Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
08-08-2022 18:24
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220722-en
General
-
Target
tmp.exe
-
Size
2.4MB
-
MD5
05f6fa39a293a904e53aad577744ee8e
-
SHA1
99126bc0831b9d49eb46fd6dcdf7a12376db415d
-
SHA256
928f75ac182baea6734e08cdd425bcea33bf7f27a43922b9f693d199d7aee550
-
SHA512
3136c7a911b07496d0f85885780edf684592ec265173801a1a472406a8b73bc1bebe0fa48202ded9b83acb8a0f633d6b1ce1657adc6a5775ca8946010d76df9b
Malware Config
Extracted
remcos
RemoteHost
vivald21.hopto.org:3240
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-9HMSCN
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
._cache_tmp.exeSynaptics.exeSynaptics.exe._cache_Synaptics.exepid process 1456 ._cache_tmp.exe 548 Synaptics.exe 1036 Synaptics.exe 1048 ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
Processes:
tmp.exeSynaptics.exepid process 1676 tmp.exe 1676 tmp.exe 1676 tmp.exe 1676 tmp.exe 1036 Synaptics.exe 1036 Synaptics.exe 1036 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
tmp.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" tmp.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
tmp.exeSynaptics.exedescription pid process target process PID 944 set thread context of 1676 944 tmp.exe tmp.exe PID 548 set thread context of 1036 548 Synaptics.exe Synaptics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
tmp.exepowershell.exeSynaptics.exepowershell.exepid process 944 tmp.exe 944 tmp.exe 2028 powershell.exe 944 tmp.exe 548 Synaptics.exe 1464 powershell.exe 548 Synaptics.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
tmp.exepowershell.exeSynaptics.exepowershell.exedescription pid process Token: SeDebugPrivilege 944 tmp.exe Token: SeDebugPrivilege 2028 powershell.exe Token: SeDebugPrivilege 548 Synaptics.exe Token: SeDebugPrivilege 1464 powershell.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
tmp.exeSynaptics.exepid process 944 tmp.exe 548 Synaptics.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
tmp.exeSynaptics.exepid process 944 tmp.exe 548 Synaptics.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
._cache_tmp.exepid process 1456 ._cache_tmp.exe -
Suspicious use of WriteProcessMemory 52 IoCs
Processes:
tmp.exetmp.exeSynaptics.exeSynaptics.exedescription pid process target process PID 944 wrote to memory of 2028 944 tmp.exe powershell.exe PID 944 wrote to memory of 2028 944 tmp.exe powershell.exe PID 944 wrote to memory of 2028 944 tmp.exe powershell.exe PID 944 wrote to memory of 2028 944 tmp.exe powershell.exe PID 944 wrote to memory of 1192 944 tmp.exe schtasks.exe PID 944 wrote to memory of 1192 944 tmp.exe schtasks.exe PID 944 wrote to memory of 1192 944 tmp.exe schtasks.exe PID 944 wrote to memory of 1192 944 tmp.exe schtasks.exe PID 944 wrote to memory of 1676 944 tmp.exe tmp.exe PID 944 wrote to memory of 1676 944 tmp.exe tmp.exe PID 944 wrote to memory of 1676 944 tmp.exe tmp.exe PID 944 wrote to memory of 1676 944 tmp.exe tmp.exe PID 944 wrote to memory of 1676 944 tmp.exe tmp.exe PID 944 wrote to memory of 1676 944 tmp.exe tmp.exe PID 944 wrote to memory of 1676 944 tmp.exe tmp.exe PID 944 wrote to memory of 1676 944 tmp.exe tmp.exe PID 944 wrote to memory of 1676 944 tmp.exe tmp.exe PID 944 wrote to memory of 1676 944 tmp.exe tmp.exe PID 944 wrote to memory of 1676 944 tmp.exe tmp.exe PID 944 wrote to memory of 1676 944 tmp.exe tmp.exe