Analysis
-
max time kernel
155s -
max time network
143s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
06-12-2021 04:33
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.GenericKDZ.81096.27678.10459.exe
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.GenericKDZ.81096.27678.10459.exe
Resource
win10-en-20211014
General
-
Target
SecuriteInfo.com.Trojan.GenericKDZ.81096.27678.10459.exe
-
Size
523KB
-
MD5
6f78f5cf377470fc449263eaf2231dac
-
SHA1
067211e73b880a6a7c9c01ac2c309ea49579ad1f
-
SHA256
2fae5c7782b7c0cf7e205c1cf79400ef3c88c261b51882fb7f5dadab37013cf9
-
SHA512
cc4c07d4b7072391e8c3d182f6a0f85f6994a40b0e0f4d8d2158cd9c6f112e58e2f45f3fff3205c9e7c2e18940f24f713e558aa608683fb897346953d05e758c
Malware Config
Extracted
remcos
3.3.2 Pro
J3J3-US
kent0mushinec0n3t.casacam.net:32095
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
Pin.exe
-
copy_folder
J3J3-US
-
delete_file
true
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
J3J3-US
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-TFIQE4
-
screenshot_crypt
true
-
screenshot_flag
true
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
J3J3-US
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
notepad;solitaire;
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Pin.exepid process 1620 Pin.exe -
Deletes itself 1 IoCs
Processes:
WScript.exepid process 572 WScript.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid process 1916 cmd.exe 1916 cmd.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
SecuriteInfo.com.Trojan.GenericKDZ.81096.27678.10459.exePin.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Windows\CurrentVersion\Run\ SecuriteInfo.com.Trojan.GenericKDZ.81096.27678.10459.exe Set value (str) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Windows\CurrentVersion\Run\J3J3-US = "\"C:\\Users\\Admin\\AppData\\Roaming\\J3J3-US\\Pin.exe\"" SecuriteInfo.com.Trojan.GenericKDZ.81096.27678.10459.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Windows\CurrentVersion\Run\ Pin.exe Set value (str) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Windows\CurrentVersion\Run\J3J3-US = "\"C:\\Users\\Admin\\AppData\\Roaming\\J3J3-US\\Pin.exe\"" Pin.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Pin.exedescription pid process target process PID 1620 set thread context of 1056 1620 Pin.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
AUDIODG.EXEdescription pid process Token: 33 1732 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1732 AUDIODG.EXE Token: 33 1732 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1732 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Pin.exepid process 1620 Pin.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
SecuriteInfo.com.Trojan.GenericKDZ.81096.27678.10459.exeWScript.execmd.exePin.exedescription pid process target process PID 952 wrote to memory of 572 952 SecuriteInfo.com.Trojan.GenericKDZ.81096.27678.10459.exe WScript.exe PID 952 wrote to memory of 572 952 SecuriteInfo.com.Trojan.GenericKDZ.81096.27678.10459.exe WScript.exe PID 952 wrote to memory of 572 952 SecuriteInfo.com.Trojan.GenericKDZ.81096.27678.10459.exe WScript.exe PID 952 wrote to memory of 572 952 SecuriteInfo.com.Trojan.GenericKDZ.81096.27678.10459.exe WScript.exe PID 572 wrote to memory of 1916 572 WScript.exe cmd.exe PID 572 wrote to memory of 1916 572 WScript.exe cmd.exe PID 572 wrote to memory of 1916 572 WScript.exe cmd.exe PID 572 wrote to memory of 1916 572 WScript.exe cmd.exe PID 1916 wrote to memory of 1620 1916 cmd.exe Pin.exe PID 1916 wrote to memory of 1620 1916 cmd.exe Pin.exe PID 1916 wrote to memory of 1620 1916 cmd.exe Pin.exe PID 1916 wrote to memory of 1620 1916 cmd.exe Pin.exe PID 1620 wrote to memory of 1056 1620 Pin.exe svchost.exe PID 1620 wrote to memory of 1056 1620 Pin.exe svchost.exe PID 1620 wrote to memory of 1056 1620 Pin.exe svchost.exe PID 1620 wrote to memory of 1056 1620 Pin.exe svchost.exe PID 1620 wrote to memory of 1056 1620 Pin.exe svchost.exe PID 1620 wrote to memory of 1056 1620 Pin.exe svchost.exe PID 1620 wrote to memory of 1056 1620 Pin.exe svchost.exe PID 1620 wrote to memory of 1056 1620 Pin.exe svchost.exe PID 1620 wrote to memory of 1056 1620 Pin.exe svchost.exe PID 1620 wrote to memory of 1056 1620 Pin.exe svchost.exe PID 1620 wrote to memory of 1056 1620 Pin.