Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
05/08/2021, 09:52
Static task
static1
Behavioral task
behavioral1
Sample
gunzipped.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
gunzipped.exe
Resource
win10v20210410
General
-
Target
gunzipped.exe
-
Size
1.0MB
-
MD5
ea1c39e72ae5c05ccb6caf2d94db2235
-
SHA1
3746a3696094d98a4f91103b045b894c38b04d37
-
SHA256
40ef0ea8d499ef74760da82a71c8cf548149e01826b62767c75431cc4cdad67f
-
SHA512
c47467c0af42160971b648564868b66d2870658eebfd68388f8b04208788f2ec753f9b3331a78041d68603eec2813c7ace7a624975b80146fda4eb63b8802eb3
Malware Config
Extracted
remcos
3.2.0 Pro
RemoteHost
ostriuyer.myddns.me:7116
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.txt
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-MSOKMD
-
screenshot_crypt
false
-
screenshot_flag
true
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
2
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
notepad;solitaire;
Extracted
oski
marbellacabs.com/hao/
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 2424 srsc.exe 2144 srsc.exe -
Loads dropped DLL 3 IoCs
pid Process 2144 srsc.exe 2144 srsc.exe 2144 srsc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3484 set thread context of 2500 3484 gunzipped.exe 79 PID 2500 set thread context of 348 2500 gunzipped.exe 82 PID 2500 set thread context of 1208 2500 gunzipped.exe 83 PID 2424 set thread context of 2144 2424 srsc.exe 84 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 1 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString srsc.exe -
Kills process with taskkill 1 IoCs
pid Process 3836 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3484 gunzipped.exe 348 gunzipped.exe 348 gunzipped.exe 2424 srsc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3484 gunzipped.exe Token: SeDebugPrivilege 348 gunzipped.exe Token: SeDebugPrivilege 2424 srsc.exe Token: SeDebugPrivilege 3836 taskkill.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2500 gunzipped.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 3484 wrote to memory of 2500 3484 gunzipped.exe 79 PID 3484 wrote to memory of 2500 3484 gunzipped.exe 79 PID 3484 wrote to memory of 2500 3484 gunzipped.exe 79 PID 3484 wrote to memory of 2500 3484 gunzipped.exe 79 PID 3484 wrote to memory of 2500 3484 gunzipped.exe 79 PID 3484 wrote to memory of 2500 3484 gunzipped.exe 79 PID 3484 wrote to memory of 2500 3484 gunzipped.exe 79 PID 3484 wrote to memory of 2500 3484 gunzipped.exe 79 PID 3484 wrote to memory of 2500 3484 gunzipped.exe 79 PID 3484 wrote to memory of 2500 3484 gunzipped.exe 79 PID 3484 wrote to memory of 2500 3484 gunzipped.exe 79 PID 3484 wrote to memory of 2500 3484 gunzipped.exe 79 PID 2500 wrote to memory of 2424 2500 gunzipped.exe 80 PID 2500 wrote to memory of 2424 2500 gunzipped.exe 80 PID 2500 wrote to memory of 2424 2500 gunzipped.exe 80 PID 2500 wrote to memory of 2308 2500 gunzipped.exe 81 PID 2500 wrote to memory of 2308 2500 gunzipped.exe 81 PID 2500 wrote to memory of 2308 2500 gunzipped.exe 81 PID 2500 wrote to memory of 348 2500 gunzipped.exe 82 PID 2500 wrote to memory of 348 2500 gunzipped.exe 82 PID 2500 wrote to memory of 348 2500 gunzipped.exe 82 PID 2500 wrote to memory of 348 2500 gunzipped.exe 82 PID 2500 wrote to memory of 348 2500 gunzipped.exe 82 PID 2500 wrote to memory of 348 2500 gunzipped.exe 82 PID 2500 wrote to memory of 348 2500 gunzipped.exe 82 PID 2500 wrote to memory of 348 2500 gunzipped.exe 82 PID 2500 wrote to memory of 1208 2500 gunzipped.exe 83 PID 2500 wrote to memory of 1208 2500 gunzipped.exe 83 PID 2500 wrote to memory of 1208 2500 gunzipped.exe 83 PID 2500 wrote to memory of 1208 2500 gunzipped.exe 83 PID 2500 wrote to memory of 1208 2500 gunzipped.exe 83 PID 2500 wrote to memory of 1208 2500 gunzipped.exe 83 PID 2500 wrote to memory of 1208 2500 gunzipped.exe 83 PID 2500 wrote to memory of 1208 2500 gunzipped.exe 83 PID 2424 wrote to memory of 2144 2424 srsc.exe 84 PID 2424 wrote to memory of 2144 2424 srsc.exe 84 PID 2424 wrote to memory of 2144 2424 srsc.exe 84 PID 2424 wrote to memory of 2144 2424 srsc.exe 84 PID 2424 wrote to memory of 2144 2424 srsc.exe 84 PID 2424 wrote to memory of 2144 2424 srsc.exe 84 PID 2424 wrote to memory of 2144 2424 srsc.exe 84 PID 2424 wrote to memory of 2144 2424 srsc.exe 84 PID 2424 wrote to memory of 2144 2424 srsc.exe 84 PID 2144 wrote to memory of 2008 2144 srsc.exe 85 PID 2144 wrote to memory of 2008 2144 srsc.exe 85 PID 2144 wrote to memory of 2008 2144 srsc.exe 85 PID 2008 wrote to memory of 3836 2008 cmd.exe 87 PID 2008 wrote to memory of 3836 2008 cmd.exe 87 PID 2008 wrote to memory of 3836 2008 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\gunzipped.exe"C:\Users\Admin\AppData\Local\Temp\gunzipped.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\gunzipped.exe"C:\Users\Admin\AppData\Local\Temp\gunzipped.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Roaming\srsc.exe"C:\Users\Admin\AppData\Roaming\srsc.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Roaming\srsc.exe"C:\Users\Admin\AppData\Roaming\srsc.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /pid 2144 & erase C:\Users\Admin\AppData\Roaming\srsc.exe & RD /S /Q C:\\ProgramData\\280077228644132\\* & exit5⤵
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\taskkill.exetaskkill /pid 21446⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3836
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\gunzipped.exeC:\Users\Admin\AppData\Local\Temp\gunzipped.exe /stext "C:\Users\Admin\AppData\Local\Temp\bqnrcgjouvtcjovryhasqhpev"3⤵PID:2308
-
-
C:\Users\Admin\AppData\Local\Temp\gunzipped.exeC:\Users\Admin\AppData\Local\Temp\gunzipped.exe /stext "C:\Users\Admin\AppData\Local\Temp\mkskdzuiidlhlusvpsmttmkvwiwjw"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:348
-
-
C:\Users\Admin\AppData\Local\Temp\gunzipped.exeC:\Users\Admin\AppData\Local\Temp\gunzipped.exe /stext "C:\Users\Admin\AppData\Local\Temp\omyverfjwldmvigzychvezxeepgspwvv"3⤵PID:1208
-
-