PID 1676 wrote to memory of 1456 1676 tmp.exe ._cache_tmp.exe PID 1676 wrote to memory of 1456 1676 tmp.exe ._cache_tmp.exe PID 1676 wrote to memory of 1456 1676 tmp.exe ._cache_tmp.exe PID 1676 wrote to memory of 1456 1676 tmp.exe ._cache_tmp.exe PID 1676 wrote to memory of 548 1676 tmp.exe Synaptics.exe PID 1676 wrote to memory of 548 1676 tmp.exe Synaptics.exe PID 1676 wrote to memory of 548 1676 tmp.exe Synaptics.exe PID 1676 wrote to memory of 548 1676 tmp.exe Synaptics.exe PID 548 wrote to memory of 1464 548 Synaptics.exe powershell.exe PID 548 wrote to memory of 1464 548 Synaptics.exe powershell.exe PID 548 wrote to memory of 1464 548 Synaptics.exe powershell.exe PID 548 wrote to memory of 1464 548 Synaptics.exe powershell.exe PID 548 wrote to memory of 848 548 Synaptics.exe schtasks.exe PID 548 wrote to memory of 848 548 Synaptics.exe schtasks.exe PID 548 wrote to memory of 848 548 Synaptics.exe schtasks.exe PID 548 wrote to memory of 848 548 Synaptics.exe schtasks.exe PID 548 wrote to memory of 1036 548 Synaptics.exe Synaptics.exe PID 548 wrote to memory of 1036 548 Synaptics.exe Synaptics.exe PID 548 wrote to memory of 1036 548 Synaptics.exe Synaptics.exe PID 548 wrote to memory of 1036 548 Synaptics.exe Synaptics.exe PID 548 wrote to memory of 1036 548 Synaptics.exe Synaptics.exe PID 548 wrote to memory of 1036 548 Synaptics.exe Synaptics.exe PID 548 wrote to memory of 1036 548 Synaptics.exe Synaptics.exe PID 548 wrote to memory of 1036 548 Synaptics.exe Synaptics.exe PID 548 wrote to memory of 1036 548 Synaptics.exe Synaptics.exe PID 548 wrote to memory of 1036 548 Synaptics.exe Synaptics.exe PID 548 wrote to memory of 1036 548 Synaptics.exe Synaptics.exe PID 548 wrote to memory of 1036 548 Synaptics.exe Synaptics.exe PID 1036 wrote to memory of 1048 1036 Synaptics.exe ._cache_Synaptics.exe PID 1036 wrote to memory of 1048 1036 Synaptics.exe ._cache_Synaptics.exe PID 1036 wrote to memory of 1048 1036 Synaptics.exe ._cache_Synaptics.exe PID 1036 wrote to memory of 1048 1036 Synaptics.exe ._cache_Synaptics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\HziGohhJaJ.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HziGohhJaJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmpDFA6.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\._cache_tmp.exe"C:\Users\Admin\AppData\Local\Temp\._cache_tmp.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\HziGohhJaJ.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HziGohhJaJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA97A.tmp"4⤵
- Creates scheduled task(s)
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"5⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Synaptics\Synaptics.exeFilesize
2.4MB
MD505f6fa39a293a904e53aad577744ee8e
SHA199126bc0831b9d49eb46fd6dcdf7a12376db415d
SHA256928f75ac182baea6734e08cdd425bcea33bf7f27a43922b9f693d199d7aee550
SHA5123136c7a911b07496d0f85885780edf684592ec265173801a1a472406a8b73bc1bebe0fa48202ded9b83acb8a0f633d6b1ce1657adc6a5775ca8946010d76df9b
-
C:\ProgramData\Synaptics\Synaptics.exeFilesize
2.4MB
MD505f6fa39a293a904e53aad577744ee8e
SHA199126bc0831b9d49eb46fd6dcdf7a12376db415d
SHA256928f75ac182baea6734e08cdd425bcea33bf7f27a43922b9f693d199d7aee550
SHA5123136c7a911b07496d0f85885780edf684592ec265173801a1a472406a8b73bc1bebe0fa48202ded9b83acb8a0f633d6b1ce1657adc6a5775ca8946010d76df9b
-
C:\ProgramData\Synaptics\Synaptics.exeFilesize
