Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 22:14
Static task
static1
Behavioral task
behavioral1
Sample
77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe
Resource
win10v2004-20220414-en
General
-
Target
77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe
-
Size
119KB
-
MD5
a257f126fda7ec1745bbbdb0ecb97dce
-
SHA1
354cda5f58ff5828c9ce38b95f3c6d4aa6f59f6e
-
SHA256
77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d
-
SHA512
36ed37c96165672c49aa1b5d83988eda5063372bbbb1bf6f4c21868b80cd062895c94e9653ca2de30bbd2c55696ca12bfa744f1aacd500bdc9665c1d7827c5f2
Malware Config
Extracted
remcos
1.7 Pro
Lockdown Open
ascoitaliasa.duckdns.org:4046
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
Windows logoff sound.exe
-
copy_folder
Microsoft Media
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%WinDir%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
Windows Audio
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Window Audio
-
screenshot_crypt
false
-
screenshot_flag
true
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
Window sound
-
take_screenshot_option
true
-
take_screenshot_time
5
-
take_screenshot_title
Password;Username;proformer;invoice;notepad
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
Windows logoff sound.exeWindows logoff sound.exepid process 3328 Windows logoff sound.exe 1256 Windows logoff sound.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation 77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exeWindows logoff sound.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Window sound = "\"C:\\Windows\\Microsoft Media\\Windows logoff sound.exe\"" 77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Windows\CurrentVersion\Run\ Windows logoff sound.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Window sound = "\"C:\\Windows\\Microsoft Media\\Windows logoff sound.exe\"" Windows logoff sound.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exeWindows logoff sound.exedescription pid process target process PID 4696 set thread context of 1892 4696 77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe 77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe PID 3328 set thread context of 1256 3328 Windows logoff sound.exe Windows logoff sound.exe -
Drops file in Windows directory 3 IoCs
Processes:
77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exedescription ioc process File opened for modification C:\Windows\Microsoft Media 77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe File created C:\Windows\Microsoft Media\Windows logoff sound.exe 77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe File opened for modification C:\Windows\Microsoft Media\Windows logoff sound.exe 77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 2 IoCs
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Windows logoff sound.exepid process 1256 Windows logoff sound.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.execmd.execmd.exeWindows logoff sound.exeWindows logoff sound.execmd.exedescription pid process target process PID 4696 wrote to memory of 1892 4696 77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe 77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe PID 4696 wrote to memory of 1892 4696 77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe 77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe PID 4696 wrote to memory of 1892 4696 77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe 77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe PID 4696 wrote to memory of 1892 4696 77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe 77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe PID 4696 wrote to memory of 1892 4696 77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe 77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe PID 4696 wrote to memory of 1892 4696 77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe 77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe PID 4696 wrote to memory of 1892 4696 77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe 77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe PID 4696 wrote to memory of 1892 4696 77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe 77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe PID 4696 wrote to memory of 1892 4696 77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe 77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe PID 1892 wrote to memory of 4064 1892 77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe cmd.exe PID 1892 wrote to memory