Analysis
-
max time kernel
270s -
max time network
263s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
26-01-2022 15:53
Static task
static1
Behavioral task
behavioral1
Sample
IMG_7100.scr
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
IMG_7100.scr
Resource
win10-en-20211208
Behavioral task
behavioral3
Sample
IMG_7100.scr
Resource
win10v2004-en-20220112
Behavioral task
behavioral4
Sample
IMG_7100.scr
Resource
win11
General
-
Target
IMG_7100.scr
-
Size
869KB
-
MD5
327916646174b24f42a533053e976e41
-
SHA1
60884023e12058000563bdb2f302f8fc00d4c83d
-
SHA256
a800578827b7e3667884f92ab26a58dc3197e3be7730678d84aa3d9bb5d15db3
-
SHA512
78a980271645839e0e859077c913cef16da4dd4611f5c1e5ce0e5db25b866ff417c22f639b931839e98ccb9cd4914e46c4876b1756c7fc03b7f6f39bca4c9237
Malware Config
Extracted
remcos
3.3.2 Pro
RemoteHost
proprapra90.ddns.net:8810
storeyman7109.duckdns.org:8810
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
morethan-CJ2X2C
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
notepad;solitaire;
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader First Stage 7 IoCs
Processes:
resource yara_rule behavioral3/memory/2716-135-0x0000000002F00000-0x0000000002F1B000-memory.dmp modiloader_stage1 behavioral3/memory/2716-181-0x0000000002F00000-0x0000000002F1B000-memory.dmp modiloader_stage1 behavioral3/memory/2716-182-0x0000000002F00000-0x0000000002F1B000-memory.dmp modiloader_stage1 behavioral3/memory/2716-183-0x0000000002F00000-0x0000000002F1B000-memory.dmp modiloader_stage1 behavioral3/memory/2716-184-0x0000000002F00000-0x0000000002F1B000-memory.dmp modiloader_stage1 behavioral3/memory/2716-180-0x0000000002F00000-0x0000000002F1B000-memory.dmp modiloader_stage1 behavioral3/memory/2716-185-0x0000000002F00000-0x0000000002F1B000-memory.dmp modiloader_stage1 -
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule behavioral3/memory/2716-194-0x0000000003910000-0x00000000039D3000-memory.dmp modiloader_stage2 -
Sets service image path in registry 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
IMG_7100.scrdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Lvughbdemq = "C:\\Users\\Admin\\Contacts\\qmedbhguvL.url" IMG_7100.scr -
Modifies data under HKEY_USERS 41 IoCs
Processes:
WaaSMedicAgent.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates WaaSMedicAgent.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
IMG_7100.scrdescription pid process target process PID 2716 wrote to memory of 3644 2716 IMG_7100.scr DpiScaling.exe PID 2716 wrote to memory of 3644 2716 IMG_7100.scr DpiScaling.exe PID 2716 wrote to memory of 3644 2716 IMG_7100.scr DpiScaling.exe PID 2716 wrote to memory of 3644 2716 IMG_7100.scr DpiScaling.exe PID 2716 wrote to memory of 3644 2716 IMG_7100.scr DpiScaling.exe PID 2716 wrote to memory of 3644 2716 IMG_7100.scr DpiScaling.exe PID 2716 wrote to memory of 3644 2716 IMG_7100.scr DpiScaling.exe PID 2716 wrote to memory of 3644 2716 IMG_7100.scr DpiScaling.exe PID 2716 wrote to memory of 3644 2716 IMG_7100.scr DpiScaling.exe PID 2716 wrote to memory of 3644 2716 IMG_7100.scr DpiScaling.exe PID 2716 wrote to memory of 3644 2716 IMG_7100.scr DpiScaling.exe PID 2716 wrote to memory of 3644 2716 IMG_7100.scr DpiScaling.exe PID 2716 wrote to memory of 3644 2716 IMG_7100.scr DpiScaling.exe PID 2716 wrote to memory of 3644 2716 IMG_7100.scr DpiScaling.exe PID 2716 wrote to memory of 3644 2716 IMG_7100.scr DpiScaling.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\IMG_7100.scr"C:\Users\Admin\AppData\Local\Temp\IMG_7100.scr" /S1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\DpiScaling.exeC:\Windows\System32\DpiScaling.exe2⤵
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe f0e91e6da8bc0587d19a36a6454a5940 7s8fIIQQMEmz3ID6MaZggQ.0.1.0.0.01⤵
- Modifies data under HKEY_USERS
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2716-133-0x0000000002370000-0x0000000002371000-memory.dmpFilesize
4KB
-
memory/2716-135-0x0000000002F00000-0x0000000002F1B000-memory.dmpFilesize
108KB
-
memory/2716-181-0x0000000002F00000-0x0000000002F1B000-memory.dmpFilesize
108KB
-
memory/2716-182-0x0000000002F00000-0x0000000002F1B000-memory.dmpFilesize
108KB
-
memory/2716-183-0x0000000002F00000-0x0000000002F1B000-memory.dmpFilesize
108KB
-
memory/2716-184-0x0000000002F00000-0x0000000002F1B000-memory.dmpFilesize
108KB
-
memory/2716-180-0x0000000002F00000-0x0000000002F1B000-memory.dmpFilesize
108KB
-
memory/2716-185-0x0000000002F00000-0x0000000002F1B000-memory.dmpFilesize
108KB
-
memory/2716-194-0x0000000003910000-0x00000000039D3000-memory.dmpFilesize
780KB
-
memory/3644-235-0x0000000002F80000-0x0000000002F81000-memory.dmpFilesize
4KB
-
memory/3644-234-0x0000000002EC0000-0x0000000002EC1000-memory.dmpFilesize
4KB
-
memory/3644-236-0x0000000002EE0000-0x0000000002EE1000-memory.dmpFilesize
4KB
-
memory/3644-237-0x0000000072600000-0x000000007267E000-memory.dmpFilesize
504KB
-
memory/3644-238-0x0000000000400000-0x000000000047B000-memory.dmpFilesize
492KB