2.4MB
MD505f6fa39a293a904e53aad577744ee8e
SHA199126bc0831b9d49eb46fd6dcdf7a12376db415d
SHA256928f75ac182baea6734e08cdd425bcea33bf7f27a43922b9f693d199d7aee550
SHA5123136c7a911b07496d0f85885780edf684592ec265173801a1a472406a8b73bc1bebe0fa48202ded9b83acb8a0f633d6b1ce1657adc6a5775ca8946010d76df9b
-
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exeFilesize
466KB
MD5e729b5c9501252eba5d7917256950424
SHA14dd74a695e40e22760e00a532677e1cc8857687c
SHA256395cf5e6d3f891a3049ec3412a97e687a8fdd077834fd30a83dcf9b3fb0f2807
SHA51231eac3aa066b30019f51b3678ed8dc628f8d518a2c05b93c15798ca2d7bce263245e700fe7a5e3af29eed5d47d66cf70ca08a7220ebd8d054e1f8b02dfa13443
-
C:\Users\Admin\AppData\Local\Temp\._cache_tmp.exeFilesize
466KB
MD5e729b5c9501252eba5d7917256950424
SHA14dd74a695e40e22760e00a532677e1cc8857687c
SHA256395cf5e6d3f891a3049ec3412a97e687a8fdd077834fd30a83dcf9b3fb0f2807
SHA51231eac3aa066b30019f51b3678ed8dc628f8d518a2c05b93c15798ca2d7bce263245e700fe7a5e3af29eed5d47d66cf70ca08a7220ebd8d054e1f8b02dfa13443
-
C:\Users\Admin\AppData\Local\Temp\tmpA97A.tmpFilesize
1KB
MD56c64662ec7e28eadb426089549c85756
SHA1943615988f2a843e609eec4d9d426e692f61d263
SHA256b6c698c265f34a81d29e6f0a84d78b2ec4eba17b6781a4fbe7e1c99ebd650566
SHA512244c4a5bb6f4e02010205309cd39c1cbc886ec6b6aa1324e9810854229a5f2f9f08fed18d2578594bec9617c4f25a228a063fe444534f51b7315cb0e96d8ebea
-
C:\Users\Admin\AppData\Local\Temp\tmpDFA6.tmpFilesize
1KB
MD56c64662ec7e28eadb426089549c85756
SHA1943615988f2a843e609eec4d9d426e692f61d263
SHA256b6c698c265f34a81d29e6f0a84d78b2ec4eba17b6781a4fbe7e1c99ebd650566
SHA512244c4a5bb6f4e02010205309cd39c1cbc886ec6b6aa1324e9810854229a5f2f9f08fed18d2578594bec9617c4f25a228a063fe444534f51b7315cb0e96d8ebea
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD59aab144cf7957c141492d8bbfc228e51
SHA12df896568fc564676c5286dc219531b582828cd8
SHA25645e60baf973b2c5486fc85b64f656b4382e06b5829c582470649e4de3f1a91e3
SHA512fb6e89914b0fc3fffd84abea0fedd529d45cfb09dd85a1829fb7ad5e4b965f3b6d7ca0cf9177352a4efed82c08269182267eec7b6e4dfcf10b9eaf140dea807f
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\ProgramData\Synaptics\Synaptics.exeFilesize
2.4MB
MD505f6fa39a293a904e53aad577744ee8e
SHA199126bc0831b9d49eb46fd6dcdf7a12376db415d
SHA256928f75ac182baea6734e08cdd425bcea33bf7f27a43922b9f693d199d7aee550
SHA5123136c7a911b07496d0f85885780edf684592ec265173801a1a472406a8b73bc1bebe0fa48202ded9b83acb8a0f633d6b1ce1657adc6a5775ca8946010d76df9b
-
\ProgramData\Synaptics\Synaptics.exeFilesize
2.4MB
MD505f6fa39a293a904e53aad577744ee8e
SHA199126bc0831b9d49eb46fd6dcdf7a12376db415d
SHA256928f75ac182baea6734e08cdd425bcea33bf7f27a43922b9f693d199d7aee550
SHA5123136c7a911b07496d0f85885780edf684592ec265173801a1a472406a8b73bc1bebe0fa48202ded9b83acb8a0f633d6b1ce1657adc6a5775ca8946010d76df9b
-
\ProgramData\Synaptics\Synaptics.exeFilesize
2.4MB
MD505f6fa39a293a904e53aad577744ee8e
SHA199126bc0831b9d49eb46fd6dcdf7a12376db415d
SHA256928f75ac182baea6734e08cdd425bcea33bf7f27a43922b9f693d199d7aee550
SHA5123136c7a911b07496d0f85885780edf684592ec265173801a1a472406a8b73bc1bebe0fa48202ded9b83acb8a0f633d6b1ce1657adc6a5775ca8946010d76df9b
-
\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exeFilesize
466KB
MD5e729b5c9501252eba5d7917256950424
SHA14dd74a695e40e22760e00a532677e1cc8857687c
SHA256395cf5e6d3f891a3049ec3412a97e687a8fdd077834fd30a83dcf9b3fb0f2807
