Analysis
-
max time kernel
151s -
max time network
138s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
26-01-2022 08:05
Static task
static1
Behavioral task
behavioral1
Sample
SECRHACIEN36590001 SECRHACIEN36590007.exe
Resource
win7-en-20211208
General
-
Target
SECRHACIEN36590001 SECRHACIEN36590007.exe
-
Size
579KB
-
MD5
bc521cfe669b897e7adaf6439b91790e
-
SHA1
2dce5e832053ddb8f32ab8179aac830a12fe760a
-
SHA256
bbe26aa677d50f8ac1f37c0d7489a22284a84af8ae353e14a4765b8371d20665
-
SHA512
d5446fa1ec6cdca541245222e796064dbc9fba602861c78bbc3ecbcff19455987c29db19ba316cf2933295372c80374f14dc3adf802dd047d508a1946bef7cf7
Malware Config
Extracted
remcos
2.7.0 Pro
11
pruebaonce83191.duckdns.org:1717
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-9IG8KM
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
SECRHACIEN36590001 SECRHACIEN36590007.exedescription pid process target process PID 1088 set thread context of 1816 1088 SECRHACIEN36590001 SECRHACIEN36590007.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
SECRHACIEN36590001 SECRHACIEN36590007.exepid process 1088 SECRHACIEN36590001 SECRHACIEN36590007.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
SECRHACIEN36590001 SECRHACIEN36590007.exedescription pid process Token: SeDebugPrivilege 1088 SECRHACIEN36590001 SECRHACIEN36590007.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RegSvcs.exepid process 1816 RegSvcs.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
SECRHACIEN36590001 SECRHACIEN36590007.exedescription pid process target process PID 1088 wrote to memory of 988 1088 SECRHACIEN36590001 SECRHACIEN36590007.exe schtasks.exe PID 1088 wrote to memory of 988 1088 SECRHACIEN36590001 SECRHACIEN36590007.exe schtasks.exe PID 1088 wrote to memory of 988 1088 SECRHACIEN36590001 SECRHACIEN36590007.exe schtasks.exe PID 1088 wrote to memory of 988 1088 SECRHACIEN36590001 SECRHACIEN36590007.exe schtasks.exe PID 1088 wrote to memory of 1816 1088 SECRHACIEN36590001 SECRHACIEN36590007.exe RegSvcs.exe PID 1088 wrote to memory of 1816 1088 SECRHACIEN36590001 SECRHACIEN36590007.exe RegSvcs.exe PID 1088 wrote to memory of 1816 1088 SECRHACIEN36590001 SECRHACIEN36590007.exe RegSvcs.exe PID 1088 wrote to memory of 1816 1088 SECRHACIEN36590001 SECRHACIEN36590007.exe RegSvcs.exe PID 1088 wrote to memory of 1816 1088 SECRHACIEN36590001 SECRHACIEN36590007.exe RegSvcs.exe PID 1088 wrote to memory of 1816 1088 SECRHACIEN36590001 SECRHACIEN36590007.exe RegSvcs.exe PID 1088 wrote to memory of 1816 1088 SECRHACIEN36590001 SECRHACIEN36590007.exe RegSvcs.exe PID 1088 wrote to memory of 1816 1088 SECRHACIEN36590001 SECRHACIEN36590007.exe RegSvcs.exe PID 1088 wrote to memory of 1816 1088 SECRHACIEN36590001 SECRHACIEN36590007.exe RegSvcs.exe PID 1088 wrote to memory of 1816 1088 SECRHACIEN36590001 SECRHACIEN36590007.exe RegSvcs.exe PID 1088 wrote to memory of 1816 1088 SECRHACIEN36590001 SECRHACIEN36590007.exe RegSvcs.exe PID 1088 wrote to memory of 1816 1088 SECRHACIEN36590001 SECRHACIEN36590007.exe RegSvcs.exe PID 1088 wrote to memory of 1816 1088 SECRHACIEN36590001 SECRHACIEN36590007.exe RegSvcs.exe PID 1088 wrote to memory of 1816 1088 SECRHACIEN36590001 SECRHACIEN36590007.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SECRHACIEN36590001 SECRHACIEN36590007.exe"C:\Users\Admin\AppData\Local\Temp\SECRHACIEN36590001 SECRHACIEN36590007.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uQRirl" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3FFD.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp3FFD.tmpMD5
abd60b11c95700e8d83b35a7fb841bdc
SHA17b3cd83bd8e9f54c39e58dc278e0f36c4a168702
SHA2564bfae601420e74ea2dfc68dc19edad2da6b511969714c30e2081d01fccdaaafd
SHA5121116d3f00083bc328f7fca8bee33d16f765746e490857e3abb36237ef628cd11cb4faa1ab176522a10bfeea4b1845873c0207e873e740ed5d52b35693158ff14
-
memory/1088-54-0x00000000107C0000-0x0000000010856000-memory.dmpFilesize
600KB
-
memory/1088-55-0x0000000076C61000-0x0000000076C63000-memory.dmpFilesize
8KB
-
memory/1088-56-0x0000000002230000-0x0000000004360000-memory.dmpFilesize
33.2MB
-
memory/1088-57-0x0000000000530000-0x000000000053A000-memory.dmpFilesize
40KB
-
memory/1088-58-0x0000000005420000-0x0000000005494000-memory.dmpFilesize
464KB
-
memory/1088-59-0x0000000001E40000-0x0000000001E66000-memory.dmpFilesize
152KB
-
memory/1816-62-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/1816-61-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/1816-63-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/1816-64-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/1816-65-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/1816-66-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/1816-67-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/1816-69-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/1816-70-0x0000000000401000-0x0000000000421000-memory.dmpFilesize
128KB