of 4064 1892 77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe cmd.exe PID 1892 wrote to memory of 4064 1892 77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe cmd.exe PID 4064 wrote to memory of 4352 4064 cmd.exe reg.exe PID 4064 wrote to memory of 4352 4064 cmd.exe reg.exe PID 4064 wrote to memory of 4352 4064 cmd.exe reg.exe PID 1892 wrote to memory of 1596 1892 77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe cmd.exe PID 1892 wrote to memory of 1596 1892 77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe cmd.exe PID 1892 wrote to memory of 1596 1892 77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe cmd.exe PID 1596 wrote to memory of 2496 1596 cmd.exe PING.EXE PID 1596 wrote to memory of 2496 1596 cmd.exe PING.EXE PID 1596 wrote to memory of 2496 1596 cmd.exe PING.EXE PID 1596 wrote to memory of 3328 1596 cmd.exe Windows logoff sound.exe PID 1596 wrote to memory of 3328 1596 cmd.exe Windows logoff sound.exe PID 1596 wrote to memory of 3328 1596 cmd.exe Windows logoff sound.exe PID 3328 wrote to memory of 1256 3328 Windows logoff sound.exe Windows logoff sound.exe PID 3328 wrote to memory of 1256 3328 Windows logoff sound.exe Windows logoff sound.exe PID 3328 wrote to memory of 1256 3328 Windows logoff sound.exe Windows logoff sound.exe PID 3328 wrote to memory of 1256 3328 Windows logoff sound.exe Windows logoff sound.exe PID 3328 wrote to memory of 1256 3328 Windows logoff sound.exe Windows logoff sound.exe PID 3328 wrote to memory of 1256 3328 Windows logoff sound.exe Windows logoff sound.exe PID 3328 wrote to memory of 1256 3328 Windows logoff sound.exe Windows logoff sound.exe PID 3328 wrote to memory of 1256 3328 Windows logoff sound.exe Windows logoff sound.exe PID 3328 wrote to memory of 1256 3328 Windows logoff sound.exe Windows logoff sound.exe PID 1256 wrote to memory of 3384 1256 Windows logoff sound.exe cmd.exe PID 1256 wrote to memory of 3384 1256 Windows logoff sound.exe cmd.exe PID 1256 wrote to memory of 3384 1256 Windows logoff sound.exe cmd.exe PID 3384 wrote to memory of 1100 3384 cmd.exe reg.exe PID 3384 wrote to memory of 1100 3384 cmd.exe reg.exe PID 3384 wrote to memory of 1100 3384 cmd.exe reg.exe PID 1256 wrote to memory of 1352 1256 Windows logoff sound.exe iexplore.exe PID 1256 wrote to memory of 1352 1256 Windows logoff sound.exe iexplore.exe PID 1256 wrote to memory of 1352 1256 Windows logoff sound.exe iexplore.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe"C:\Users\Admin\AppData\Local\Temp\77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe"{path}"2⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- Modifies registry key
PID:4352 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\PING.EXEPING 127.0.0.1 -n 24⤵
- Runs ping.exe
PID:2496 -
C:\Windows\Microsoft Media\Windows logoff sound.exe"C:\Windows\Microsoft Media\Windows logoff sound.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Windows\Microsoft Media\Windows logoff sound.exe"{path}"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f6⤵
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f7⤵
- Modifies registry key
PID:1100 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"6⤵PID:1352
-
C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exeC:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe1⤵PID:448
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102B
MD5d65c998bd7769229c5cd6c8a1ae4b639
SHA159afa2c156d6d670d8e87d61756b814d3bc19bb3
SHA256bac6c33f44976bb615821bb75ab53cbb8c34d53a00246f68f62b255ef0ba1d7f
SHA512a56827185f39b896555ddd52391235b9a93e79c269674bf1db729abe728e452ecee1a42749352e12c7261eb114bb66add062cb41f367d5e971ea406bfc831895
-
Filesize
119KB
MD5a257f126fda7ec1745bbbdb0ecb97dce
SHA1354cda5f58ff5828c9ce38b95f3c6d4aa6f59f6e
SHA25677ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d
SHA51236ed37c96165672c49aa1b5d83988eda5063372bbbb1bf6f4c21868b80cd062895c94e9653ca2de30bbd2c55696ca12bfa744f1aacd500bdc9665c1d7827c5f2
-
Filesize
119KB
MD5a257f126fda7ec1745bbbdb0ecb97dce
SHA1354cda5f58ff5828c9ce38b95f3c6d4aa6f59f6e
SHA25677ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d
SHA51236ed37c96165672c49aa1b5d83988eda5063372bbbb1bf6f4c21868b80cd062895c94e9653ca2de30bbd2c55696ca12bfa744f1aacd500bdc9665c1d7827c5f2
-
Filesize
119KB
MD5a257f126fda7ec1745bbbdb0ecb97dce
SHA1354cda5f58ff5828c9ce38b95f3c6d4aa6f59f6e
SHA25677ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d
SHA51236ed37c96165672c49aa1b5d83988eda5063372bbbb1bf6f4c21868b80cd062895c94e9653ca2de30bbd2c55696ca12bfa744f1aacd500bdc9665c1d7827c5f2