SHA51231eac3aa066b30019f51b3678ed8dc628f8d518a2c05b93c15798ca2d7bce263245e700fe7a5e3af29eed5d47d66cf70ca08a7220ebd8d054e1f8b02dfa13443
-
\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exeFilesize
466KB
MD5e729b5c9501252eba5d7917256950424
SHA14dd74a695e40e22760e00a532677e1cc8857687c
SHA256395cf5e6d3f891a3049ec3412a97e687a8fdd077834fd30a83dcf9b3fb0f2807
SHA51231eac3aa066b30019f51b3678ed8dc628f8d518a2c05b93c15798ca2d7bce263245e700fe7a5e3af29eed5d47d66cf70ca08a7220ebd8d054e1f8b02dfa13443
-
\Users\Admin\AppData\Local\Temp\._cache_tmp.exeFilesize
466KB
MD5e729b5c9501252eba5d7917256950424
SHA14dd74a695e40e22760e00a532677e1cc8857687c
SHA256395cf5e6d3f891a3049ec3412a97e687a8fdd077834fd30a83dcf9b3fb0f2807
SHA51231eac3aa066b30019f51b3678ed8dc628f8d518a2c05b93c15798ca2d7bce263245e700fe7a5e3af29eed5d47d66cf70ca08a7220ebd8d054e1f8b02dfa13443
-
\Users\Admin\AppData\Local\Temp\._cache_tmp.exeFilesize
466KB
MD5e729b5c9501252eba5d7917256950424
SHA14dd74a695e40e22760e00a532677e1cc8857687c
SHA256395cf5e6d3f891a3049ec3412a97e687a8fdd077834fd30a83dcf9b3fb0f2807
SHA51231eac3aa066b30019f51b3678ed8dc628f8d518a2c05b93c15798ca2d7bce263245e700fe7a5e3af29eed5d47d66cf70ca08a7220ebd8d054e1f8b02dfa13443
-
memory/548-94-0x00000000012E0000-0x0000000001550000-memory.dmpFilesize
2.4MB
-
memory/548-90-0x0000000000000000-mapping.dmp
-
memory/848-98-0x0000000000000000-mapping.dmp
-
memory/944-58-0x000000000A790000-0x000000000A8FE000-memory.dmpFilesize
1.4MB
-
memory/944-54-0x00000000008D0000-0x0000000000B40000-memory.dmpFilesize
2.4MB
-
memory/944-57-0x00000000005A0000-0x00000000005AC000-memory.dmpFilesize
48KB
-
memory/944-63-0x000000000A3A0000-0x000000000A4D8000-memory.dmpFilesize
1.2MB
-
memory/944-56-0x00000000005E0000-0x0000000000600000-memory.dmpFilesize
128KB
-
memory/944-55-0x00000000753E1000-0x00000000753E3000-memory.dmpFilesize
8KB
-
memory/1036-129-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1036-130-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1036-115-0x000000000049AB80-mapping.dmp
-
memory/1036-119-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1048-126-0x0000000000000000-mapping.dmp
-
memory/1192-60-0x0000000000000000-mapping.dmp
-
memory/1456-84-0x0000000000000000-mapping.dmp
-
memory/1464-120-0x000000006F830000-0x000000006FDDB000-memory.dmpFilesize
5.7MB
-
memory/1464-122-0x000000006F830000-0x000000006FDDB000-memory.dmpFilesize
5.7MB
-
memory/1464-97-0x0000000000000000-mapping.dmp
-
memory/1676-72-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1676-74-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1676-80-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1676-78-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1676-77-0x000000000049AB80-mapping.dmp
-
memory/1676-76-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1676-85-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1676-64-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1676-65-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1676-93-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1676-71-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1676-69-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1676-67-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2028-96-0x000000006E5B0000-0x000000006EB5B000-memory.dmpFilesize
5.7MB
-
memory/2028-81-0x000000006E5B0000-0x000000006EB5B000-memory.dmpFilesize
5.7MB
-
memory/2028-59-0x0000000000000000-mapping.dmp