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKDZ.81096.27678.10459.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKDZ.81096.27678.10459.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\J3J3-US\Pin.exe"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Roaming\J3J3-US\Pin.exeC:\Users\Admin\AppData\Roaming\J3J3-US\Pin.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe5⤵PID:1056
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4bc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1732
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\install.vbsMD5
1b9ad3c55bc8a8e557a4a955c337d9ab
SHA1e5208f130862c525fcf83581133acef2b98ec026
SHA256667cd100e97e085a660a912694d2bc1fb1c690065ad1b850c86a5056db80cb70
SHA5128ef83ba293a93d70c19f0f94639b240a35f21aaca182120d812136cd8eb7771bb2a054cc809fa385bbb3872cbd81b04beba8cf17a68ea4b18ba3487865be409e
-
C:\Users\Admin\AppData\Roaming\J3J3-US\Pin.exeMD5
6f78f5cf377470fc449263eaf2231dac
SHA1067211e73b880a6a7c9c01ac2c309ea49579ad1f
SHA2562fae5c7782b7c0cf7e205c1cf79400ef3c88c261b51882fb7f5dadab37013cf9
SHA512cc4c07d4b7072391e8c3d182f6a0f85f6994a40b0e0f4d8d2158cd9c6f112e58e2f45f3fff3205c9e7c2e18940f24f713e558aa608683fb897346953d05e758c
-
C:\Users\Admin\AppData\Roaming\J3J3-US\Pin.exeMD5
6f78f5cf377470fc449263eaf2231dac
SHA1067211e73b880a6a7c9c01ac2c309ea49579ad1f
SHA2562fae5c7782b7c0cf7e205c1cf79400ef3c88c261b51882fb7f5dadab37013cf9
SHA512cc4c07d4b7072391e8c3d182f6a0f85f6994a40b0e0f4d8d2158cd9c6f112e58e2f45f3fff3205c9e7c2e18940f24f713e558aa608683fb897346953d05e758c
-
\Users\Admin\AppData\Roaming\J3J3-US\Pin.exeMD5
6f78f5cf377470fc449263eaf2231dac
SHA1067211e73b880a6a7c9c01ac2c309ea49579ad1f
SHA2562fae5c7782b7c0cf7e205c1cf79400ef3c88c261b51882fb7f5dadab37013cf9
SHA512cc4c07d4b7072391e8c3d182f6a0f85f6994a40b0e0f4d8d2158cd9c6f112e58e2f45f3fff3205c9e7c2e18940f24f713e558aa608683fb897346953d05e758c
-
\Users\Admin\AppData\Roaming\J3J3-US\Pin.exeMD5
6f78f5cf377470fc449263eaf2231dac
SHA1067211e73b880a6a7c9c01ac2c309ea49579ad1f
SHA2562fae5c7782b7c0cf7e205c1cf79400ef3c88c261b51882fb7f5dadab37013cf9
SHA512cc4c07d4b7072391e8c3d182f6a0f85f6994a40b0e0f4d8d2158cd9c6f112e58e2f45f3fff3205c9e7c2e18940f24f713e558aa608683fb897346953d05e758c
-
memory/572-59-0x0000000000000000-mapping.dmp
-
memory/952-57-0x0000000000310000-0x0000000000385000-memory.dmpFilesize
468KB
-
memory/952-55-0x0000000000608000-0x000000000064D000-memory.dmpFilesize
276KB
-
memory/952-56-0x0000000075A61000-0x0000000075A63000-memory.dmpFilesize
8KB
-
memory/952-58-0x0000000000400000-0x0000000000504000-memory.dmpFilesize
1.0MB
-
memory/1056-83-0x0000000000400000-0x0000000000504000-memory.dmpFilesize
1.0MB
-
memory/1056-80-0x0000000000608000-0x000000000064D000-memory.dmpFilesize
276KB
-
memory/1056-79-0x0000000000400000-0x0000000000504000-memory.dmpFilesize
1.0MB
-
memory/1056-81-0x0000000000400000-0x0000000000504000-memory.dmpFilesize
1.0MB
-
memory/1056-71-0x0000000000400000-0x0000000000504000-memory.dmpFilesize
1.0MB
-
memory/1056-72-0x0000000000400000-0x0000000000504000-memory.dmpFilesize
1.0MB
-
memory/1056-73-0x0000000000400000-0x0000000000504000-memory.dmpFilesize
1.0MB
-
memory/1056-74-0x0000000000400000-0x0000000000504000-memory.dmpFilesize
1.0MB
-
memory/1056-75-0x0000000000400000-0x0000000000504000-memory.dmpFilesize
1.0MB
-
memory/1056-76-0x0000000000400000-0x0000000000504000-memory.dmpFilesize
1.0MB
-
memory/1056-77-0x000000000044D470-mapping.dmp
-
memory/1056-70-0x0000000000400000-0x0000000000504000-memory.dmpFilesize
1.0MB
-
memory/1620-68-0x0000000000288000-0x00000000002CD000-memory.dmpFilesize
276KB
-
memory/1620-78-0x0000000000400000-0x0000000000504000-memory.dmpFilesize
1.0MB
-
memory/1620-66-0x0000000000000000-mapping.dmp
-
memory/1916-62-0x0000000000000000-mapping.dmp