Analysis
-
max time kernel
162s -
max time network
160s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
21-01-2022 23:13
Static task
static1
Behavioral task
behavioral1
Sample
a21158ed80e44fef2a41f3796204a8ae2ff23705e80e7a0e460b612276226853.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
a21158ed80e44fef2a41f3796204a8ae2ff23705e80e7a0e460b612276226853.exe
Resource
win10-en-20211208
General
-
Target
a21158ed80e44fef2a41f3796204a8ae2ff23705e80e7a0e460b612276226853.exe
-
Size
972KB
-
MD5
72bf4beb82aad6c5b74dac433ba58cbd
-
SHA1
c04f007881f757a7a2ffdc94f5763b61042173b7
-
SHA256
a21158ed80e44fef2a41f3796204a8ae2ff23705e80e7a0e460b612276226853
-
SHA512
c4d55c05d255fbd973dbf08c06c38fcb90bf13c8e2a7c11151286fbfd24d26a78dc47e3aea7e6618f22bea63a18518caf534cfa2ad6a22a595c5e7861986fd76
Malware Config
Extracted
remcos
2.5.1 Pro
zzzzzzzzzzzzZZZZZZZZZZZLIBERTAD
dominoduck2094.duckdns.org:9596
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
Chrome.exe
-
copy_folder
Chrome
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
system
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-LQVOP4
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Signatures
-
Blocklisted process makes network request 6 IoCs
Processes:
cmd.exeflow pid process 23 3852 cmd.exe 24 3852 cmd.exe 27 3852 cmd.exe 30 3852 cmd.exe 31 3852 cmd.exe 32 3852 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 2744 rundll32.exe -
Drops file in Windows directory 1 IoCs
Processes:
cmd.exedescription ioc process File created C:\Windows\Tasks\autofmt.job cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
rundll32.exepid process 2744 rundll32.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
rundll32.exepid process 2744 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
cmd.exepid process 3852 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a21158ed80e44fef2a41f3796204a8ae2ff23705e80e7a0e460b612276226853.exerundll32.exedescription pid process target process PID 2500 wrote to memory of 2744 2500 a21158ed80e44fef2a41f3796204a8ae2ff23705e80e7a0e460b612276226853.exe rundll32.exe PID 2500 wrote to memory of 2744 2500 a21158ed80e44fef2a41f3796204a8ae2ff23705e80e7a0e460b612276226853.exe rundll32.exe PID 2500 wrote to memory of 2744 2500 a21158ed80e44fef2a41f3796204a8ae2ff23705e80e7a0e460b612276226853.exe rundll32.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe PID 2744 wrote to memory of 3852 2744 rundll32.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a21158ed80e44fef2a41f3796204a8ae2ff23705e80e7a0e460b612276226853.exe"C:\Users\Admin\AppData\Local\Temp\a21158ed80e44fef2a41f3796204a8ae2ff23705e80e7a0e460b612276226853.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe SpanielPolymorph,Shorelines2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Blocklisted process makes network request
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\HypocycloidMD5
4c661f7fe9aad8df24460b5974f83028
SHA1640650ded87853f16c1ce7b4dc5bd1c0cc36ff43
SHA2567b4044b8224c05913f0821a05fac81b09a5619f626f1f5d3afb03fbd718d1da8
SHA512c033492295d27a98bd54da40b09dbe9230e1812e7c40e375c1001045c84acc9691b5b2729be33b05fe1bf86ebf15b42b1ec626ea08389fd5825ce86bd47ee975
-
C:\Users\Admin\AppData\Local\Temp\SpanielPolymorph.DLLMD5
28c74b92530fceb2c5871b64ba0c3ea0
SHA19e13cdde74e97f4b94501c6fa645529edbf05285
SHA25687a3e59ca3449d55d33c2932f6fcc0fb48289bfde35652a6fdd890d4e5b59eac
SHA5122688cb774f660ad114a0013e27a0da9ff4c2c89927eb661976c38d62e3eb43085b239904cf7ca7243a06b2690f52a36947ad21f1cf5c986cc088974bb0458de1
-
\Users\Admin\AppData\Local\Temp\SpanielPolymorph.dllMD5
28c74b92530fceb2c5871b64ba0c3ea0
SHA19e13cdde74e97f4b94501c6fa645529edbf05285
SHA25687a3e59ca3449d55d33c2932f6fcc0fb48289bfde35652a6fdd890d4e5b59eac
SHA5122688cb774f660ad114a0013e27a0da9ff4c2c89927eb661976c38d62e3eb43085b239904cf7ca7243a06b2690f52a36947ad21f1cf5c986cc088974bb0458de1
-
memory/2744-121-0x0000000076000000-0x0000000076067000-memory.dmpFilesize
412KB
-
memory/2744-122-0x00007FFE7E8B0000-0x00007FFE7EA8B000-memory.dmpFilesize
1.9MB
-
memory/2744-123-0x0000000000480000-0x00000000005CA000-memory.dmpFilesize
1.3MB
-
memory/3852-124-0x00000000773B9000-0x00000000773BA000-memory.dmpFilesize
4KB
-
memory/3852-130-0x00007FFE7E8B0000-0x00007FFE7EA8B000-memory.dmpFilesize
1.9MB
-
memory/3852-132-0x0000000002FF0000-0x0000000002FF6000-memory.dmpFilesize
24KB
-
memory/3852-156-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB