread context of 824 468 gunzipped.exe 33 PID 1836 set thread context of 1352 1836 srsc.exe 36 PID 468 set thread context of 800 468 gunzipped.exe 43 PID 468 set thread context of 1880 468 gunzipped.exe 44 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 1 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString srsc.exe -
Kills process with taskkill 1 IoCs
pid Process 1072 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1072 gunzipped.exe 968 gunzipped.exe 1836 srsc.exe 1836 srsc.exe 1836 srsc.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1072 gunzipped.exe Token: SeDebugPrivilege 360 gunzipped.exe Token: SeDebugPrivilege 1836 srsc.exe Token: SeDebugPrivilege 1072 taskkill.exe Token: SeDebugPrivilege 800 gunzipped.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 468 gunzipped.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1072 wrote to memory of 468 1072 gunzipped.exe 29 PID 1072 wrote to memory of 468 1072 gunzipped.exe 29 PID 1072 wrote to memory of 468 1072 gunzipped.exe 29 PID 1072 wrote to memory of 468 1072 gunzipped.exe 29 PID 1072 wrote to memory of 468 1072 gunzipped.exe 29 PID 1072 wrote to memory of 468 1072 gunzipped.exe 29 PID 1072 wrote to memory of 468 1072 gunzipped.exe 29 PID 1072 wrote to memory of 468 1072 gunzipped.exe 29 PID 1072 wrote to memory of 468 1072 gunzipped.exe 29 PID 1072 wrote to memory of 468 1072 gunzipped.exe 29 PID 1072 wrote to memory of 468 1072 gunzipped.exe 29 PID 1072 wrote to memory of 468 1072 gunzipped.exe 29 PID 1072 wrote to memory of 468 1072 gunzipped.exe 29 PID 468 wrote to memory of 1836 468 gunzipped.exe 30 PID 468 wrote to memory of 1836 468 gunzipped.exe 30 PID 468 wrote to memory of 1836 468 gunzipped.exe 30 PID 468 wrote to memory of 1836 468 gunzipped.exe 30 PID 468 wrote to memory of 968 468 gunzipped.exe 31 PID 468 wrote to memory of 968 468 gunzipped.exe 31 PID 468 wrote to memory of 968 468 gunzipped.exe 31 PID 468 wrote to memory of 968 468 gunzipped.exe 31 PID 468 wrote to memory of 968 468 gunzipped.exe 31 PID 468 wrote to memory of 968 468 gunzipped.exe 31 PID 468 wrote to memory of 968 468 gunzipped.exe 31 PID 468 wrote to memory of 968 468 gunzipped.exe 31 PID 468 wrote to memory of 968 468 gunzipped.exe 31 PID 468 wrote to memory of 360 468 gunzipped.exe 32 PID 468 wrote to memory of 360 468 gunzipped.exe 32 PID 468 wrote to memory of 360 468 gunzipped.exe 32 PID 468 wrote to memory of 360 468 gunzipped.exe 32 PID 468 wrote to memory of 360 468 gunzipped.exe 32 PID 468 wrote to memory of 360 468 gunzipped.exe 32 PID 468 wrote to memory of 360 468 gunzipped.exe 32 PID 468 wrote to memory of 360 468 gunzipped.exe 32 PID 468 wrote to memory of 360 468 gunzipped.exe 32 PID 468 wrote to memory of 824 468 gunzipped.exe 33 PID 468 wrote to memory of 824 468 gunzipped.exe 33 PID 468 wrote to memory of 824 468 gunzipped.exe 33 PID 468 wrote to memory of 824 468 gunzipped.exe 33 PID 468 wrote to memory of 824 468 gunzipped.exe 33 PID 468 wrote to memory of 824 468 gunzipped.exe 33 PID 468 wrote to memory of 824 468 gunzipped.exe 33 PID 468 wrote to memory of 824 468 