Analysis
-
max time kernel
153s -
max time network
151s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
26-01-2022 08:05
Static task
static1
Behavioral task
behavioral1
Sample
SECRHACIEN36590001 SECRHACIEN36590007.exe
Resource
win7-en-20211208
General
-
Target
SECRHACIEN36590001 SECRHACIEN36590007.exe
-
Size
579KB
-
MD5
bc521cfe669b897e7adaf6439b91790e
-
SHA1
2dce5e832053ddb8f32ab8179aac830a12fe760a
-
SHA256
bbe26aa677d50f8ac1f37c0d7489a22284a84af8ae353e14a4765b8371d20665
-
SHA512
d5446fa1ec6cdca541245222e796064dbc9fba602861c78bbc3ecbcff19455987c29db19ba316cf2933295372c80374f14dc3adf802dd047d508a1946bef7cf7
Malware Config
Extracted
remcos
2.7.0 Pro
11
pruebaonce83191.duckdns.org:1717
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-9IG8KM
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
SECRHACIEN36590001 SECRHACIEN36590007.exedescription pid process target process PID 2428 set thread context of 856 2428 SECRHACIEN36590001 SECRHACIEN36590007.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
SECRHACIEN36590001 SECRHACIEN36590007.exepid process 2428 SECRHACIEN36590001 SECRHACIEN36590007.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
SECRHACIEN36590001 SECRHACIEN36590007.exedescription pid process Token: SeDebugPrivilege 2428 SECRHACIEN36590001 SECRHACIEN36590007.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RegSvcs.exepid process 856 RegSvcs.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
SECRHACIEN36590001 SECRHACIEN36590007.exedescription pid process target process PID 2428 wrote to memory of 3908 2428 SECRHACIEN36590001 SECRHACIEN36590007.exe schtasks.exe PID 2428 wrote to memory of 3908 2428 SECRHACIEN36590001 SECRHACIEN36590007.exe schtasks.exe PID 2428 wrote to memory of 3908 2428 SECRHACIEN36590001 SECRHACIEN36590007.exe schtasks.exe PID 2428 wrote to memory of 856 2428 SECRHACIEN36590001 SECRHACIEN36590007.exe RegSvcs.exe PID 2428 wrote to memory of 856 2428 SECRHACIEN36590001 SECRHACIEN36590007.exe RegSvcs.exe PID 2428 wrote to memory of 856 2428 SECRHACIEN36590001 SECRHACIEN36590007.exe RegSvcs.exe PID 2428 wrote to memory of 856 2428 SECRHACIEN36590001 SECRHACIEN36590007.exe RegSvcs.exe PID 2428 wrote to memory of 856 2428 SECRHACIEN36590001 SECRHACIEN36590007.exe RegSvcs.exe PID 2428 wrote to memory of 856 2428 SECRHACIEN36590001 SECRHACIEN36590007.exe RegSvcs.exe PID 2428 wrote to memory of 856 2428 SECRHACIEN36590001 SECRHACIEN36590007.exe RegSvcs.exe PID 2428 wrote to memory of 856 2428 SECRHACIEN36590001 SECRHACIEN36590007.exe RegSvcs.exe PID 2428 wrote to memory of 856 2428 SECRHACIEN36590001 SECRHACIEN36590007.exe RegSvcs.exe PID 2428 wrote to memory of 856 2428 SECRHACIEN36590001 SECRHACIEN36590007.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SECRHACIEN36590001 SECRHACIEN36590007.exe"C:\Users\Admin\AppData\Local\Temp\SECRHACIEN36590001 SECRHACIEN36590007.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uQRirl" /XML "C:\Users\Admin\AppData\Local\Temp\tmp27B8.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp27B8.tmpMD5
65a2ea1d4953586e2c37f551023ec417
SHA12054126460841af8da9ba75b874b9a5d95897785
SHA2566f90b2f36446f6ef415c741ba22bdf34dbf4682c706e95eb1c52577855bad5be
SHA51261442c6ef75aace753bfd38760135ed324df0fb22b5f5c5f8c5352b87cc2c1c6111e43e0a1fee45b14116ff000c7f701d2b53cc44e60427ac820d0275fae2f6e
-
memory/856-125-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/856-126-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/2428-115-0x0000000000480000-0x0000000000516000-memory.dmpFilesize
600KB
-
memory/2428-116-0x0000000005240000-0x000000000573E000-memory.dmpFilesize
5.0MB
-
memory/2428-117-0x0000000004DE0000-0x0000000004E72000-memory.dmpFilesize
584KB
-
memory/2428-118-0x0000000004E80000-0x0000000004F1C000-memory.dmpFilesize
624KB
-
memory/2428-119-0x0000000004D40000-0x0000000004D4A000-memory.dmpFilesize
40KB
-
memory/2428-120-0x0000000004D40000-0x000000000523E000-memory.dmpFilesize
5.0MB
-
memory/2428-121-0x0000000004FE0000-0x0000000004FEA000-memory.dmpFilesize
40KB
-
memory/2428-122-0x0000000007380000-0x00000000073F4000-memory.dmpFilesize
464KB
-
memory/2428-123-0x0000000009A30000-0x0000000009A56000-memory.dmpFilesize
152KB