Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
22-09-2022 22:35
Static task
static1
Behavioral task
behavioral1
Sample
ORDER EM067022.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ORDER EM067022.exe
Resource
win10v2004-20220812-en
General
-
Target
ORDER EM067022.exe
-
Size
6KB
-
MD5
6fa8af45a1f5ab2bed6933e1b982f7f1
-
SHA1
ddbaeb9e823b4af615cfa87212eb1171969f1d4f
-
SHA256
6454523a7bb0aec9d2c66c43447ea65bfe8cff6659b4b4fea26d8919571de430
-
SHA512
60d7d7fd0969294aa59a8817c544f14228e1437a750300165e4c248d36c51dd1cca2f4e6d4e5cb650ead4439c4171f5e1579fdc7f0a78890501e044e70b4e417
-
SSDEEP
96:B2EzDjDPd6GhLee9xHdAaG3xWclF1utdbyzNt:B1PdRLxz9AaG3MclF1ur0
Malware Config
Extracted
remcos
RemoteHost
172.111.234.110:5888
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-DEOEQR
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Roaming\\Fdrwnq\\Vspuz.exe\"," ORDER EM067022.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation ORDER EM067022.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3140 set thread context of 4972 3140 ORDER EM067022.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1568 powershell.exe 1568 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3140 ORDER EM067022.exe Token: SeDebugPrivilege 1568 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3140 wrote to memory of 1568 3140 ORDER EM067022.exe 85 PID 3140 wrote to memory of 1568 3140 ORDER EM067022.exe 85 PID 3140 wrote to memory of 1568 3140 ORDER EM067022.exe 85 PID 3140 wrote to memory of 4972 3140 ORDER EM067022.exe 88 PID 3140 wrote to memory of 4972 3140 ORDER EM067022.exe 88 PID 3140 wrote to memory of 4972 3140 ORDER EM067022.exe 88 PID 3140 wrote to memory of 4972 3140 ORDER EM067022.exe 88 PID 3140 wrote to memory of 4972 3140 ORDER EM067022.exe 88 PID 3140 wrote to memory of 4972 3140 ORDER EM067022.exe 88 PID 3140 wrote to memory of 4972 3140 ORDER EM067022.exe 88 PID 3140 wrote to memory of 4972 3140 ORDER EM067022.exe 88 PID 3140 wrote to memory of 4972 3140 ORDER EM067022.exe 88 PID 3140 wrote to memory of 4972 3140 ORDER EM067022.exe 88 PID 3140 wrote to memory of 4972 3140 ORDER EM067022.exe 88 PID 3140 wrote to memory of 4972 3140 ORDER EM067022.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\ORDER EM067022.exe"C:\Users\Admin\AppData\Local\Temp\ORDER EM067022.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAxAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1568
-
-
C:\Users\Admin\AppData\Local\Temp\ORDER EM067022.exe"C:\Users\Admin\AppData\Local\Temp\ORDER EM067022.exe"2⤵PID:4972
-