gunzipped.exe 33 PID 468 wrote to memory of 824 468 gunzipped.exe 33 PID 1836 wrote to memory of 900 1836 srsc.exe 35 PID 1836 wrote to memory of 900 1836 srsc.exe 35 PID 1836 wrote to memory of 900 1836 srsc.exe 35 PID 1836 wrote to memory of 900 1836 srsc.exe 35 PID 1836 wrote to memory of 1352 1836 srsc.exe 36 PID 1836 wrote to memory of 1352 1836 srsc.exe 36 PID 1836 wrote to memory of 1352 1836 srsc.exe 36 PID 1836 wrote to memory of 1352 1836 srsc.exe 36 PID 1836 wrote to memory of 1352 1836 srsc.exe 36 PID 1836 wrote to memory of 1352 1836 srsc.exe 36 PID 1836 wrote to memory of 1352 1836 srsc.exe 36 PID 1836 wrote to memory of 1352 1836 srsc.exe 36 PID 1836 wrote to memory of 1352 1836 srsc.exe 36 PID 1836 wrote to memory of 1352 1836 srsc.exe 36 PID 1352 wrote to memory of 1992 1352 srsc.exe 38 PID 1352 wrote to memory of 1992 1352 srsc.exe 38 PID 1352 wrote to memory of 1992 1352 srsc.exe 38 PID 1352 wrote to memory of 1992 1352 srsc.exe 38 PID 1992 wrote to memory of 1072 1992 cmd.exe 40 PID 1992 wrote to memory of 1072 1992 cmd.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\gunzipped.exe"C:\Users\Admin\AppData\Local\Temp\gunzipped.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\gunzipped.exe"C:\Users\Admin\AppData\Local\Temp\gunzipped.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Users\Admin\AppData\Roaming\srsc.exe"C:\Users\Admin\AppData\Roaming\srsc.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Roaming\srsc.exe"C:\Users\Admin\AppData\Roaming\srsc.exe"4⤵
- Executes dropped EXE
PID:900
-
-
C:\Users\Admin\AppData\Roaming\srsc.exe"C:\Users\Admin\AppData\Roaming\srsc.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /pid 1352 & erase C:\Users\Admin\AppData\Roaming\srsc.exe & RD /S /Q C:\\ProgramData\\246363220654038\\* & exit5⤵
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\taskkill.exetaskkill /pid 13526⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1072
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\gunzipped.exeC:\Users\Admin\AppData\Local\Temp\gunzipped.exe /stext "C:\Users\Admin\AppData\Local\Temp\ssfzqggawsykuiwtf"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:968
-
-
C:\Users\Admin\AppData\Local\Temp\gunzipped.exeC:\Users\Admin\AppData\Local\Temp\gunzipped.exe /stext "C:\Users\Admin\AppData\Local\Temp\vmsrqzrtjaqpwosxoypbf"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:360
-
-
C:\Users\Admin\AppData\Local\Temp\gunzipped.exeC:\Users\Admin\AppData\Local\Temp\gunzipped.exe /stext "C:\Users\Admin\AppData\Local\Temp\foxkrrcvfiicgugbyjjdqmjy"3⤵PID:824
-
-
C:\Users\Admin\AppData\Local\Temp\gunzipped.exeC:\Users\Admin\AppData\Local\Temp\gunzipped.exe /stext "C:\Users\Admin\AppData\Local\Temp\zfdhtw"3⤵PID:1948
-
-
C:\Users\Admin\AppData\Local\Temp\gunzipped.exeC:\Users\Admin\AppData\Local\Temp\gunzipped.exe /stext "C:\Users\Admin\AppData\Local\Temp\czrzuocgj"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:800
-
-
C:\Users\Admin\AppData\Local\Temp\gunzipped.exeC:\Users\Admin\AppData\Local\Temp\gunzipped.exe /stext "C:\Users\Admin\AppData\Local\Temp\mbwsvhnifulfr"3⤵PID:1880
-
-